Cyberwarfare
Appearance
Part of a series on |
War (outline) |
---|
Cyber-warfare is the use of computers and the Internet in conducting warfare in cyberspace.[1]
Types of attacks
There are several methods of attack in cyber-warfare, this list is ranked in order of mildest to most severe.[2]
- Web vandalism: Attacks that deface webpages, or denial-of-service attacks. This is normally swiftly combated and of little harm.
- Propaganda: Political messages can be spread through or to anyone with access to the internet.
- Gathering data. Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world. See Titan Rain and Moonlight Maze.
- Equipment disruption: Military activities that use computers and satellites for co-ordination are at risk from this type of attack. Orders and communications can be intercepted or replaced, putting soldiers at risk.
- Attacking critical infrastructure: Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.
Known attacks
- The United States advises they have come under attack from countries such as China and Russia. See Titan Rain and Moonlight Maze. [3]
Cyber counterintelligence
Cyber counterintelligence are measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions.[4]
More information
- Computer insecurity
- Electromagnetic pulse weapons, known as transient electromagnetic devices
- Electronic warfare
- ELINT
- Espionage
- High Energy Radio Frequency weapons (HERF)
- Information warfare
- SIGINT
- Unrestricted Warfare
References
External links
Wikibooks has a book on the topic of: The Information Age