Page 4 - Lesson 15.xps
P. 4
Module - V
Cyber Warfare
Warfare and
Its Types of internet usage; this has made our cyber space vulnerable to various crimes.
(b) Advancement in the field of electronics and technology has made common the
use of sophisticated computer tools not only for us but also for our adversaries.
(c) There is a tendency where victims of cyber crimes hesitate to own upto attacks.
This may be to prevent spread of rumours or damage to their reputations eg.
banks etc.
Note
(d) We are dramatically becoming more and more dependent on ecommerce and
networked based solutions to optimise our resources; this in turn has made us
vulnerable to cybercrime.
15.3.2 Types of Cyber Crime
In todays world there are as many cyber crimes as man's fertile and imaginative brain
can think of Cybercrimes can broadly be categorised as:
(a) Fraud and Forgery: This is primarily evident in the field of commerce and
economy.
(b) Damage to or Modification of Computer Data or Programme: This can
be for private sector, public sector or for defence establish, such as ATC &
Radar system.
(c) Unauthorised Access to Computer System and Surveillance: This is
commonly seen in commercial websites, e.g., Phishing, spywares and data
spoofing.
(d) Unauthorised Reproduction of Computer Programmes: These are the cases
of piracy.
15.3.3 Cyber Attacker
Cyber attacker aims at causing criminal threats or to cause national security threats.
Some cyber attackers are -
(a) Hacker: A computer user who intends to gain unauthorised access to a computer
system.
(b) Crackers: A cracker is a hacker with criminal intent, who maliciously sabotages
computers, steals information located on secure computers and cause disruption
to the networks for personal or political motives.
(c) Insider: A disgruntled insider (a current or former employee) of an organisation
is one of the principal sources of cybercrime. An insider's knowledge of the
organisation's network often allows them to gain unrestricted access to cause
damage to the information system or to steal sensitive data.
(d) Terrorist: Cyber attackers who use IT and internet to plan & execute their
60
60
MILITARY STUDIES