A Historical Review of Information Warfare, computer science homework help

User Generated

Znehp

Computer Science

Description

Redo_610Ass_3

Please check this work very carefully, A grade 0 was assigned to due plag..............

This is the file you have send me but it wasn't accepted by the instructor.

Please redo it using original work with 0 plag......

Subject was:

Find any historical example of information warfare, prior to the computer revolution of the 1990’s, and develop an executive PowerPoint (or similar) presentation on how the information was used to affect the outcome of a battle, a commander’s decision, the war, a treaty etc. Answer the who, what, where, when, why, and how on the topic you pick. For example how Prince Bismarck manipulated telegraphic traffic to bring about the Franco-Prussian War, or how the British used the Zimmerman telegram to maneuver the US into World War I. Your presentation should be 8 – 10 slides not to include title and reference slides.

This assignment is worth 50 points total, based on content, analytical thought applied, and proper use of formatting, spelling, and grammar. Submit your document as an attachement using the link above.

Unformatted Attachment Preview

Historical Review of Information Warfare Week_3 INFORMATION WARFARE Information is not a new component to conflict. The Information Age, however, has ushered in extraordinary improvements in collection, storage, analysis, and transmission of information. Information Warfare Definition Information Warfare: Any activity to deny, abuse, degenerate, or decimate the adversary's data and its capacities; ensuring ourselves against those activities; and misusing our own military data capacities. . Types of Information Warfare Direct Information Coordinate Information Warfare changes the enemy's data without including the mediating keen and expository capacities Indirect Information Roundabout Information Warfare changes the foe's data by making wonders that the foe should then watch and break down. . Information Warfare Background Information warfare has a proven history and not a new innovation or application For quite a long time, cryptography has been utilized to hide and uncover messages. The word figure is gotten from the seventh century Arabic word sifr, signifying "nothing." Information warfare examples Since the 1970s, remarkable enhancements in the specialized methods for gathering, putting away, breaking down, and transmitting data have added to code making and codebreaking and started the move toward an “Revolution in Military Affairs. USS Gearing, DD710 during WWII USS Gearing, DD710 in the late 1960s USS Gary, FFG 51 Military Affairs Technology Revolution From optical to electrical telecommunication, from telecommunication over radio to satellite connections, fighting in the course of the most recent two centuries has advanced exponentially. Not immediately times likewise called dead circumstances in specialized military language. He who knows a couple of moments past the point of no return is rebuffed by a threatening first strike. (Leyden, 2007) Broadcast communications advancements have the capacity in the regular citizen domain to change societies. Changing from a print-based culture to one incorporating radio, TV, phones, and the Internet has a significant impact. In like manner, the attitude of military issues should likewise adjust to amazing changes in the innovation of interchanges. Customary types of Information Warfare Customary types of Information Warfare 1. Mental Operations 2. Electronic Warfare 3. Physical Destruction 4. Safety efforts 5. Data Attack Psychological Ops Psychological operations utilized various information types and source to manipulate the enemies. “We can make certain that the worldwide combat zone of the 21st century will be over data - the spread or withholding of realities, the elucidation of occasions, the introduction or twisting of thoughts and belief systems, and the correspondence of messages and images deliberately arranged to incite a specific response, either cognizant or oblivious, from an intended interest group” (Fulghum, 2007). Electronic Warfare Electronic Warfare does not provide any accurate information to the enemies i.e. provide misleading information Any military activity including the utilization of electromagnetic vitality to decide, misuse, lessen, or avert unfriendly utilization of the electromagnetic range and the activity which holds inviting utilization of the electromagnetic range. The three divisions inside EW incorporate electronic countermeasures, electronic counter-countermeasures, and electronic fighting bolster measures. Military Trickery It is also a type of misleading the enemies Fruitful trickery makes foes infer and acknowledge wanted thanks of military capacities, aims, operations, or different exercises that summon outside activities that add to the originator's targets. Physical Damage It is achieved through a destructive power The methods for physical assault go from traditional bombs to electromagnetic heartbeat weapons. This is a standout amongst the most imperative territories where the United States might be helpless against assault.. (Fulghum, 2007). . Security Measures It is set up to learn about military adherence t guidance, understanding resources capability. It sets to measure rates of success in every operation (Fulghum, 2007). Modern Society Conflicts There will be an expansion of non-state performing artists taking an interest on the world phase of occasions. This makes any country worried with cyber-terroism consider a whole host of new alternatives with regards to dangers to national security. New Approach and Methods • Unbelievably intense and endlessly extending interchanges advancements have constrained us to consider the world as a littler situation. • Multinational companies and interchanges systems have likewise reduced the significance of national fringes. (Fulghum, 2007). Economic Approach • Westernized countries penetrate the worldwide interchanges markets, inquiries of social dominion raise the potential for different countries to challenge the infringing impact that the United States and comparative countries have on governmental issues, financial aspects, and correspondences. (Fulghum, 2007). Achieving Peace • Each of the four branches of the military and in addition knowledge offices are progressively perceiving the significance of data as an advantage and weapon. • Interchanges researchers and analysts ought to accept a part as members in the discourse and execution of Information Warfare hone.. References • Leyden, J. (4 October 2007). "Israel suspected of 'hacking' Syrian air defences". The Register. Retrieved 2007-10-05. • Fulghum, D. A. (3 October 2007). "Why Syria's Air Defenses Failed to Detect Israelis". Aviation Week and Space Technology. Retrieved 2007-10-05. • Fulghum, D. A. (14 January 2007). "Technology Will Be Key to Iraq Buildup". Aviation Week and Space Technology. • DOCUMENT CALLED IO IN OEF AND IF -saved in your folder • "SOMS-B 2 MRBS Antenna System". Federal Business Opportunities. Retrieved 2012-04-18.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, i have composed a new Presentation. Your previous Tutor did a presentation that was abit too broad and out of the topic.

HISTORICAL REVIEW OF
INFORMATION WARFARE

PRESENTED BY:

INFORMATION WARFARE DEFINITION
Definition of Information Warfare:
The term information warfare refers to the use of
information in the battlespace. Communication is an

important ingredient for success in any battleground,
since the commander needs a way of communicating
with the other stakeholders in the aim of defeating the

opponent. For instance, communication is required
when updating the stakeholders on the status of the war.

CUSTOMARY TYPES OF
INFORMATION WARFARE
Common types of I...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags