Cyberwarfare: Difference between revisions
Appearance
Content deleted Content added
Line 14: | Line 14: | ||
*[http://news.zdnet.co.uk/internet/security/0,39020375,39119111,00.htm Cyber-warfare 'a reality in 12 months'] |
*[http://news.zdnet.co.uk/internet/security/0,39020375,39119111,00.htm Cyber-warfare 'a reality in 12 months'] |
||
*[http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1999/10/07/MN58558.DTL Russians Seem To Be Hacking Into Pentagon / Sensitive information taken -- but nothing top secret] |
*[http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1999/10/07/MN58558.DTL Russians Seem To Be Hacking Into Pentagon / Sensitive information taken -- but nothing top secret] |
||
*[http://www.senate.gov/~gov_affairs/030200_adams.htm Text of James Adams' testimony to the Committee on Governmental Affairs on the possibility of cyber-attacks] |
Revision as of 20:43, 12 May 2006
Cyber-warfare is the use of computers and the internet in conducting warfare in cyberspace. No actual acts of cyber-warfare are recorded, but it is a growing possiblity.
Types of attacks
- Web vandalism: Attacks on that deface webpages, or denial-of-service attacks. This is normally swiftly combated and of little harm.
- Propaganda: Political messages can be spread to anyone with access to the internet.
- Gathering data. Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world. See Titan Rain and Moonlight Maze.
- Equipment disruption: Military activities that use computers and satellites for co-ordination are at risk from this type of attack. Orders and communications can be intercepted or replaced, putting soldiers at risk.
- Attacking critical infrastructure: Power, water, fuel, communications, and transportation are all vulnerable to a cyber attack.