Activity 10.1: Difference Between Cyber And Traditional Warfare
Cyber warfare is a new, emerging terminology and there is no well-established understanding of cyber warfare. It is difficult to differentiate between a cyber-attack and cyber warfare. Read Chapter 1 from the book Cyber warfare: a reference handbook (Springer 2015) to get a good understanding of cyber warfare. How is cyber warfare different from a conventional war?
Activity 10.2: Moral Cases Of Cyber Warfare
The moral cases discussed in the above section require some discussion and good understanding. Select one of the cases and share your thoughts in a 200-words.
Activity 10.3: Current State Of Cyber Warfare
Share your thoughts on the future of cyber warfare on the following questions:
How is the changing technological landscape changing the cyber security domain?
What tools and technologies will be used in future cyber-attacks?
Activity 10.4: Is Cyber Warfare Possible?
As discussed in this unit, cyber warfare is a new concept and it offers more questions than answers. Read Chapter 2 from the book Cyber warfare: a reference handbook (Springer 2015) on problems, controversies and solutions. Share your thoughts on the following questions:
Is cyber warfare ever possible?
If yes, what will be the scale of this war? Will it be limited between two states or global?
Does a cyber warfare lie in the military domain or in the civilian domain?
Activity 10.5 : Role Of Cyber Treaties
Cyber treaties are results of policy discussions among two or more states regarding cyber warfare and are usually informal. Share your thoughts on the following questions regarding cyber treaties:
What is the role of these policies in safeguarding from a cyber warfare?
Why are some countries reluctant to sign these treaties (For example, only 52 countries have signed the “Budapest convention” out of all countries in the world)?
Activity 10.6: Morality Of Cyber Warfare
We discussed 5 cases of cyber warfare morality in Section 10.4. Select two cases and share your understandings on these cases in the Discussion Board thread.
Activity 10.7: Professional And Ethical Values For An Ethical Hacker
We have studied the whole module and established that a “hacker” and an “ethical hacker” are applying the same knowledge, tools and techniques in their work. The difference is in the way both are working. A hacker identifies the vulnerabilities and exploits them, whereas, an “ethical hacker” identifies the same vulnerabilities to safeguard against them.
What professional and ethical values must an ethical hack observe to ensure that they are not committing a cyber-attack like a hacker?
Activity 9.1 : Security Risks In BOYD Mode
COPE and BYOD allow employees work from anywhere while using the resources from the enterprise network. Each has its own advantages and disadvantages. What are your thoughts on the security of your device in BYOD mode? What security risks are posed to personal and organisational data in a security breach, while using your own device for work purposes? Share your thoughts in a 300-words.
Activity 9.2: Security Threats To Mobile Devices
Section 9.2 discussed security threats for mobile devices. Select any 3 security threats discussed in this section and discuss the following:
Severity of each threat to the mobile device
Severity of each threat to your data stored in the mobile device
Two examples of each threat.
Activity 9.4:DoS Attack On A Mobile Device
DoS or DDoS is phenomena where an attacker intentionally makes the device or service unavailable for legitimate use. Write a statement with a real-time example for mobile devices that you think is used to perform such an attack.
Activity 9.5: Cyber Threats For Mobile Devices
Using web and search engines, identify top 6 cyber threats for mobile devices. You can consider threats by mobile operating systems like Android, iOS or Windows for mobile devices. Share your findings in the Discussion Board thread.
Cyber warfare, being a relatively new and evolving concept, presents distinct differences when compared to traditional warfare. Understanding these differences is crucial in comprehending the unique characteristics and implications of cyber warfare. In Chapter 1 of the book “Cyber Warfare: A Reference Handbook” (Springer 2015), a comprehensive exploration of cyber warfare sheds light on these disparities.
Unlike traditional warfare, which typically involves physical confrontations between armed forces, cyber warfare occurs in the realm of digital networks and information systems. Here are some key distinctions between cyber warfare and conventional war:
In traditional warfare, combat takes place on physical battlefields where military forces engage directly. In contrast, cyber warfare occurs in cyberspace, involving attacks on computer networks, infrastructure, and information systems. The battlefield is virtual, making it less visible and more difficult to attribute attacks to specific actors.
Conventional warfare relies on physical weapons such as firearms, tanks, and missiles. In cyber warfare, the primary weapons are sophisticated malware, viruses, hacking tools, and techniques to exploit vulnerabilities in computer systems. Cyber attackers aim to disrupt, damage, or gain unauthorized access to digital assets.
Determining the source of cyber attacks is inherently challenging due to the potential for anonymity and the use of sophisticated techniques to obfuscate origins. In traditional warfare, it is often easier to attribute attacks to specific entities based on their physical presence and identifiable military assets.
Traditional warfare typically involves geographically localized conflicts between nation-states or non-state actors. Cyber warfare, on the other hand, knows no physical boundaries, allowing attackers to launch operations from anywhere in the world. This global reach poses unique challenges for defense and international cooperation.
In traditional warfare, physical confrontations can result in significant collateral damage, destruction of infrastructure, and loss of life. While cyber attacks can also cause harm, their impact is predominantly focused on disrupting services, stealing data, or compromising security, often without direct physical harm to individuals.
Understanding the distinctions between cyber warfare and traditional warfare is vital for developing effective defense strategies, international norms, and legal frameworks to address the evolving nature of conflicts in the digital realm.
Our Advantages
Plagiarism Free Papers
All our papers are original and written from scratch. We will email you a plagiarism report alongside your completed paper once done.
Free Revisions
All papers are submitted ahead of time. We do this to allow you time to point out any area you would need revision on, and help you for free.
Title-page
A title page preceeds all your paper content. Here, you put all your personal information and this we give out for free.
Bibliography
Without a reference/bibliography page, any academic paper is incomplete and doesnt qualify for grading. We also offer this for free.
Originality & Security
At Homework Valley, we take confidentiality seriously and all your personal information is stored safely and do not share it with third parties for any reasons whatsoever. Our work is original and we send plagiarism reports alongside every paper.
24/7 Customer Support
Our agents are online 24/7. Feel free to contact us through email or talk to our live agents.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Our Services
We work around the clock to see best customer experience.
Pricing
Our prices are pocket friendly and you can do partial payments. When that is not enough, we have a free enquiry service.
Communication
Admission help & Client-Writer Contact
When you need to elaborate something further to your writer, we provide that button.
Deadlines
Paper Submission
We take deadlines seriously and our papers are submitted ahead of time. We are happy to assist you in case of any adjustments needed.
Reviews
Customer Feedback
Your feedback, good or bad is of great concern to us and we take it very seriously. We are, therefore, constantly adjusting our policies to ensure best customer/writer experience.