Page 65 - MILITARY-STUDIES-2
P. 65

Module - V
                                                                                                Cyber Warfare
              Warfare and
                Its Types        political or ideological extremist groups, hacktivists, and transnational criminal
                                 organizations. Some governments have made it an integral part of their overall military
                                 strategy, with some having invested heavily in cyber warfare capabilities.
                                 Cyber warfare is essentially a formalized version of penetration testing in which a
                                 government entity has established it as a warfighting capability. This capability uses the
                                 same set of penetration testing methodologies but applies them in a strategical way to
                       Note
                                 (a)   Prevent cyber-attacks against critical infrastructure
                                 (b)   Reduce national vulnerability to cyber attacks

                                 (c)   Minimize damage and recovery time from cyber attacks

                                 Offensive operations are also part of these national level strategies for officially declared
                                 wars as well as non contact war even when nations are not at war.
                                 Cyber Crime: A crime committed where the use or knowledge of computer is
                                 required to cause damage is Cyber Crime.
                                 Cyber Security: Cyber Security  is the evolution of policies and procedures to protect
                                 own information and information system.


                                  15.2 Types of Threat


                                 (a)   Cyber attacks: These are the intrusions where immediate damage or disruption
                                       caused are the main concern.
                                 (b)   Cyber Espionage: Cyber espionage is an act of intrusion which can provide
                                       the information needed . Traditional espionage is not an act of war, nor is cyber-
                                       espionage, and both are generally assumed to be ongoing between major powers.
                                       Despite this assumption, some incidents can cause serious tensions between
                                       nations and are often described as "attacks". For example

                                       (i)  Massive spying by the US on many countries, revealed by Edward
                                            Snowden.

                                       (ii)  After the NSA's spying on Germany's Chancellor Angela Merkel was
                                            revealed, the Chancellor compared the NSA with the Stasi (the official
                                            state security service of the German Democratic Republic).

                                       (iii)  The NSA recording nearly every cell phone conversation in the Bahamas,
                                            without the Bahamian government's permission, and similar programs in
                                            Kenya, the Philippines, Mexico and Afghanistan.
                                       (iv)  The "Titan Rain" probes  American defence contractors computer systems
                                            since 2003.
                                       (v)  The Office of Personnel Management data breach, in the US, widely
                                            attributed to China.


           58
           58
                                                                                      MILITARY STUDIES
   60   61   62   63   64   65   66   67   68   69   70