Order For This Paper, Written Essays or Similar Assignment Help Services.

Fill the details/instructions form and checkout for your essay - pro writers; top college graduates only in less than 5 mins, NO AI—Plagiarism-free!.

Posted: April 9th, 2024

Cyber Warfare INTL440 Week 1 – Department of Defense Strategy for Operating in Cyberspace

Cyber Warfare
INTL440
Week 1

Terminology
• Cyberspace
• Network
• Internet
• Cyber
Warfare
Threats
• Governments
• Hacktivists
• Criminals
• Terrorists

What is cyberspace?
According to The National Military Strategy for Cyberspace
Operations, (1) cyberspace is:
“A domain characterized by the use of electronics and the
electromagnetic spectrum to store, modify, and exchange data via networked
systems and associated physical infrastructures.”
From the Department of Defense Strategy for Operating in
Cyberspace:
“The security and effective operation of U.S. critical infrastructure – including
energy, banking and finance, transportation, communication, and the Defense
Industrial Base – rely on cyberspace, industrial control systems, and
information technology that may be vulnerable to disruption or exploitation.”
(2)

Cyberspace is about networks
What is a network?
A network consists
of two or more computers connected so that they can exchange data and share
resources.
A Peer to Peer Network:The simplest network consists of two
computers directly connected so that they can share files.

The Local Area Network (LAN)
The next step is a LAN, familiar in most offices and many
homes.
LANs allow sharing of both files and devices. They may span several offices or a building.


Connecting networks

Wide Area Networks
(WAN)

www.agatefroce.com
In this example, the cloud symbol is used to represent the
routers and paths in cyberspace between the two networks.

WANs permit sharing of resources across a wide geographic
area. Examples include financial
networks, power grid controls, and military networks sharing a common tactical
picture.

WAN communications may traverse any combination of private
links, leased lines, or public Internet connections.

The beginning
The Internet
Sponsored by DOD’s

Advanced Research Projects Agency (ARPA), it began in 1969
as an effort to develop a redundant and survivable strategic communications
architecture. Its reliable network
protocol became known as TCP/IP (forTransmission Control Protocol/Internet
Protocol).

Originally known as
Arpanet, this network began as a connection between main frame computers at
several large universities. Over the
next decade, more universities and several government labs were added. Developed in an atmosphere of open
collegiality, the original version included
few security features.

Today

What is cyber warfare?
Researcher Dr. Ivan Goldberg defines Cyber Warfare and
Information Warfare together as
“…the offensive
and defensive use of information and
information systems to deny, exploit, corrupt, or destroy, an adversary’s information,
information-based processes,
information systems, and computer-based networks while protecting one’s own. Such actions are
designed to achieve advantages over
military or business adversaries.” (3)
http://www.defense.gov/news/d20110714cyber.pdf

Richard Clarke’s definition
in his book Cyber War (HarperCollins 2010):
“actions by a nation-state
to penetrate another nation’s computers or networks for the
purposes of causing damage or
disruption.”

The Threat
From The Joint Operating Environment 2010 (4)
“ …With very little investment, and cloaked in a veil of
anonymity, our adversaries will inevitably attempt to harm our national
interests. Cyberspace will become a main front in both irregular and
traditional conflicts. Enemies in cyberspace will include both states and
non-states and will range from the unsophisticated amateur to highly trained
professional hackers. …”

Who are the attackers?
Hackers – Strictly speaking, a hacker is anyone who attempts
unauthorized access to a computer or network.
A. White
Hat. A term used to describe
professionals hired to identify security flaws via authorized network
penetration tests.
B. Black
Hat. Refers to hackers attempting
unauthorized access, generally with malicious intent. Sometimes called
“crackers” to distinguish them from white hat hackers, they generally fall into one of the following
groups:
(1) Those
engaged in espionage, sabotage or other crimes.
(2) Those
attempting to make a political statement.
(3) Youthful
experimenters hoping to gain bragging rights.

Annual conferences like DEFCON discuss security issues and
identified weaknesses. They attract a wide audience ranging from industry and
government professionals to those whose interests may be questionable…

Young hackers playing with attack scripts are sometimes
derisively referred to as “script kiddies”.

Who employs hackers?
• Governments
• Hacktivists
• Criminals
• Terrorists

Governments: Several governments have publicly announced
cyber war units as
Hacktivists
Hacker + Activist = Hacktivist
Hacktivists use cyber attacks to convey a political or
social message. Common tactics include
web site defacement (left) and denial of service attacks in which simultaneous
requests from thousands of PCs block access to the site.

Criminals
Cyber criminals
run the gamut from youths running 419 scams out of Nigerian cyber cafes to
large criminal syndicates.
Organized cyber crime may be involved in:
• Fraud • Spamming
• Identity theft info for sale•
Gambling
• Identity
Theft • Bot nets for hire • Use of proxy servers allows
• Illicit
Web Sites • Deniability • Pornography

• What may
be state sponsored cyber attacks to be blamed on “cyber hooligans”

Terrorists

Attacks
So far, there have been no confirmed terrorist cyber attacks. However, a successful attack against a key
financial or infrastructure network could gain them significant publicity for
their cause at relatively little cost.

References:
1. JCS (Dec. 2006) “The National Military Strategy for
Cyberspace Operations”Available in pdf format from
http://www.carlisle.army.mil/DIME/documents/National%20Military%20Strategy%20for%20Cyberspace%20Operations.pdf

2. DoD (Jul. 2011) “Department of Defense Strategy for
Operating in Cyberspace”Available in pdf format from http://www.defense.gov/news/d20110714cyber.pdf

3. Goldberg (2010) “Glossary of Information Warfare
Terms”from http://www.psycom.net/iwar.2.html

4. Joint Forces Command (2010) “The Joint Operating
Environment 2010”Available in pdf format from http://www.jfcom.mil/newslink/storyarchive/2010/JOE_2010_o.pdf

5. “China Confirms Existence of Elite Cyber-Warfare
Outfit ‘The Blue Army,'” Fox News, May 26, 2011,
http://www.foxnews.com/scitech/2011/05/26/china-confirms-existence-blue-army-elite-cyber-warfare-outfit/

Order | Check Discount

Tags: , , , , ,

Find The Best Writers, Tutors & Assignment Experts!

2025 Special Offer! Get 20-25% Off On ALL Your Orders!

Why trust us?

Every student wants the best grades and that’s our Focus

Graduate Level Writers

Our team consists of outstanding writers who have specialized knowledge in specific subject areas and professionals experienced in academic research writing. They hold at least a graduate degree—230 with Masters and MSN qualifications, experts carefully selected and trained to ensure the best quality of our work. .

College Students Prices

We’re dedicated to bringing on board top-notch writers who can provide excellent work at prices that make sense for college students; affordable papers. Our goal? To give you the best bang for your buck without ever compromising on the quality of our essay writing services—or the content of your paper. #Don’t forget to use the DISCOUNT code in the COUPONS section of the order form before you pay!.

100% Human Written

The service guarantees that our final work is 100% original, rearched and human written expertly. We are committed to delivering plagiarism-free and AI-free work to each university/college student's 'write my paper' request. To uphold this promise, we check every draft for any possible instances of duplication, wrong citation, grammar errors and artificiality before we send it to you. Thus, you can always rely on us to write genuine and high-standard content for your essay assignments.

How it works

When you trust to place an order with Homework Ace Tutors, here is what happens:

Complete the Order Form

Please fill out our order form completely, providing as much detail as possible in all the required fields.

Assignment of Writer

We carefully review your order and assign it to a skilled writer with the specific expertise needed to handle it. The writer then creates your content entirely from scratch.

Order in Progress and Submission

You, along with the support team and your assigned writer, communicate directly throughout the process. Once the final draft is delivered, you can either approve it or request edits, paraphrasing, or a complete revision.

Giving us Feedback(review our essay service)

Ultimately, we value your feedback on how your experience went. You can also explore testimonials from other clients. Additionally, you have the option to recommend or select your preferred writer for any future orders.

Write My Essay For Me