McCurley-Shimer_Assignment #2

docx

School

American Military University *

*We aren’t endorsed by this school

Course

440

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

8

Uploaded by DeanHippopotamus5891

Report
Assignment 2 1 Assignment 2 Alexus McCurley-Shimer American Military University INTL 440: Cyber Warfare Professor Binversie December 14, 2023
Assignment 2 2 “Cyber warfare is usually defined as a cyber attack or series of attacks that target a country . ” (Imperva . 2021) Cyber warfare has become a very common thing that can happen in this day and age of technology . With the advancement of technology there is a greater threat that has begun to other countries . Cyber warfare has become a great threat to society as well as for the government . In this paper we will go over the different types of cyber warfare, the future of cyber warfare, and the defensive tactics that can be taken for cyber warfare . Espionage is a type of attack that is conducted to be able to gain the secrets of an organization . This is when countries are monitoring other countries without the knowledge of the other countries to gain the secrets . This type of cyber warfare can be conducted by using botnets or spear phishing attacks . These types of attacks are able to have the attacker gain access to sensitive computer systems . This id done before the attackers are able to gain the sensitive information . Sabotage seems to be similar to espionage with a different type of tactic . This typically effects government organizations if they have sensitive information . Which the government organization has to determine if the information is sensitive as well if there is a risk if the information is compromised . Some sabotage tactics can happen from something as simple as an upset or careless employee, or an employee that has an affiliation to one of the attacking countries . The idea behind sabotage is to either take information, destroy the information, or use that information as leverage to gain more information .
Assignment 2 3 Denial of Service (DoS) attacks is a common type of attack that is used to be able to gain the information that is desired as well as testing to see what a security system or network can take . This occurs when a user accesses a website and is flooded with fake requests which makes the website have to handle these types of requests . These types of attacks are able to disrupt important operations and the systems as well as blocking access to sensitive websites . This can affect many different type of individuals whether civilian, military and security personnel, or any research bodies . Electrical power grid is something that many of us do not think would be a large target and yet to create the most chaos it is the perfect target . This is when an attacker is able to gain access to a power companies’ system and be able to disrupt the power grid . This has been a very common threat as well as it will affect a lot of people . Reflecting on the amount of electricity that is used throughout the United States losing that access to electricity will affect a lot amount of people . Not only can this disrupt everyday life at individuals’ homes but it can affect the communications that individuals have as well . Propaganda attacks are not something that you would think that would affect cyber warfare but it is a large participant . These types of attacks are attempting to be able to control the minds as well as the thought of individuals that are in the fighting country or are fighting for the targeted country . Propaganda is utilized to be able to expose the embarrassing truths . As well as to tell lies to make people stop trusting the country they are in and then side with the enemy of the country .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assignment 2 4 Economic disruption can affect many people . This has become a very common attack since the use of the operating systems . The attackers are able to target a network of an economic establishment such as a bank . These attacks are aimed to take people’s money or be able to make sure that the people are unable to access the funds . These attacks are also targeted to stock markets and payment systems . The seventh type of cyber warfare attack is the surprise attack . A surprise attack that happened that many people have remembered are Pearl Harbor as well as the attacks on 9/11 . The desire that these types of attacks it create as much chaos as possible . As well as to have these attacks happen when there is no expectation of this happening . These attacks are able to ensure that the defenses of the attacked are weak . As well as these attacks are able to be a mix between physical attacks as well as cyber attacks which are stated as hybrid warfare . “Cyberspace forces will play an increasingly vital role in the future fight by operating and defending Department of Defense’s (DOD) networks, data, and weapons systems while simultaneously attacking the same of the nation’s adversaries . ” (Fogarty . 2023) There has been a synchronization as well as integrating the kinetic and non-kinetic capabilities that other forces partnering with the U . S . This unity of forces is able to create a concurrent effect that will be across the many domains providing a faster as well as effectiveness against the enemy . Another aspect of the future is the integrated approach that will be able to prevent threats across the air, sea, space, land, and the cyber domains . This tactic is able to maintain information as well as the decisions . The desire to have a better control with this tactic is important . There is also a better
