Sign In
Not register? Register Now!
Essay Available:
Pages:
4 pages/≈1100 words
Sources:
5 Sources
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Software Problems Related To Cyber Warfare (Essay Sample)

Instructions:

The paper will research the software problems attributable to Cyber Warfare. This paper must address the emerging Cyber Security concerns related to software problems. What kind of ramifications do you foresee if our software security is not the highest standards

source..
Content:


Software Problems Related To Cyber Warfare
Name
Institutional Affiliation
Software Problems Related To Cyber Warfare
Introduction
Cyber warfare is a broad topic with the research community increasingly gaining interest in numerous subtopics within field of cyber warfare or cyber war. Comparing existing definitions of cyber warfare, Robinson, Jones and Janicke (2015) have found that the terms cyber-attacks, cyber warfare and cyber war are not well differentiated and thus the terms can be applied interchangeably. Cyber-attack is simply an act in the cyber space, which would potentially cause detriment. While cyber warfare refers to the application of cyber-attacks with war-like intentions, the definition of cyber war extends to a situation when a country declares war and advances to apply only cyber warfare strategies to execute its mission without involving air strikes or other means. Cyber warfare threats in the United States and globally are increasing in scope and the impact and scale of such threats are overwhelming (Andress & Winterfeld, 2011). As experts from the military, academia, and civilians grapple with the puzzle of making the cyberspace secure, hackers are now focusing more on software security vulnerabilities that might provide a weak target for executing their attacks. Examples of cyber warfare in recent past include the Kosovo War in 1999, Russia-Georgia War in 2008, Operation Cast Lead in 2008, the Tulip Revolution II of 2009, and The Jasmine Revolution of 2011 (Carr, 2011). This paper uncovers emerging cybersecurity concerns attributed to software issues as well as looks at the possible ramifications that might result if software security is not of the highest standards.
Computer network warfare has evolved at unprecedented rates. As a response to secure military computer networks, Cyber Command works globally to protect the cyberspace, which is outside the conventional battlefields such as land, air, sea, and space. It is becoming necessary to establish a computer warfare command-and control systems at major military bases to secure air defence weapons and network and software-intensive systems (Reich et al., 2010). Cyber-attacks employ software as critical tools running over an interconnected network to disrupt or damage military information systems or command. According to Reich et al. (2010), software as weapons represent important opportunities as part of future warfare and advanced militaries have the capacity to launch cyber-attacks not only against networks and data, but also against critical infrastructure that rely on such networks. An example of software problems that have raised cyber security concerns is TOR, also known as The Onion Routing. The TOR Project is an example of anonymity online software tool that enables attackers to remain anonymous while connected to the Internet (Reich et al., 2010). Although the original intent of creating the software was to protect the privacy of individuals speaking out against repressive regimes or protecting people reporting cases of child abuse, hackers are increasingly exploiting the anonymity to hide their online activities while committing crimes.
Anonymity tools like TOR are a cyber-security concern since the software is capable of tracing its target program and its functionality without the kn

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to war essays:

  • Term Paper On Working Women During World War I
    Description: The first section talks about women in general in which various aspects of their service are covered in a reasonable manner followed by country-specific sections....
    12 pages/≈3300 words | 6 Sources | Chicago | History | Term Paper |
  • Causation Of Global Warming In Australia
    Description: The earth’s hotness is shifting due to global warming, and in Australia, it is becoming a cause for concern due to the burning of fossil fuels, animal farming, and deforestation....
    2 pages/≈550 words | 4 Sources | APA | Social Sciences | Essay |
  • The Illusion of Safety/Safety of Illusion: Trigger Warnings
    Description: Identify the argument of Roxane Gay’s “The Illusion of Safety/The Safety of Illusion.” How does the style and structure of her essay work towards developing her argument?...
    4 pages/≈1100 words | 1 Source | MLA | Literature & Language | Essay |
Need a Plagiarism Free Essay?
Submit your instructions!