The Pros And Cons Of Cyber Warfare

1759 Words4 Pages

Cyber Warfare is definitely the future, like any other advancement in technology; where there is potential to harm and pacify our enemies, we will exploit it. Cyber warfare or cyber weapons are no different from any other advancements. Like the boat, airplane, and nuclear energy before it computers will and have been used as a weapon, a tool from which nations can conduct war against their enemies, joining rank with forms warfare we are already accustomed to. What makes cyber warfare different from these established forms of warfare is its capabilities and clandestinely.
What is cyber warfare? Cyber warfare is the infiltration of a nation’s computers or networks by another nation or organization with the intention of espionage or causing damage …show more content…

Cyber physical systems are the computers and networks that monitor, interact, and control some physical systems. In modern industrial nations, these systems are commonplace controlling our electrical grid, telecommunication, healthcare, water supply, transportation, manufacturing, and financial institutions. These systems will continue to become more integrated and our society will continue to be more and more dependent on them, this dependency on cyber physical system is what makes them and countries such as the United States a target for …show more content…

USCYBERCOM unifies the command of the cyberspace efforts and units of the United States military. The United States Department of Defense also has outlined the principles that form its cyber defense strategy, building and maintaining ready forces and capabilities to conduct cyberspace operations, defend the DoD information network, secure DoD data, and mitigate risks to DoD missions. Be prepared to defend the U.S. homeland and U.S. vital interests from disruptive or destructive cyberattacks of significant consequence. Build and maintain viable cyber options and plan to use those options to control conflict escalation and to shape the conflict environments at all stages. Build and maintain robust international alliances and partnerships to deter shared threats and increase international security and stability. The five pillars of cyber security, confidentiality, integrity, availability, non-repudiation, and authentication. Protecting information from disclosure to unauthorized individuals, systems or entities, Protect information, systems, and services from unauthorized modification or destruction, Timely, reliable access to data and information services by authorized users, the ability to correlate a recorded action with its originating individual or entity, and the ability to verify the identity of an individual or entity

More about The Pros And Cons Of Cyber Warfare

Open Document