leeassignpt2

docx

School

American Military University *

*We aren’t endorsed by this school

Course

440

Subject

Electrical Engineering

Date

Jan 9, 2024

Type

docx

Pages

3

Uploaded by MasterAardvarkPerson481

Report
The game of war is a cruel one that pits humans against each other using various weapons and equipment. Men have been known to die due to these actions, and it will continue to evolve as we try to obtain the best possible technology during the course of the conflict. One of the new trends that will affect the game is the use of computers to assist in defeating enemies. Cyber warfare involves using advanced technology to take down our enemies. It goes beyond hacking into their computers and stealing their data. In addition to cyber warfare, there are also electronic warfare techniques that involve using various equipment and weapons. These include radio-jammers and sound cannons. These are used to control a portion of the radio spectrum, which is very similar to cyber warfare. Cyber warfare can be described as the use of various technological attacks such as hacking and viruses to disrupt the operations of another nation's computer systems. The goal of this type of warfare is to create as much damage as possible to the other party's networks in order to win the war. Cyber warfare has two main categories: the defense and the attack. Unlike on a regular battlefield, where tanks, guns, and spears are used, these types of battles are being waged online. An attacker can go after a target using a computer. The attack and the defense categories are the two main types of cyber warfare. Unlike traditional games, which are usually fought using tanks and guns, these types of battles are carried out online. An attacker can try to take over a target's computer through various means. They can also plant viruses or steal data or information. The defense team will likely use various strategies to prevent their adversary from accessing their network. An intrusion detection system (IDS) is usually designed to alert the system admin about a possible attack. Aside from viruses and phishing, other methods such as social engineering and trojan horses can also be used to try and steal data or control the computer system. In the event of an attack, the defense could take immediate action to prevent further damage. One of the most frightening aspects of cyber warfare is the possibility of a botnet being used to shut down a target. In reality, cyber-attacks can severely affect the operations of our society, such as water, communications, and power. A prolonged outage of these three services, which would require a few keystrokes, could completely destroy a nation. This type of warfare has the potential to provide ground units with an opportunity to carry out attacks. My wife has personally experienced various types of cyber attacks. She was notified by her bank that over 30 charges had been made on her debit card using cards from 12 different countries within 12 hours.
Since she was unable to travel to the locations where the charges were made, she claimed that they were not hers. One of the most common ways that attackers can steal money is by creating a fake project. This ensures that they can't be detected. Her computer also experienced an incredibly slow condition. Even though it was idle, its network traffic was still running at full speed. After some investigation, we were able to determine that her computer was constantly sending and receiving messages to China. We also discovered that some of the network switches that were being used at work were counterfeit. The insides of these devices were made in China. To ensure that no foreign entity is trying to steal our personal information, we should always remain vigilant. Our enemies will know that our online banking, social networking sites, or personal computers are not as secure as those of the government. Therefore, they will try to gather as much data as possible to make their own valuable products. Although cyber warfare is generally considered to be unethical, it can still result in the death or imprisonment of many people. It can also disable vital communication systems, such as radar and radio communication, which can result in the crash of an airplane. In addition to espionage, cyber warfare can also be used to steal information from a computer. The ethical nature of using technology to achieve a specific goal is a complex matter that depends on the method used. As we have learned, there are many ways to achieve a single objective. The US is constantly improving its capabilities in the field of cyber warfare. Most of this is due to the work of US Cyber Command, which is responsible for protecting the Department of Defense's networks. It also conducts other activities in cyberspace to enable actions in other domains. The US military is developing various teams that are designed to improve the country's cyber security. Different teams have been able to successfully attack the Islamic State and Iran's nuclear program using various techniques. The CIA and NSA are also developing significant tools for the US. One of these is the Stuxnet worm, which is a cyberweapon that can severely affect industrial control systems. The main goal of the Stuxnet attack was to prevent Iran from developing a nuclear weapon. Since it was the first accurate cyberweapon, it is expected that there will be more attacks like this. Artificial intelligence is also likely to be developed in the near future. Artificial intelligence could be used in the defense and attack of cyber warfare. Due to the potential of AI, cyber warfare will become more complex. For instance, attackers could be able to continuously try to penetrate a firewall. The field of cyber warfare is constantly evolving. It will continue to do so with the development of new technology, and the next generation of cyber weapons will be even better. In spite of its
frightening nature, cyber warfare is exciting and can potentially destroy or save lives. We can only do our best to keep ourselves safe online. Chen, T M, and S Abu-Nimeh. 2011. “Lessons from Stuxnet.” Computer (Long Beach, Calif.) 44 (4): 91–93. https://doi.org/10.1109/MC.2011.115 Cunningham, Chase, and Gregory J Touhill. Cyber Warfare - Truth, Tactics, and Strategies: Strategic Concepts and Truths to Help You and Your Organization Survive on the Battleground of Cyber Warfare . 1st ed. Birmingham: Packt Publishing, Limited, 2020. Paulo Shakarian, Jana Shakarian, and Andrew Ruef. 2013. “Conclusion and the Future of Cyber Warfare.” In Introduction to Cyber-Warfare , 241–43. Elsevier Inc. https://doi.org/10.1016/B978-0-12-407814-7.09976-0.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help