Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
This piece of information revealed that the malware program had infected resulted in heavy damage for the Iranian nuclear enrichment facilities. The program became the very first of its kind as there had never been any cyber attacks that lead to a computer program resulting in physical damage to mechanical systems on a large scale basis as was the desired attacked of the program. Additionally, the malware program also infected the local household and office computer systems throughout the country of Iran. This caused damage on a very large scale to the Iranian nation and its people.
Nobody has come out to claim the creation of the Stuxnet and neither the actual intentions of the attackers have surfaced. But the attack revealed that the attackers intended to either sabotage or espionage the nuclear enrichment process being conducted by the Iranians. The complexity and intricacy to become such a damaging malware clearly reveal that the attackers had to be quite a lot resourceful and had strong support. Nevertheless, Iranian government has not held back in blaming the specific group of countries for attacking the country and its nuclear enrichment program with the Stuxnet worm. After the widespread impact of the malware program attack, the angered officials of the Iranian government announced that the attack was a plot of the Western world who did not want Iran to continue with its nuclear activities by indulging into psychological form of attacks using the latest means of warfare, the cyber attacks.
The Iranian government did not take the attack lightly and decided to bring in counter measures to detect where the source of this malware attack was, and who was responsible it. Iran's response was quite unexpected to the entire world, but was a sensible one. The Iranian regime had decided to launch a cyber warfare militia within its ranks of the already existing national force, the Revolutionary Guard. The task of this cyber warfare militia would be to crackdown any potential threats to the country of Iran on the cyber battlefield. This minor force would be formed by enrolling highly competent computer and technology experts as the soldiers for the militia. This force was formed by the employing of over a million young recruits on the militia to help Iran with its mission on the cyber warfare front. In relation to the formation of such a militia, a former member of the Iran's Revolutionary Guard, Reza Kahlili said, "There are many true believers in Iran who are highly educated and very savvy with computers. Cyber warfare is cheap, effective and doesn't necessarily cause fatalities. It makes much more sense for not-so-wealthy nation states to build up cyber warfare capability rather than investing in missiles and warships." (Kellogg 2011). The overall aim of this force was to create an organization that was responsible for the protection of their country against any future cyber attacks after the Stuxnet program attack.
The Stuxnet malware program became a revolutionary step for the modern cyber warfare and was a huge leap for programming attacks towards forming a more intense means of cyber warfare. This form of warfare is relatively new and witnessed only a few attacks that have caused any trouble for the general public. But as the world becomes more and more relying on the advancement of technology in almost every field, the theme of such attacks can become more damaging and possibly catastrophic, just similar to any other mode of warfare. Although Stuxnet's uses were specific for the attack on the Iranian nuclear facilities, with further research and updates, such a malware program can prove to be a huge advancement for the stage of global cyber warfare, providing countries the means of lodging into a new form of warfare to claim supremacy.
Farwell, John P., and Rafal Rohozinski. "Stuxnet and the Future of Cyber War." Survival (Vol.53, No. 1), 2011: 23-40.
Kellogg, Amy. "Iran is Recruiting Hacker Warriors for its Cyber Army to Fight 'Enemies'." Fox News. March 14, 2011. http://www.foxnews.com/world/2011/03/14/iran-recruiting-hacker-warriors-cyber-army/.
Yong, William, and Robert F. Worth. "Bombing Hit Atomic Experts in Iran Streets." The New York Times. November 29, 2010. http://www.nytimes.com/2010/11/30/world/middleeast/30tehran.html?_r=3&hp&.[continue]
"Cyber Warfare Over The Ages" (2013, April 21) Retrieved December 8, 2016, from http://www.paperdue.com/essay/cyber-warfare-over-the-ages-100904
"Cyber Warfare Over The Ages" 21 April 2013. Web.8 December. 2016. <http://www.paperdue.com/essay/cyber-warfare-over-the-ages-100904>
"Cyber Warfare Over The Ages", 21 April 2013, Accessed.8 December. 2016, http://www.paperdue.com/essay/cyber-warfare-over-the-ages-100904
Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack
Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false
Estonia Cyber Attacks 2007 2007 Estonian Cyber-war This is the information age. In this age, the Internet has smoothened the progress of spectacular increases in global interconnectivity and communication. This form of globalization also yielded benefits for Estonia by improving the standard of living of its people. However, other than benefits, it has also ascended the availability of new weapons of confrontation for groups who have been seeking and opposing certain Estonian
Whereas adult obesity rates have always been present, they have never been so high. What is more worrisome is that youth is becoming increasingly obese. The American Heart & Stroke Association conducted a study, for instance, in which it found the following data to be true: "Among children ages 2 -- 19, about 1 in 3 are overweight and obese (BMI-for-age at or above the 85th percentile of the 2000
S. Department of Defense (DOD) uses over two million computers and more than ten thousand local area networks, most of which are linked to, and vulnerable to attack from, users of the larger Internet. (2008, p. 276) These increasing threats correspond to the growing reliance on information systems to manage the entire spectrum of modern commerce and energy resources, making the disruption of a single element in the integrated system a
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
However, she concludes that the effect of PMCs, as a whole, cannot be determined by this one example. Supply in the current PMC market has a tendency to self-perpetuate. As more PMCs enter the market, new threats are developed that the firms provide protection against. "Moreover, demand does not penalize firms that service 'illegitimate;' clients in general. Consequently, the number of actors who can wield control over the use