Free Essay

Cyber Warfare

In:

Submitted By grmavis
Words 2021
Pages 9
An attack against a computer system or network is how PC Magazine defines a cyber-attack. A Cyber-attack can take many forms, for many reasons and can be executed on a small or large scale. Most cyber-attacks are criminal in nature. These cybercrimes are usually motivated by profit. Recent examples include the cyber-attacks on Visa/MasterCard and attacks on Google’s network by China. The cyber-attacks on Visa and MasterCard were part of “operation payback”, and were carried out by various loose nit groups that organized using social networking sites. “Operation payback” was retaliation against Visa and MasterCard for refusing to continue to do business with the website WikiLeaks. WikiLeaks posted leaked classified U.S. diplomatic communications on their website for the world to see. The United States felt this was a criminal act and pressured Visa and MasterCard to stop processing transactions for WikiLeaks. In response hackers launch “operation payback” which used distributed denial-of-service (DDoS) attacks to crash Visa and MasterCard Servers. Google recently exited the Chinese market. According to the New York Times, “Google linked its decision to sophisticated cyber-attacks on its computer systems that it suspected originated in China and that were aimed, at least in part, at the Gmail user accounts of Chinese human rights activists. The attacks were directed at some 34 companies or entities, most of them in Silicon Valley, California, according to people with knowledge of Google’s investigation into the matter. The attackers may have succeeded in penetrating elaborate computer security systems and obtaining crucial corporate data and software source codes.” Both of these attacks could be dismissed as everyday criminal cyber-attacks but they could be considered something much more serious. By some the attack against Visa and MasterCard maybe considered cyber terrorism and the attack against Google considered cyber warfare. The circumstances of the attack, politics, and the parties involved often determine what category an attack falls in. This paper will focus on cyber-attacks that the United States Government deems to be cyber terrorism or cyber warfare. We will explore the past, present, and future of these attacks and our nation’s current known defensive and offensive cyber-attack capabilities.
Cyber Terrorism
Distinctions between crime and terrorism may be blurry when attempting to describe a computer network attack (CNA). It can be difficult to determine if non-state actors who initiate a CNA are secretly sponsored by a nation state because it can be hard to determine where a cyberattack originated because attackers may direct suspicion toward an innocent third party. Interactions between terrorist and criminals who use computer technology may further blur the distinction between cyberterrorsim and cybercrime. It will remain difficult to determine the responsible party for most of the annoying, yet increasingly sophisticated CNA’s that infect the internet. Some observers feel that the term “Cyberterrorism” is inappropriate, because it doesn’t produce terror like a bomb, chemical, biological, radiological, or nuclear explosive would. They view it more as an annoyance. Others feel that the effect of a widespread computer network attack would be unpredictable and might cause enough economic disruption, fear, and civilian deaths, to qualify as terrorism. According to the CRS report for Congress the two views that exist for defining the term cyberterrorism are effects-based, and intent-based. “Effects-based cyberterrorism exists when computer attacks result in effects that are disruptive enough to generate fear comparable to a traditional act of terrorism, even if done by criminals. Intent-based cyberterrorism exists when unlawful or politically motivated computer attacks are done to intimidate or coerce a government or people to further a political objective, or to cause grave harm or severe economic damage.” According to Richard Clarke, former Administration Counter Terrorism Advisor and National Security Advisor, “if terrorists were to launch a widespread cyberattack against the United States, the economy would be the intended target for disruption, while death and destruction might be considered collateral damage.” Cyberattacks have not caused widespread panic because these attacks have not caused death and destruction, which is why many feel Terrorist don’t focus more effort on cyberattacks. Security experts warn that a Cyberterrorist attack would be most effective and attractive to terrorist organizations if used in conjunction with a conventional bomb, or other chemical, biological, radiological, or nuclear explosive (CBRN) attack. A disruption to 911 call centers simultaneous with the detonating of CBRN or explosive device would amplify the casualties and create more terror then a conventional terrorist attack alone. Terrorist organizations often state their goal is to bring down the U.S. government and they like publicity because it helps them recruit. The Media has reported extensively on the vulnerability of the U.S. information infrastructure and the potential harm that a cyberterrorist attack could cause. Terrorists may feel that even a marginally successful cyberattack against the United States would get extensive publicity. A large-scale cyberattack that affected one sector could have disruptive, unpredictable, and devastating effects on other sectors, and possibly long-lasting effects to the economy do to interdependencies among infrastructure sectors. Although cyberattacks don’t cause death and blood shed they can still garner publicity, cause significant damage to the American economy, and cause widespread panic.
