Page 5 - Lesson 15.xps
P. 5
Module -V
Cyber Warfare
Warfare and
activities, raise funds, spread propaganda, shut down critical national Its Types
infrastructures (such as energy, transportation or government operations) for the
purpose of forcing or intimidating a government or civil population.
(e) Foreign Intelligence Services: Foreign intelligence surveillance who use cyber
tools as part of their espionage tradecraft for acquiring sensitive information
about their adversary.
Note
15.3.4 Cyber Weapons
So far, you have understood what is cybercrime. But just as in all other crimes, there
are certain weapons used to commit these crimes. Let us find out what they are.
(a) Viruses and Worms: It is very commonly heard or noticed term in our day to
day computer life. These are the codes that execute within host program.
Whenever anything goes wrong we don't hesitate to blame viruses for the matter.
But something more complex like Worms (programs executed independently)
are also used.
(b) Trojan Horses: These are programs that work in disguise. Trojan Horses are
unauthenticated program contained in a legitimate program which performs
functions unknown to the user. Likely places for Trojan Horses to attack are:-
(i) OS.
(ii) Software downloaded from internet.
(c) Logic /Knowledge Bombs: These are hidden functions that becomes active
when triggered.
(d) Knobots: Also known as Knowledge Robots, they keep the processed data
and keep storing the knowledge.
(e) Adware: Adware is a programme that can be embedded within useful
programmes. These popup while using the computer they are embedded in and
have a lot of nuisance value.
(f) Spyware: Spyware is also a programme that is embedded with a useful
programme. However, they are generally programmed to collect information
such as user's web surfing habit /preferences and e-mail. The illegal part of the
activity is that all the activity occurs without the users consent.
Intext Questions 15.2
1. Fill in the blanks.
(a) Knowledge Robots are known as_______________.
(b) Computer user who intends to gain unauthorised access to a computer
61
MILITARY STUDIES 61