Wednesday, January 30, 2019
Background Essay -- essays papers
play downInformation Warfare is defined as, the offensive and defensive purpose of teaching and training systems to deny, exploit, corrupt, or destroy, an adversarys information, information-based processes, information systems, and computer-based meshs while defend ones own. Such actions are designed to achieve advantages all over military or business adversaries (Goldberg). Cyber-Terrorism is defined as, the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives in the worldwide meshwork of computer and/or computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange (Doyle). The two definitions are non formal and are not the exact definitions of either two terms. The originator for this is that there is no exact definition that constitutes information warfare or cyber-terrorism. From these d efinitions above, we can conclude that a cyber-terrorist will use information warfare techniques to reach his goal. For example, if the United States understands the system that operates the scud missiles of Iraq, then done Information Warfare (hacking / cracking) they could make the scud missiles useless. This protects the Untied States pilots on attacks of chemic or biological weapons of mass destruction by reducing the chances of the pilots genuinely being shot down.Information Warfare has been around since the creation of the NSA. The scratch machine that deciphered code was created by United States scientists and was calls the Fish. However, the greatest packaging in our technology came when the United States stole the Enigma machine fr... ...Terrorism Introduction.< http//www.survivalguide.com/cyber_terrorism_introduction.htm 2002, October 16.Deutch, J. (25, June 1996). foreign Information Warfare Programs and Capabilities. <http//www.cia.gov/cia/public_affairs/spee ches/archives/1996/dci_testimony_062596.html 2002, Sept12.Ensor, D. Garrett, M. Smith M., & Williams, D. (February 20, 2001). FBI assesses grave damage from latest shit scandal.< http//www.cnn.com/2001/US/02/20/fbi.spy.impact/ 2002, October 16.Goldberg, I. (December 2, 2000). Glossary of Information Warfare Terms. < http//www.psycom.net/iwar.2.html 2002, October 16.Johnson, D. (2001). Computer Ethics. apprentice Hall, NJ.(November 2001) Cyber Protests Related to the War on Terrorism The Current Threat. < http//www.nipc.gov/publications/nipcpub/cyberprotests1101.pdf 2002 September 12.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment