Difference between revisions of "Cyberwarfare"

From SI410
Jump to: navigation, search
Line 2: Line 2:
  
 
==Background Information==
 
==Background Information==
 +
Since it originated, cyberwarfare has been defined in many ways. Some of these definitions include:
 +
 +
"actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption"
 +
 +
"The fifth domain of warfare"
 +
 +
Cyberwarfare has transformed into a very common way to attack other nations in war time today. The U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare, which has become critical to military operations as land, sea, air, and space." In May 2010, the Pentagon set up its new U.S. Cyber Command, to defend American military networks and attack other countries' systems. Other nations are quickly following in the United States footsteps to set up national cyber security.
 +
 +
In 2009, President Obama warned that cyber intruders have probed the United States electrical grids.
 +
 +
==Methods==
 +
==Motivations==
 +
==Counterintelligence==
 +
==Reality==

Revision as of 18:25, 6 October 2011

Cyberwarfare refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare although this analogy is controversial for both its accuracy and its political motivation.

Background Information

Since it originated, cyberwarfare has been defined in many ways. Some of these definitions include:

"actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption"

"The fifth domain of warfare"

Cyberwarfare has transformed into a very common way to attack other nations in war time today. The U.S. Deputy Secretary of Defense, states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare, which has become critical to military operations as land, sea, air, and space." In May 2010, the Pentagon set up its new U.S. Cyber Command, to defend American military networks and attack other countries' systems. Other nations are quickly following in the United States footsteps to set up national cyber security.

In 2009, President Obama warned that cyber intruders have probed the United States electrical grids.

Methods

Motivations

Counterintelligence

Reality