This website uses cookies to ensure you have the best experience. Learn more

The Threat Of Cyber War Essay

2178 words - 9 pages

CNA’S AMMUNITION

There are several different forms of cyber weapons, all of which can be used for either an attack or espionage. There are principally five common practices. The first of three attacks that will be examined is spoofing.
SPOOFING

Spoofing is an attack that falsifies information in order to disguise and misconstrue an identity to appear as someone else, or as an application. An example, per say, would be an instance that took place in Arizona at the works of Daniel David Rigmaiden. Rigmaiden used what is known as an air card to spoof a nearby cell tower. Rigmaiden was indeed caught by the FBI, but this case was a major event for the intelligence community, due to the judges’ skeptical preceding’s in order to catch a major criminal.5
MAN-IN-THE-MIDDLE

The second attack is termed man-in-the-middle (MITM). MITM is when an attacker makes independent connections with targets and relays communication that deceives the victims to think that they are in authentic contact with one another, when in reality communication is being altered. A major benefactor of this would be the NSA. In order to apparently snoop on an increase in traffic over Secure Sockets Layer (SSL), the NSA performed a man-in-the-middle attack by impersonating Google security certificates. This NSA operation is asserted to be operation “Flying Pig.” SSL involves an infamous anonymity browser referred to as Tor. The motivation behind this operation was in order to collect information about specific SSL encryption certificates that would other wise be unattainable.5
BUFFER OVERFLOW

The Final CNA to examine is buffer overflow. This is when an attacker inputs a larger than expected piece of information, which causes an application to malfunction in such a way that the attacker can remotely execute nearly any desired function. Depending on the extent of a computers vulnerability, this attack proves to be the most malicious. This CNA can evoke what is known as denial of security (DOS). This function can illegitimately obtain permissions not granted by the system administrator, and in some cases, the computer can be fully controlled by the attacker. The FBI exploited Eric Eoin Marques, a US-born 28-year-old, using buffer overflow methods. Marques is accused of creating and engineering Freedom Hosting, the hidden website indicated to be responsible for facilitating child pornography on 550 servers throughout Europe. One FBI agent declared that Marques is undoubtedly 'the largest facilitator of child porn on the planet".5
VULNERABILTIES & POTENTIAL HARM

The damage of a full-fledged cyber attack would be devastating, the destruction would be unparalleled to any other tragedy that has occurred America. Since technology is responsible for providing America with vital entities and resources, an unadulterated cyber attack would nearly fail the American economy; this is what is known as critical systems failure. Weapons of mass destruction and cyber attacks present imminent...

Find Another Essay On THE THREAT OF CYBER WAR

The Threat of China Essay

925 words - 4 pages The Threat of China With the end of the Cold War emerged two superpowers: The United States and the Soviet Union. The international system then was considered bipolar, a system where power is distributed in which two states have the majority of military, economic, and cultural influence both internationally and regionally. In this case, spheres of influence developed, meaning Western and democratic states fell under the influence of U.S

It's War in the Cyber-World Essay

1887 words - 8 pages has constituted for many years is under the threat to disappear and become under the control of government laws that decrease its freedom and undermine its functions of innovation and global communication. These protests mark the two opponents of this war: individuals along with small and new industries, against copyright owners from lawyers to corporations and authorities. French philosopher Michel Foucault has argued that there is a direct

THE WAR OF 1812 CEMETERY: THE LETHAL THREAT TO FIELD SOLDIERS

1734 words - 7 pages interned at a cemetery located nearby along Aero Road. The cemetery is now simply known as the War of 1812 Cemetery. In examining the causes of death of the soldiers buried at the War of 1812 Cemetery, it is evident that the greatest threat to American forces during this campaign was not the British bayonet, musket, or field artillery piece; it was simply living in the camp itself. Infirmities most Americans today would view as non-fatal

the threat of nuclear proliferation

1253 words - 5 pages One of the foremost growing concerns in the modern globalized world is the increasing rate of nuclear proliferation. Coupled with the burgeoning number of nuclear devices is the threat of a terrorist possibly obtaining a weapon of such magnitude. While one could argue that the rising number of states with nuclear capability is a disturbing prospect, particularly as many pursue such capabilities without the approval of the “traditional” nuclear

The threat of biological warefare

2359 words - 9 pages weapons. Biological warfare is the use of disease to harm or kill an adversary's military forces, population, food sources, and livestock (www.calpoly.edu). Biological weapons have slowly evolved into a cheap and deadly way of exterminating human beings. The threat of bioterrorism to every country in the world has been increasing. As can be seen from the above: biological weapons are extremely dangerous and the threat of using them in war and

The Threat of Anne Hutchinson

1231 words - 5 pages The Threat of Anne Hutchinson Questions: What had Anne Hutchinson done? Why was Anne Hutchinson such a threat to the Massachusetts Bay colony? How was Anne Hutchinson's trial an ordeal for her and how was it an ordeal for the community? Anne Hutchinson, for centuries now, has been seen as a woman who paved the way for religious freedom. She was a great leader in the cause for religious toleration in America and the advancement of

The Dangers of Cyber-Terrorism

1529 words - 6 pages May 23, 2000 http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html Freeh, Louis J. “Cyber Crime” Speech. Washington DC: March 28, 2000 Goldman, David. "Government Hackers: The Cyber Cold War Is Raging".2011. CNNMoney. Retrieved July 31, 2011. . Nakashima, Ellen. (2010). "FBI Director Warns of 'rapidly Expanding' Cyberterrorism Threat” Washingtonpost.com Retrieved

Australia's Involvement in Vietnam War and the Communist Threat

1323 words - 5 pages influences in the Indonesian government gave rise to a sense of threat and communist aggression close to Australian territory, so Australia pulled out of the dispute against who should own the territory seized.For many Australians who had lived through World War 2, there was greater fear because they could see the parallels between the imminent threats of invasion through communism with the threat that the Japanese had produced 20 years earlier. The

The Threat of the Haqqani Network

2267 words - 10 pages government to help ensure that the Taliban take part in political processes. Getting joint support from surrounding Afghan regions and keeping constant pressure on the network is the best route of action in combating the organization. One thing that is for certain is if Pakistani intelligence services continue to back the Haqqani Network, Haqqani will “become the most significant long-term strategic threat to stability in Afghanistan” (Dressler, 2007). The United States has spent years in Afghanistan and throughout the Middle East and it is starting to look like we may never figure out how the barbarous game we call war is played.

The Growing Threat of Computer Crime

3335 words - 13 pages hackers began to use their skills to break into private computer systems and steal money, or interfere with the system's operations, the word acquired its current negative meaning. With the growing use of computers and the increase in computer crimes, early detection, deterring computer crimes, and new laws regulating and punishing these computer crimes are necessary. Without it, chaos will be the end result. The Growing Threat of Computer

The Constant Threat of Nuclear Weapons

1191 words - 5 pages Introduction Never in history has man had to worry about his existence or even the existence of humans because someone half a world away possessed the capability to end all life on earth. The threat to the human race is at risk each day in a world with nuclear weapons. There are several military revolutions throughout history, but the one that stimulated the greatest change ever in military warfare, is by far, nuclear weapons. They have proven

Similar Essays

Cyber Bullying: The Latest Threat To Hawaii's Youth

1225 words - 5 pages sent to peers using various social networks. The content of these messages and comments threaten, harass, impersonate and/or mock the victim (Cyber). This type of behind-the-computer bullying is called cyber bullying. Cyber bullying effects up to 50% of Hawaii's youth (Mendoza). Cyber bullying correlates directly to a drop in youth school attendance and grades, and increased suicide rates (Bullying FAQ). Victims of cyber bullying are 2.5 times more

State And Non State Actors That Pose The Greatest Cyber Threat To The United States

2253 words - 10 pages 3. IDENTIFY THE STATE AND NON-STATE ACTORS THAT POSE THE GREATEST CYBER THREAT TO THE UNITED STATES External global threats are on the rise. Cyber-attacks against the U.S. government are notably targeted for intrusions focusing on exfiltration information some of which are attributed to the Chinese government military (Kirk, 2013). Stolen information by China may be valuable for defense and technology, U.S. policy makers in China, and military

The Threat Of Accidental Nuclear War

886 words - 4 pages The threat of nuclear war puts enough stress on people that anaccidental nuclear war could be the result. With more and more of thesuperpowers defences being controlled by complex computers, the chanceof a malfunction increases as well. Add this to normal human error andgovernmental mistakes and you have a recipe for disaster. For this paper Iwill be describing examples and systems of the United States, as Canadahas no nuclear weapons, and the

The Threat Of Nuclear War Since The Cold War

3002 words - 12 pages The Threat of Nuclear War Since the Cold War I partly agree and disagree with the above statement. Nuclear war was at the height of taking place in the cold war and whilst it has subsided a little since the end it has not yet completely gone. Nuclear threat is different now then it was in the Twentieth Century, to prove my views I will talk about the cold war with reference to nuclear threat and what that means today