After the Terrorist attacks on September 11, 2001 public concerns about the threat of a cyberattack from terrorist groups has been high even though security experts aren’t convinced that such an attack could be launched by terrorists against U.S. civilian critical infrastructure and doubt such an attack could seriously disrupt the U.S. economy. CRS report to Congress stated that “simulated cyberattacks, conducted by the U.S. Naval War College in 2002, indicated that attempts to cripple the U.S. telecommunications infrastructure would be unsuccessful because system redundancy would prevent damage from becoming too widespread. Many observers suggest that evidence from natural disasters shows that many of the critical infrastructure systems, including banking, power, water, and air traffic control, would likely recover rapidly from a possible cyberattack. To date, there has been no published report of a coordinated cyberattack launched against the critical infrastructure by a terrorist or terrorist group.” Dennis McGrath of the Institute of Security Technology Studies at Dartmouth College reportedly observed that, “We hear less and less about a digital Pearl Harbor. Cyberterrorism is not at the top of the list of discussions.”
The CRS report to Congress states that “In May 2005, the CIA reportedly conducted a classified war game, dubbed “Silent Horizon,” to practice defending against a simulated widespread cyberattack directed against the United States. The national security simulation was considered significant because many U.S. counterterrorism experts feel that far-reaching effects from a cyberattack are highly unlikely.” However, it is prudent to develop and test countermeasures even for unlikely events because if the event were to occur it could be devastating if we don’t have a plan to mitigate its affect.
CYBER WARFARE
Cyber warfare has been defined by government security expert Richard A. Clarke, in his book Cyber War May 2010, as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption." The Economist describes cyber warfare as "the fifth domain of warfare," and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare which has become just as critical to military operations as land, sea, air, and space." Cyber Warfare may include defacing websites, distributed denial of service attacks, distributing propaganda, and gathering classified data over the Internet, however "there is no clear, internationally agreed upon definition of what would constitute a cyber-war. In fact, there is considerable confusion," said a report released at the Munich Security Conference by think tank The EastWest Institute. Its paper, titled Working Towards Rules for Governing Cyber Conflict, says that "the current ambiguity [about what constitutes cyber conflict] is impeding policy development and clouding the application of existing Convention requirements" and perhaps the idea of peace and war is too simple in the digital age when the world could find itself in a third, "other than war" mode.”
Just a few years ago the Central Intelligence Agency only mentioned Russia and China as possible cyber threats. Recently, declassified U.S. Navy documents “indicate that more than 20 countries have various kinds of information operations directed against the United States. The CIA testified more recently that adversaries are incorporating cyber warfare as a new part of their military doctrine. Russia, China, India, and Cuba as countries have acknowledged preparing for cyber warfare and are rapidly developing their capabilities. North Korea, Libya, Iran, Iraq, and Syria reportedly have some capability, and France, Japan, and Germany are active in this field.” These Nations see that cyber warfare provides many relatively anonymous, non-lethal options that can be utilized with relatively low risk of escalation to more direct forms of conflict. “It’s a way for others to wage an asymmetrical conflict against the United States. The likelihood of getting caught, let alone incurring U.S. military might, may seem low compared to the possible benefits. The appeal of cyber warfare to the United States could grow out of the larger U.S. trend over the past twenty years to minimize conflict casualties and maximize technological advantages while pursuing increasingly activist foreign and defense policy agendas.”
The U.S. Cyber Consequences Unit has recently issued a report documenting how Russia supplemented its conventional war against Georgia with a sustained, well-integrated, and pre-planned information warfare campaign against Georgia’s Internet structure. According to the report, from August 7, 2008 to August 16, 2008 Russian citizens launched an offensive that crippled dozens of Georgian websites. At first the Internet pages of the country’s main government institutions and new media were attacked so they could not inform the Georgian public and the international community of the Russian attack. Next other government and media sites as well as Georgian business, education, and financial institutions fell under attack. The Russian cyberattacks degraded Georgia’s national response to the Russian military assault.

The Russian’s developed a detailed campaign plan against the Georgian sites well before the conflict. They deployed specially designed software to attack them. Some of the software was created in March 2006 but saved for use until the August 2008 campaign. “The attackers also rapidly registered new domain names and established new Internet sites, further indicating they had already analyzed the target, written attack scripts, and perhaps even rehearsed the information warfare campaign in advance.” The Defense Department’s report on the Chinese military cyber attack capabilities released online August 16, 2009 reports that during 2009 cyber attacks around the world originated from China. These attacks targeted all U.S. defense and security agencies, NASA, large U.S. corporations, and even the United States power grid. The report states, "it remains unclear if these intrusions were conducted by, or with the endorsement of, the [People's Liberation Army] or other elements of the [People's Republic of China] government.” Chinese military doctrine seeks to establish "electromagnetic dominance" early during conflicts. Chinese military theorists use the term "integrated network electronic warfare" to describe operations conducted with "electronic warfare, computer network operations, and kinetic strikes to disrupt battlefield information systems that support an adversary's war fighting and power projection capabilities”. The Chinese military has units that develop viruses and protect domestic networks. “Some of those units are housed within the Chinese paramilitary militia, and that creates a link between civilian information technology professionals and the military network operators”, the report states. “The Chinese and U.S. militaries differ significantly in their approaches to the same operational requirements, including the Chinese approach to computer network exploitation that harvests huge volumes of data and an emphasis on offensive and defensive electronic warfare in recent years”. It is widely believed the Chinese military is conducting cyber espionage to steal U.S. military technology and identify weakness in the United States cyber info structure that they can exploit in the advent of a conflict.

Similar Documents

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. Skeptics...

Words: 3494 - Pages: 14

Free Essay

Living in the Age of Cyber Attacks and Cyber Warfare

...Living in the Age of Cyber Attacks and Cyber Warfare UMUC   If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment of the Die Hard series, Live Free or Die Hard. While those movies had a profound impact on the lives of the characters in the script, the audience probably thought it was merely fiction, not fully based on fact. In Live Free or Die Hard, John McClain (played by the indefatigable Bruce Willis) is attempting to stop a domestic cyber-terrorist who is acting out on a vendetta against the United States. The cyber-terrorist is successful in launching an online attack to overload and destroy a power grid that left much of America’s East Coast in darkness. When I first saw this movie, I was curious if an attack like that was really possible; however, most people around me just labeled the movie as “Hollywood’s overactive imagination”. With cyber attacks literally having the ability to affect lives in a nanosecond, it is vital that everyone understand what cyber attacks entail, the impact of these cyber attacks on a domestic and international scale, and knowing what to expect in the future while living in a world dominated by virtual experiences...

Words: 2352 - Pages: 10

Premium Essay

Cyber Warfare

...For over a decade, the concept of cyber warfare (computer warfare) has bee embedded i military doctrine. I 2000 the Defece white paper stated a ambition to repond to cyber warfare attacks. The 2007 Defence Update went further by calling for a focus on 'cyber warfare' to protect 'national networks and deny information'. The most recent Defence White Paper in 2009 also announced a 'major enhancement of Defence's cyber warfare capability...to maximise Australia's strategic capacity and reach in this field'. Given the rate of technological change and the number of system vulnerabilities discovered every day, the ADF's cyber capabilities will require dedicated and constant attention. This will be difficult to achieve and sustain if the ADF has not fully defined what it means by cyber warfare and how it will be used to serve Australia's interests. There are several definitions of cyber warfare, one of which was provided earlier this year by Defence Signals Directorate's (DSD) Deputy Director of Cyber and Information Security Mike Burgess in a speech to the Old Crows Association. He defined cyber warfare as 'an act...intended to degrade, destroy or deny computer accesses and systems' and added 'a true act of cyber warfare would have to be potentially lethal, instrumental and political'. Information stored on computers has become a key national asset and an element of our national power. Our ability to create information, store it, secure it, analyse it and harness it to make...

