Page 4 - Lesson 15.xps
P. 4

Module - V
                                                                                                Cyber Warfare
              Warfare and
                Its Types              of internet usage; this has made our cyber space vulnerable to various crimes.
                                 (b)   Advancement in the field of electronics and technology has made common the
                                       use of sophisticated computer tools not only for us but also for our adversaries.

                                 (c)   There is a tendency where victims of cyber crimes hesitate to own upto attacks.
                                       This may be to prevent spread of rumours or damage to their reputations eg.
                                       banks etc.
                       Note
                                 (d)   We are dramatically becoming more and more dependent on ecommerce and
                                       networked based solutions to optimise our resources; this in turn has made us
                                       vulnerable to cybercrime.

                                 15.3.2 Types of Cyber Crime

                                 In todays world there are as many cyber crimes as man's fertile and imaginative brain
                                 can think of Cybercrimes can broadly be categorised as:

                                 (a)   Fraud and Forgery: This is primarily evident in the field of commerce and
                                       economy.
                                 (b)   Damage to or Modification of Computer Data or Programme: This can
                                       be for private sector, public sector or for defence establish, such as ATC &
                                       Radar system.

                                 (c)   Unauthorised Access to Computer System and Surveillance: This is
                                       commonly seen in commercial websites, e.g., Phishing, spywares and data
                                       spoofing.
                                 (d)   Unauthorised Reproduction of Computer Programmes: These are the cases
                                       of piracy.


                                 15.3.3 Cyber Attacker
                                 Cyber attacker aims at causing criminal threats or to cause national security threats.
                                 Some cyber attackers are -

                                 (a)   Hacker: A computer user who intends to gain unauthorised access to a computer
                                       system.
                                 (b)   Crackers:  A cracker is a hacker with criminal intent, who maliciously sabotages
                                       computers, steals information located on secure computers and cause disruption
                                       to the networks for personal or political motives.

                                 (c)   Insider:  A disgruntled insider (a current or former employee) of an organisation
                                       is one of the principal sources of cybercrime. An insider's knowledge of the
                                       organisation's network often allows them to gain unrestricted access to cause
                                       damage to the information system or to steal sensitive data.
                                 (d)   Terrorist: Cyber attackers who use IT and internet to plan & execute their


           60
           60
                                                                                      MILITARY STUDIES
   1   2   3   4   5   6   7   8   9