Monday, May 27, 2019

Background Essay -- essays papers

BackgroundInformation war is defined as, the offensive and defensive part of training and information systems to deny, exploit, corrupt, or destroy, an adversarys information, information-based processes, information systems, and computer-based networks while protecting ones own. Such actions are designed to achieve advantages over military or business adversaries (Goldberg). Cyber- terrorist act is defined as, the unlawful intake of force or violence against persons or property to intimidate or coerce a government, the civil population, or any segment thereof, in furtherance of political or social objectives in the worldwide network of computer and/or computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange (Doyle). The two definitions are not formal and are not the exact definitions of every two terms. The reason for this is that there is no exact definition that constitutes information warfare or cyber-terrorism. From these definit ions above, we can conclude that a cyber-terrorist will use information warfare techniques to reach his goal. For example, if the United States understands the system that operates the scud missiles of Iraq, then through Information Warfare (hacking / cracking) they could make the scud missiles useless. This protects the Untied States pilots on attacks of chemic or biological weapons of mass destruction by reducing the chances of the pilots actually being shot down.Information Warfare has been around since the creation of the NSA. The first apparatus that deciphered code was created by United States scientists and was calls the Fish. However, the greatest advancement in our technology came when the United States stole the Enigma machine fr... ...Terrorism Introduction. http//www.survivalguide.com/cyber_terrorism_introduction.htm 2002, October 16.Deutch, J. (25, June 1996). Foreign Information Warfare Programs and Capabilities. 2002, Sept12.Ensor, D. Garrett, M. Smith M., & Willi ams, D. (February 20, 2001). FBI assesses grave damage from latest spy scandal. http//www.cnn.com/2001/US/02/20/fbi.spy.impact/ 2002, October 16.Goldberg, I. (December 2, 2000). Glossary of Information Warfare Terms. http//www.psycom.net/iwar.2.html 2002, October 16.Johnson, D. (2001). Computer Ethics. Prentice Hall, NJ.(November 2001) Cyber Protests Related to the War on Terrorism The Current Threat. http//www.nipc.gov/publications/nipcpub/cyberprotests1101.pdf 2002 September 12.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.