E-Warfare Essay

1968 Words8 Pages
Question
The 21st century has seen warfare adopt many new faces, among those the use of the Internet as a weapon. Explore an e-warfare incident and discuss its success or failure. In your answer detail how you as a network manager could protect your organisation against e-warfare.

Abstract
In the following essay I will define ‘E-warfare’ and outline types of attacks which are associated with it. I will identify an incident which has taken place and discuss whether the incident was successful or failed. I will then attempt to give a detailed explanation of how if I was an appointed network manager, that I would protect an organization against e-warfare. I use examples when necessary to provide a realistic appreciation of the use of
…show more content…
Governments, businesses and individuals are using the internet for day-to-day activities and any disruption can have devastating effects. This dependence on electronic information exchange, whilst having its positive side, also has a big negative with security issues. The ease at which a website or news portal can be attacked and taken down by almost any person with an internet connection is of huge concern. The various methods of electronic attacks which can take shape bring forward the subject of electronic warfare and how it impacts society. Various attacks can take place, although the distributed denial-of-service attack is the one of focus due to its eafse and its common appearance on the internet.
A denial of service (DoS) attack is an intentional action designed to prevent legitimate users from making use of a computer service (Quinn 2006). A DoS attack may involve unauthorized access to one or more computer systems. The aim of a DoS attack is to disrupt a computer servers ability to respond to its clients. Interfering with the normal use of computer service’s can result in significant harm. For example a company selling products and services over the internet may lose business or a military organization may find its communications disrupted. In a distributed denial of service (DDoS) attack, the attacker gains access to thousands of computers. The
Get Access