Words: 571 - Pages: 3

Premium Essay

Cyber Warfare

...Cyber warfare One of the first cyber-attacks was the Morris worm in the year 1988. It had affected the world cyber infrastructure. This worm utilized the weak areas of UNIX system Noun1. This worm has replicated adversely and slowed down the computers in all of the US and made them unusable. Cyber warfare has become a societal issue now. Though the roots of cyber warfare aimed at military areas primarily, it extended its effects to non-military areas too. The information infrastructure based companies have become victimized due to abundant availability of cheap cyber weapons over internet. This resulted in economic instability. Libicki classified information warfare into seven categories. They are intelligence based warfare, economic information warfare, hacker warfare, psychological warfare, electronic warfare, command and control warfare and cyber warfare. CSI and CERT information reflects that securities incidents are common, private firms are the major targets and much of these security incidents never receive public acknowledgement (Geeks et al., 2010). Several tools in the cyber warfare are developed based on Windows and are available free of cost. They require a minimal understanding about the technology frames. Many of the network organizations today are using well developed proxy servers, intrusion detection systems and firewalls. However these defensive systems are often configured improperly and carried known vulnerabilities. This weakness gave an opportunity even...

Words: 1988 - Pages: 8

Free Essay

Cyber Warfare

...Cyber warfare had been around ever since technology revolutionized itself. The US discovered infiltrations in the computer systems that could have made a lot of serious damages. This incident was named the Moonlight Maze, in which hackers were able to gather thousands of files from government agencies, The Pentagon, NASA, private universities, and research labs. These attacks were traced back to Russian internet addresses, but Russia denied any involvement with sponsoring the attacks. Another incident was when a hacker from the Philippines released the “Love Letter” virus around the world, 1000 files in NASA were damaged. The cost of the recovery ranged from $4 billion to $15 billion. Since the United States does not have a strategy for punishment in the cyber world, it remains vulnerable to hackers. Especially now that penetrating through a cyber security system had become more attainable. The FBI can be a huge asset into fighting cyber-crime but argued that they lack the necessary money, people and technology needed for cyber defense. Technology has been aggressively growing and cyber defense should be included in the national defense. Although the Pentagon has the resources for this type of defense, they remain hesitant into taking this role. Hackers with malicious intentions could get into the government system and send out fake commands resulting in chaos. In order to have an effective defense system in the cyber world, one must detect whoever is responsible...

Words: 292 - Pages: 2

Free Essay

Cyber Warfare

...September 9, 2012 A New Kind of Warfare Cybersecurity efforts in the United States have largely centered on defending computer networks against attacks by hackers, criminals and foreign governments, mainly China. Increasingly, however, the focus is on developing offensive capabilities, on figuring out how and when the United States might unleash its own malware to disrupt an adversary’s networks. That is potentially dangerous territory. Such malware is believed to have little deterrent value against criminals who use computers to steal money from banks or spies who pilfer industrial secrets. But faced with rising intrusions against computers that run America’s military systems and its essential infrastructure — its power grid, for instance, and its telecommunications networks — the military here (and elsewhere) sees disruptive software as an essential new tool of war. According to a study by the Center for Strategic and International Studies, the 15 countries with the biggest military budgets are all investing in offensive cyber capabilities. The latest step occurred last month when the United States sent out bids for technologies “to destroy, deny, degrade, disrupt, corrupt or usurp” an adversary’s attempt to use cyberspace for advantage. The Air Force asked for proposals to plan for and manage cyberwarfare, including the ability to launch superfast computer attacks and withstand retaliation. The United States, China, Russia, Britain and Israel began developing basic cyberattack...

