Access over 20 million homework & study documents

N662 Cyberwarfare

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/4
Running head: CYBERWARFARE 1
The impact of cyberwarfare on the national security
Institution Affiliation
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
CYBERWARFARE 2
In the 21
st
century, the weapons of mass destruction have significantly changed. Today,
the attackers can deploy something as simple as an email to attack an individual or country. Liff,
(2012) outlines that the attackers are utilizing a modern mode of attack known as cyberwarfare.
According to Geers (2008), cyberwarfare is the use of technology to attack the computer and the
information networks of a given nation, and it can cause equal harm such as actual warfare.
Today, countries or terrorists are using strategies like hacking and viruses to attack a target
country’s computer system with the aim to cause death, damage, or destruction (Ball, 2011). In
the future, hackers will use computer systems to attack their enemy’s or other country's essential
infrastructures like computer systems, banks, pipelines, and others. With countries and terrorists
increasing their spies, hackers, and to digital weapons projects, cyberwarfare has become more
common, where they use this strategy to revenge or intensify their long-term tensions and
conflicts. The combination of lack of clear rules governing online conflict and an ongoing
cyberwarfare arms race signifies an escalation of the attacks in the future.
Indeed, cyberwarfare is a real threat to the United States national security, and it is an
issue that the government needs to dedicate its resources to address. Geers (2008), outlines that
then cyberwarfare varies in target and severity. Hackers can use this strategy to attack
infrastructures like banks, airports, or power grids, thus ending up paralyzing these strikes for a
prolonged time. The recent attack on the US oil and fuel pipeline signified how deadly cyber
warfare could be in national security. The cybercriminals used ransomware to attack the Top US
fuel pipeline operator Colonial Pipeline causing the shortage of gas in different states in
America. Cyberwarfare can present deadly impacts on the country’s national security as it can
cause economic turmoil, especially when vital infrastructures are attacked. The attackers use
botnets to launch distributed denial of service (DDOS) attacks in attacking critical services and

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Running head: CYBERWARFARE 1 The impact of cyberwarfare on the national security Institution Affiliation Date CYBERWARFARE 2 In the 21st century, the weapons of mass destruction have significantly changed. Today, the attackers can deploy something as simple as an email to attack an individual or country. Liff, (2012) outlines that the attackers are utilizing a modern mode of attack known as cyberwarfare. According to Geers (2008), cyberwarfare is the use of technology to attack the computer and the information networks of a given nation, and it can cause equal harm such as actual warfare. Today, countries or terrorists are using strategies like hacking and viruses to attack a target country’s computer system with the aim to cause death, damage, or destruction (Ball, 2011). In the future, hackers will use computer systems to attack their enemy’s or other country's essential infrastructures like computer systems, banks, pipelines, and others. With countries and terrorists increasing their spies, hackers, and to digital weapons projects, cyberwarfare has become more common, where they use this strategy to revenge or intensify their long-term tensions and conflicts. The combi ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Very useful material for studying!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents