Page 3 - Lesson 15.xps
P. 3

Module -V
                Cyber Warfare
                                                                                                    Warfare and
               (c)   Cyber Sabotage: Computers and satellites that coordinate other activities are   Its Types
                     vulnerable components of a system and could lead to the disruption of equipment.
                     Compromise of military systems, such as command and control systems  could
                     lead to their interception or  malicious replacement. Power, water, fuel,
                     communications, and transportation infrastructure all may be vulnerable to
                     disruption. The civilian realm is also at risk, some potential targets include the
                                                                                                Note
                     electric power grid, trains, or the stock exchanges. Non-state actors can play as
                     large a part in the cyberwar space as state actors, which lead to dangerous,
                     sometimes disastrous, consequences. Small groups of highly skilled malware
                     developers are able to as effectively impact global politics and cyber warfare as
                     large governmental agencies.
               (d)   Cyber Propaganda: The aim of propaganda is to control information and
                     influence public opinion. Cyber propaganda is an effort to control information in
                     whatever form it takes, and influence public opinion. It is a form of psychological
                     warfare, except it uses social media, fake news websites and other digital means.
                     Propaganda is the deliberate, systematic attempt to shape perceptions, manipulate
                     cognitions, and direct behavior to achieve a response that furthers the desired
                     intent of the propagandist.

                     The internet is a phenomenal means of communication. People can get their
                     message across to a huge audience. Terrorist organizations use this medium to
                     effectively to brainwash people and also recreist potential members.


                       Intext Questions         15.1

               1.    Fill in the blanks.

                     (a)  ___________________ is the evolution of policies and procedures to
                          protect own information and information system.
                     (b)  The aim of ___________________is to control information and influence
                          public opinion.

               2.    Define cyber warfare.

               3.    What is meant by Cyber Crime and Cyber Security?
               4.    Mention the types of cyber threats.


                15.3  Cyber crime, Cyber Attackers and Cyber Weapons

               15.3.1. Emergence of Cyber Crime

               Let's take a look at the causes and how Cyber Crime emerges:-

               (a)   In this world of network centric environment there has been a phenomenal growth

                                                                                                                59
                MILITARY STUDIES                                                                                59
   1   2   3   4   5   6   7   8