Words: 492 - Pages: 2

Premium Essay

Authority on Cyber Warfare

...Authority on cyber warfare As we approach a new generation of warfare, we face new problems. Each generation before us has shown that there are continued advancements in warfare technology and with new technology there are different guidelines and terms of use in concordance with international law. The art of war has not changed since the beginning of time. Yes, there are new weapons, but the content for the most part is the same. Defeat your enemy, rendering them unable to strike back, or attack them where it hurts so that they do not want to proceed in the war. Through the evolution of war, the United States has conquered and been defeated. We may not always be law abiding, but we do what we deem necessary to defend the nation. In the process of defending, we learned that technological advancements are not always a positive thing, and technology can become too powerful for any one nation alone. The creation of the nuclear bomb was just that. Now that there is this terrifying new advancement in warfare technology, how do we stop it from getting into the hands of the wrong people? Executive summary, In this paper, I will discuss how the Stuxnet virus was used to stop the use and development of nuclear weaponry in Iran. The laws on proper use will also be discussed, exploring whether it was lawful to deploy the virus, with relation to the use of Traditional Military Activities and presidential findings. In addition...

Words: 6507 - Pages: 27

Premium Essay

Cyber Warfare Defence Report

...Cyber Warfare Defense Report for the Department of Defense (DoD) Chief Information Officer Introduction Despite being unmatched technologically in the battlefields, the low-cost, simple, complex and expensive asymmetric threats have proved to be significantly dangerous to the security of any country. While cyber-attacks are increasingly driven by automated processes, human beings still operate at human speeds. Today, cybercrime has developed and adversaries have gained sponsorship from governments, international organizations or individuals for their selfish interests. The most recent development in cyber-attacks are the advanced persistent threats. According to Vert, Gonen and Brown (2014), these kinds of attacks are known of being sophisticated and slow moving over a long period of time. Advanced persistent threats are computer network attacks in which unauthorized individuals gain access to network systems or its resources and continues to use the resources without detection for a long period of time. By definition, advanced persistent threats are highly sophisticated networked entity, typical of organized groups of attackers, which conduct hostile cyber-attacks against a computer system. As described in the scenario, the western interconnection power grid faces such a challenge. Adversaries intend to use malwares to gain access to the network system at the power grid. A. Analysis of the problem and Safeguards against the problem The lifecycle of an advanced persistent...

Words: 1247 - Pages: 5

Premium Essay

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat” means...

Words: 2041 - Pages: 9

Premium Essay

Corporate/Cyber Espionage

...Corporate/Cyber Espionage You’re the owner of ABC Candy Company and just about to debut your latest and greatest chocolate snack when your biggest rival over in Asia at XYZ Candies introduces its latest snack, that is almost a doppelganger to yours. Have you just been a victim to corporate cyber espionage or just extremely bad timing? In 2012 federal agencies alone reported 46,562 cyber security incidents compared to only 5,503 in 2006. In 6 years the number of incidents has multiplied over 8 times. (LUKAS, 2013) And what is the cost of this to companies in the U.S.? It is figured the price tag for this theft of information is at least 250 Billion dollars each year. This is significantly higher than what businesses pay each year, in federal corporate income taxes. (LUKAS, 2013) Meanwhile, McAfee provides an estimate encompassing global remediation costs to total a staggering $1 trillion per annum. (Paganini, 2013) Cyber corporate espionage attacks and threatens corporate America, government programs and individuals daily in new and unrelenting ways. But who is committing these attacks and why? How are individuals, groups, companies and even governments’ gaining access to supposed secure information? And how are you and corporate America going to detect and remove these threats from your daily lives? Let’s first start with just the basic definition of just what is corporate cyber espionage Cyber espionage is defined as the intentional use of computers or digital communications...

Words: 2686 - Pages: 11

Free Essay

Cyber Espionage - China and the United States

...Cyber Espionage Topics in Global Strategy Mike Dresser MGT 536 March 11, 2013 Cyber espionage is quickly becoming one of the most feared tactics around the world, but most recently, the computer spy game between China and the United States has been elevated to new levels. Just within the last few days, The New York Times broke a story pin pointing Coca Cola as one of the main targets of a Chinese sponsored cyber attack. Many believe this was largely due to discussions that Coca Cola had with China Huiyuan Juice Company regarding a potential acquisition. If it had gone through, this would have been the largest acquisition of a Chinese company by a foreign corporation. However, due to an elaborate Chinese cyber spy operation, they attempted to hack into Coke’s files to find information about Coca Cola’s negotiating strategy, and the deal was ultimately terminated because of deceptive practices. This is only the tip of the iceberg as cyber spy attacks are becoming more and more prevalent across the globe with no signs of slowing down. Mandiant, a cyber security company, also made front page news this past week when they published a full detailed report that traced a series of cyber attacks on a variety of U.S. companies, as well as many of our government agencies, such as the Department of Defense, NASA, and the Department of Commerce. Mandiant specifically identified a Shanghai based operation known...

