computer security: INFORMATION WARFARE, programming homework help

User Generated

pbaprcgvqrn

Computer Science

Description

I've been been asked by professor to give a detailed 3-4 page paper on the current information warfare as it is in the world in relevance to psychological warfare

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

please check the documents and inform me if you need any edits. thank you i'll be here whenever you need me..thanks

CYBER WAR CASE STUDIES
Within popular culture, cyberwarfare is sensationalized. On television, with the tap of a button
and a few swift keystrokes, cyberwarriors can override the lockdown procedures of a military
base, or turn off a country’s power grid. In the real world, however, cyberwarfare requires
considerably more effort and organization. The manpower and time required to make a largescale virus serve as a limiting factor in cyberattacks. Here, we will investigate actual instances
of cyberwarfare and present a picture of what real-world cyberattackers are capable of, including
attacks designed by countries, coalitions of countries, sovereign third -party groups, and unknown
sources. In each of these attacks, there are strategies and tactics from the fourth generation of
warfare, refined for the technological advances of a new era.
South Ossetia War

On August 7th , 2008, the Russian government started a series of cyberattacks against South
Ossetia, an area in the nation of Georgia. The attacks continued until August 16th , and included
Distributed Denial of Service attacks and cybervandalism against various Georgian government
websites, including that of the Ministry of Foreign Affairs.
The Georgian VoIP phone system was also taken down for a period of time, and an antiGeorgian propaganda campaign accompanied the attacks.Georgia responded to the attacks by
calling in help from various nations. The Georgian sites had originally been routed through
servers in Russia and Turkey. Some of these servers were under the control of the Russian
Business Network hacker group, which was known to work with the Russian government in
launching cyberattacks. When the attacks started, Germany assisted the Georgians by rerouting
their sites through German servers run by Deutsche Telecom. The Georgians also rerouted
President Mikhail Saakashvili’s website through a server in Atlanta, Georgia, in the hope that
Russia would not dare attack a server in the United States.
In the fourth generation of warfare, entities focus on disrupting an enemy’s cultural and political
structures, aiming for an enemy’s gradual collapse due to multiple distinct, untraceable actions.
In South Ossetia, phone lines, banking sites, and sources of government news were shut down, in
actions meant to confuse and demoralize the population. The cyberattacks were used in
conjunction with Russia’s physical assault on a Georgian military base and the city of Senaki on
August 11th, and were meant to hinder Georgian efforts to reassure their population and deal
with the invasion.
The South Ossetia war demonstrated the benefits of international connections in cyberwarfare, as
smaller nations can choose to route their traffic through servers in Russia, China, or the United
States. This parallels the formation of spheres of influence during the Cold War, where the world

was divided into superpowers and their satellite nations. However, these connections are less
useful in cyberwarfare than in the Cold War, as cyberattacks are decentralized, and governments
can maintain plausible deniability about whether cyberattacks originated somewhere within their
sphere of influence. This makes retaliation against an agressor more difficult.
US Power Grid Hack

In April, 2009, the United States government reported that foreign-based cyberwarriors had
made multiple attempts to map and tamper with the United States power grid. A senior
intelligence official stated that both the Chinese and the Russians had made prior attempts to
map the power grid, and it was suggested that this attack was based in one of those two
countries. The attack was a simple hack, potentially meant to gather information about the power
grid as an important national infrastructure. It did not target any particular power company or
region of the grid, instead serving as a general probe into the East, West, and Texas grids. It may
also have involved the installation of malicious software, meant to disrupt the power grid in the
eve...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags