Page 65 - MILITARY-STUDIES-2
P. 65
Module - V
Cyber Warfare
Warfare and
Its Types political or ideological extremist groups, hacktivists, and transnational criminal
organizations. Some governments have made it an integral part of their overall military
strategy, with some having invested heavily in cyber warfare capabilities.
Cyber warfare is essentially a formalized version of penetration testing in which a
government entity has established it as a warfighting capability. This capability uses the
same set of penetration testing methodologies but applies them in a strategical way to
Note
(a) Prevent cyber-attacks against critical infrastructure
(b) Reduce national vulnerability to cyber attacks
(c) Minimize damage and recovery time from cyber attacks
Offensive operations are also part of these national level strategies for officially declared
wars as well as non contact war even when nations are not at war.
Cyber Crime: A crime committed where the use or knowledge of computer is
required to cause damage is Cyber Crime.
Cyber Security: Cyber Security is the evolution of policies and procedures to protect
own information and information system.
15.2 Types of Threat
(a) Cyber attacks: These are the intrusions where immediate damage or disruption
caused are the main concern.
(b) Cyber Espionage: Cyber espionage is an act of intrusion which can provide
the information needed . Traditional espionage is not an act of war, nor is cyber-
espionage, and both are generally assumed to be ongoing between major powers.
Despite this assumption, some incidents can cause serious tensions between
nations and are often described as "attacks". For example
(i) Massive spying by the US on many countries, revealed by Edward
Snowden.
(ii) After the NSA's spying on Germany's Chancellor Angela Merkel was
revealed, the Chancellor compared the NSA with the Stasi (the official
state security service of the German Democratic Republic).
(iii) The NSA recording nearly every cell phone conversation in the Bahamas,
without the Bahamian government's permission, and similar programs in
Kenya, the Philippines, Mexico and Afghanistan.
(iv) The "Titan Rain" probes American defence contractors computer systems
since 2003.
(v) The Office of Personnel Management data breach, in the US, widely
attributed to China.
58
58
MILITARY STUDIES