Words: 774 - Pages: 4

Free Essay

Cyber Security: Cyber Terrorism

...Introduction Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks on the information systems of organizations and governments in order to unlawfully access information or distort the meaning of such data. The intention of cyber attacks has led to the classification of these attacks into particular classes. For example, we have cyber bullying and cyber terrorism. Under cyber bullying, the attackers use technology to abuse and intimidate their targets. Cyber bullying has been common through the presence of the social media where an individual will use pseudo-accounts to publish half truths about others with a bid to embarrass them. On the other hand, cyber terrorism involves the use of technology to access vital government sites in order to cause harm and fear in the society through terrorism activities. Brunst (2010) indicates that cyber terrorist activities...

Words: 1810 - Pages: 8

Free Essay

International Security

...International Security: Cyber Warfare – notes 10/3/12 * Review * Drones * What is Cyber Warfare? * Cyberspace: Interconnected network of information systems * Cyber warfare: using cyber capabilities to disrupt information in computers of another state * Inexpensive, just need to create unique computer code * Types * Denial of Service (DoS) * Goal: shut down network * Method: flood networkd with so many extra requests it overloads * Variant: Distributed (DDoS) attack from many infected bots * “carpet bomb in cyberspace” * Variant: Permanent (PDoS) * Damagers hardware * Malicious Programs * Goal: Disrupt of gain control of target computer * Method: Open a back door for remote access * Types: * Virus: Attached to file, self-replicates * Worm: Self-replicates, travels unaided * Trojan Horse: Apparently harmless program with code inside to gain system control * Logic bomb: * Goal: Coordinate timing of an attack * Method: Watch for specific event or predetermined time to trigger malicious code * Digital Manipulation * Goal: misinform/deceive audience * Method: Digitally alter images/audio * Extent: Real-time video, voice morphing * Cyber Espionage * Definition: Using cyber capabilities to acquire information about another...

Words: 406 - Pages: 2

Premium Essay

Teens and Social Media

...are naturally anxious to meet new people and possibly make new friends and contacts. Online social media provide the perfect setting to do exactly that. Teenagers are able to interact with people from all over the world. This serves to not only increase their general knowledge but it enables this generation to be more tolerant of cultures and beliefs that differ from their own. New technology including smart phones with video and photo capabilities, iPad and other tablets, and portable Wi-Fi docs have made the Internet infinitely more assessable (Wolak, Mitchell & Finkelhor, 2006). Although technology has been associated with many positive effects, cyber bullying, sexting and slut shaming among teens are detrimental practices that have been encouraged by the advancement of technology owing to the obscurity that the cyber space provides. The first practice that this paper will focus on is bullying among teenagers, a form of intimidation that can take different forms and has been in existence since time immemorial. While the internet provides opportunities for self-affirmation...

Words: 1560 - Pages: 7

Free Essay

Information Technology

...with people being able to share ideas thus enhancing diversity (Thomas, 123-145). However, social media has negative effects as well. It is not possible to determine if a relationship developed over social media is meaningful. Many casual relationships have been nurtured through social media and in due course, some have been a source of misery to many people. Social media has been used by predators to advance negative actions to vulnerable people such as kids. Most of them have become victims of cyber-bullying and made to undergo terror experiences under the watch of their parents and peers. The consequence of cyber-bullying may be tragic and disappointing to the victim. Although social media has its positive benefits to the society, the negative effects are more aching to the target and therefore there is need for action. This is achievable by enhancing parental and institutional rules to control cyberspace and limit the negative effects associated with social media such as cyber bullying....

Words: 331 - Pages: 2