Assignment 2 5 chance of providing the control that is needed . Other strategies will be the integration of data, artificial intelligence, and the software . These are able to create a faster type of delivery when it comes to warfighting . “Cyberwarfare is not a future threat-it’s a clear and present danger . ” (Haughey . 2023) In 2022 there was a large movement with cyber warfare and the advancements that have occurred since then . The year 2022 was the determining factor of how the cyber warfare attacks will happen . This is when the political superpowers started to go to the media outlets and make predictions of a cyber cold war . Looking at what has happened since then with Ukraine and the Russian war we can see these have become the now . “…Russian attacks on Ukraine began more quietly, when over 70 Ukrainian websites were disabled weeks prior…” (Miller . 2022) This shows that before there was any physical attack there was a cyber warfare attack that was conducted . With this being said it will can be a common tactic when it comes to the start of any war . This is where the hybrid warfare comes in . Starting with the cyber attack to overwhelm and distract the target and then conducting the physical attack . Then comes the ethical side of cyber warfare . “The ethical principles that govern kinetic military operations-those enshrined in Just War Theory-are often difficult to apply to cyber warfare . ” (UNSW . 2023) When it comes to any type of war ethics typically gets thrown out the window . As well as each individual thought of what is ethical is different . What one person deems unethical another person can deem it as ethical . An ethical issue is the development and deployment of autonomous weapons . This is due to the technology that is used with these
Assignment 2 6 weapons and not every country has these types of technologies . Not only is the act of ethics with any type of warfare an issue there is the ones that are affected by these wars . “Defending forward includes understanding what adversaries are trying to do and what the threat looks like . ” (Vergun, 2020) By understanding what an attacker is trying to do there is an understanding of how to combat the attack . Though not all cyber attacks will need a cyber response . This all depends on the type of attack and what the best strategy will be to combat that threat . Most attacks are based on what the effects are cause compared to the means of how the attack was achieved . Such as with the electrical power grid . Attacking the power grid will affect a lot of people and that is what the means of the attack really is about and not exactly about how the attack was conducted . “If you read a lot of cybersecurity news, you know that cyber threats are becoming more common and more destructive . ” (CyberPolicy . 2023) The digital arms race has been seen as the aspect of security for cyber warfare with no slow down in sight . As what has been stated above and seen throughout the years there is an increase in cyber warfare threats . With the advancement of technology there has become a higher chance of the threats to occur . Though the tactics will be changing as technology continues to develop and improve . One of the ways that the future of cyber warfare will change is the unity of the nations to ensure that there is a higher chance of security . Though there already is a unity between nations when it comes to different types of attacks such as physical there will be an increase with the cyber aspect .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assignment 2 7 In conclusion, cyber warfare is not something that will just go away . There will always be a threat that will occur . Now there is an understanding of what types of cyber warfare threats are out there . As well as how these threats can be conducted and the aspect of the future that has now become the present . Many years ago, there was a thought that the cyber warfare attacks will not be as advanced as they are now . Yet as technology has advanced so has the threats .
Assignment 2 8 References: “Cyber War: Ethics & Policy: UNSW Canberra.” UNSW Sites. Accessed December 14, 2023. https://www.unsw.edu.au/canberra/our-research/research-excellence/cyber-research/cyber- war-ethics-policy. Fogarty, Stephen. “The Future of Warfighting: Cyber Enabling Convergence.” Booz Allen, March 21, 2023. https://www.boozallen.com/insights/cyber/the-future-of-warfighting- cyber-enabling-convergence.html. Haughey, C.J. “Cyber Warfare: What to Expect in 2022.” Security Intelligence, December 8, 2023. https://securityintelligence.com/articles/cyber-warfare-what-to-expect-2022/. Miller, Laura. “The Future of Cyberwar.” MSU Denver RED, March 30, 2022. https://red.msudenver.edu/2022/the-future-of-cyberwar/. Vergun, David. “DOD Works to Increase Cybersecurity for U.S., Allies.” U.S. Department of Defense, September 17, 2020. https://www.defense.gov/News/News- Stories/Article/Article/2351916/dod-works-to-increase-cybersecurity-for-us- allies/fbclid/dod-works-to-increase-cybersecurity-for-us-allies/. “What Is Cyber Warfare: Types, Examples & Mitigation: Imperva.” Learning Center, November 9, 2021. https://www.imperva.com/learn/application-security/cyber-warfare/. “What’s next for Cyber Warfare?” CyberPolicy. Accessed December 14, 2023. https://www.cyberpolicy.com/cybersecurity-education/whats-next-for-cyber-warfare.