Cyber War - 46:36 - Jun 1, 2006 discovery channel

Views: 15
Get Embed Code
There are several methods of attack in cyber warfare, this list is ranked in order of mildest to most severe [2]* "Cyber espionage': Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary of classified information) from individuals, competitors, rivals, groups, governments and enemies also for military, political, or economic advantage using illegal exploitation methods on internet, networks, software and or computers.* Web vandalism: Attacks that deface web pages, or denial-of-service attacks. This is normally swiftly combated and of little harm.* Propaganda: Political messages can be spread through or to anyone with access to the internet.* Gathering data: Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world. See Titan Rain and Moonlight Maze.* Distributed Denial-of-Service Attacks: Large numbers of computers controlled by one person launch a DoS attack against systems* Equipment disruption: Military activities that use computers and satellites for coordination are at risk from this type of attack. Orders and communications can be intercepted or replaced, putting soldiers at risk.* Attacking critical infrastructure: Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.* Compromised Counterfeit Hardware: Common hardware used in computers and networks that have malicious software hidden inside the software, firmware or even the microprocessors.

You need to be a member of Peacepink3 to add comments!

Join Peacepink3

Votes: 0
E-mail me when people leave their comments –