Tuesday, October 1, 2019

Background Essay -- essays papers

Background Information Warfare is defined as, â€Å" the offensive and defensive use of information and information systems to deny, exploit, corrupt, or destroy, an adversary’s information, information-based processes, information systems, and computer-based networks while protecting one’s own. Such actions are designed to achieve advantages over military or business adversaries† (Goldberg). Cyber-Terrorism is defined as, â€Å"the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives in the worldwide network of computer and/or computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange† (Doyle). The two definitions are not formal and are not the exact definitions of either two terms. The reason for this is that there is no exact definition that constitutes information warfare or cybe r-terrorism. From these definitions above, we can conclude that a cyber-terrorist will use information warfare techniques to reach his goal. For example, if the United States understands the system that operates the scud missiles of Iraq, then through Information Warfare (hacking / cracking) they could make the scud missiles useless. This protects the Untied States pilots on attacks of chemical or biological weapons of mass destruction by reducing the chances of the pilots actually being shot down. Information Warfare has been around since the creation of the NSA. The first machine that deciphered code was created by United States scientists and was calls the Fish. However, the greatest advancement in our technology came when the United States stole the Enigma machine fr... ...Terrorism Introduction. < http://www.survivalguide.com/cyber_terrorism_introduction.htm> [2002, October 16]. Deutch, J. (25, June 1996). Foreign Information Warfare Programs and Capabilities. [2002, Sept12]. Ensor, D. Garrett, M. Smith M., & Williams, D. (February 20, 2001). FBI assesses 'grave' damage from latest spy scandal. < http://www.cnn.com/2001/US/02/20/fbi.spy.impact/> [2002, October 16]. Goldberg, I. (December 2, 2000). Glossary of Information Warfare Terms. < http://www.psycom.net/iwar.2.html> [2002, October 16]. Johnson, D. (2001). Computer Ethics. Prentice Hall, NJ. (November 2001) Cyber Protests Related to the War on Terrorism : The Current Threat. < http://www.nipc.gov/publications/nipcpub/cyberprotests1101.pdf > [2002 September 12].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.