Thursday, March 14, 2019

Background Essay -- essays papers

telescopeInformation Warfare is defined as, the offensive and defensive theatrical role of data and selective information systems to deny, exploit, corrupt, or destroy, an adversarys information, information-based processes, information systems, and computer-based vanes while protect ones own. Such actions are designed to achieve advantages oer military or business adversaries (Goldberg). Cyber-Terrorism is defined as, the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives in the worldwide engagement of computer and/or computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange (Doyle). The two definitions are non formal and are not the exact definitions of either two terms. The terra firma for this is that there is no exact definition that constitutes information warfare or cyber-terrorism. From these definitions above, we can conclude that a cyber-terrorist will use information warfare techniques to reach his goal. For example, if the United States understands the system that operates the scud missiles of Iraq, then finished Information Warfare (hacking / cracking) they could make the scud missiles useless. This protects the Untied States pilots on attacks of chemical substance or biological weapons of mass destruction by reducing the chances of the pilots real being shot down.Information Warfare has been around since the creation of the NSA. The freshman machine that deciphered code was created by United States scientists and was calls the Fish. However, the greatest procession in our technology came when the United States stole the Enigma machine fr... ...Terrorism Introduction. http//www.survivalguide.com/cyber_terrorism_introduction.htm 2002, October 16.Deutch, J. (25, June 1996). impertinent Information Warfare Programs and Capabilities. 2002, Sept12.Enso r, D. Garrett, M. Smith M., & Williams, D. (February 20, 2001). FBI assesses grave damage from latest spy scandal. http//www.cnn.com/2001/US/02/20/fbi.spy.impact/ 2002, October 16.Goldberg, I. (December 2, 2000). Glossary of Information Warfare Terms. http//www.psycom.net/iwar.2.html 2002, October 16.Johnson, D. (2001). Computer Ethics. Prentice Hall, NJ.(November 2001) Cyber Protests link up to the War on Terrorism The Current Threat. http//www.nipc.gov/publications/nipcpub/cyberprotests1101.pdf 2002 September 12.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.