{"id":35954,"date":"2024-04-26T22:59:23","date_gmt":"2024-04-26T22:59:23","guid":{"rendered":"http:\/\/localhost\/branding\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/"},"modified":"2024-04-26T22:59:23","modified_gmt":"2024-04-26T22:59:23","slug":"cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state","status":"publish","type":"post","link":"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/","title":{"rendered":"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state"},"content":{"rendered":"<p>Author\u2019s Name<\/p>\n<p>Institutional affiliation<\/p>\n<p>Introduction <\/p>\n<p>Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state to maliciously penetrate another state\u2019s computer networks for the main purpose of disrupting or causing damage is a major cause of national and global concern. This threat, which is often politically motivated, has in this year and for the very first time, been regarded to be a larger threat than terrorism or Al Qaeda by various U.S intelligence authorities (Dilanian, 2013). Computer security is indeed is an important concern for governments, businesses and individuals (OPC, 2011, p.11; Guttman &amp; Roback, 1995). In this paper, we investigate the concept of cyberwarfare and explain why it is an area of concern for governments, businesses and individuals. Also investigated is how individuals attempt to breach computer security in this domain (methods of attack). This paper also presents the active and passive defenses that governments, businesses and individuals can use in combating cyber attack. The methods that security specialists employ in safeguarding computer systems are also explored in great detail.<\/p>\n<p>The concept of cyberwarefare<\/p>\n<p>The concept of cyberwarfare is basically a computer hacking activity which is politically motivated for the sake of espionage and sabotage. It is a special kind of information systems warfare which is sometimes viewed as analogues to the conventional warfare (O\u2019Connel, 2012).As noted earlier, this threat, has in this year and for the very first time, been regarded to be a larger threat than terrorism or Al Qaeda by various U.S intelligence authorities (Dilanian, 2013).Indeed this makes cyberspace the 5th domain of military warfare (Taddeo, 2012, p.209).<\/p>\n<p>So grave is the issue of cyber security that the U.S Department of Defense (DoD) has formally acknowledged it as a new domain in global warfare (Lynn, 2010).Lipman Report clearly indicated that several of United State\u2019s key sectors of the economy as well as other nations are at great risk of cyber attacks. Cyber threats range from those targeting private to public facilities such as banking and financial sectors, transportation, education, medical, and manufacturing and government operations. In this regard, we can safely regard cyberwarfare as an event exhibiting characteristics of a conventional warfare but waged only in the cyberspace.<\/p>\n<p>Methods of attack<\/p>\n<p>According to Andress and Winterfield (2011), individuals and nation-states can use several methods in order to wage a cyber attack. These range from the use of malware, viruses, Distributed-denial of service (DDoS) attacks to the use of electromagnetic pulse (EMP) bombs. Wilson (2008) categorized the methods into three distinct issues; physical damage of computers as well as communication lines, the use of electromagnetic pulse to damage computers and the use of malware to manipulate as well as sabotage computer networks.<\/p>\n<p>Malware attack involves the use of malicious software to infect individual, corporate or government computers. A perfect example of a malware that has been used in the past is Stuxnet, a malware which is arguably the most sophisticated cyberweapon ever designed (Bodenheimer, 2012). This malware was developed by United States in collaboration with Israel in order to sabotage the Iranian nuclear enrichment program. Its deployment was hugely successful to its creator since it completely destroyed the computers that were being used for the enrichment operations. <\/p>\n<p>Physical damage of computers as well as communication lines is another method used in waging a cyber attack. This is usually achieved through the destruction as well as sabotage of computer hardware, aerials, cables as well as satellites. The use of EMP is also effective since it completely destroys all computer and communication equipment that are transistor-based.<\/p>\n<p>Manipulation of computer networks is yet another example of cyberwarfare. It involves the use of programs to interfere with the integrity, availability as well as confidentiality of the computer and communication systems. This type of attack involves the use of DDoS attacks as well as man-in-the-middle attacks.<\/p>\n<p>How to combat cyberwarfare<\/p>\n<p>Cyber attacks can be combated through the application of active and passive anti-cyber attack strategies. There is a need for individuals, corporations and governments to develop methods for predicting, identifying and countering cyber attacks. Currently, several entities within the United States cyber community campaigning for the adoption of an anti-cyber attack campaign that is able to strategically as well as tactically deal with the eminent cyber threats (Menn, 2012). These anti-cyber attack strategies involved the application of active and passive defensive strategies to protect computer and communication systems against cyber attacks. Anti-cyber-attack strategies are mostly associated with both active and passive cyber attack defense measures that are used in protecting computer systems while counter-cyber-attack measures are mainly pre-emptive offensive techniques that are used to analyze behaviors and signatures and then subsequently deter, prevent, pre-empt as well as neutralize all sorts of hostile acts or intrusions (Swanson,Astrich,Robinson,2012).<\/p>\n<p>Individuals, corporations and governments must therefore work together with security specialists in coming up with proper anti and counter-cyber-attack measures in order to ensure that the confidentiality, integrity and availability of computer and communication networks are never compromised. Intrusion detection systems must be used to help in forming a strategy that is more predictive than reactive. An early warning framework such as Lockwood\u2019s 12-step Analytical Method for Prediction (LAMP) must also be implemented (Lockwood, 1996).The use of antivirus updated software such as Kaspersky Antivirus must also be used. Firewall must also be used with suitable policies put in place.<\/p>\n<p>Conclusion<\/p>\n<p>Cyberwarfare is a concept that can never be avoided in our current and future societies. Individuals, corporations and governments must therefore work together with security professionals in combating all sorts of offensive cyberwarfare. Active and passive defense mechanisms must therefore be designed to be used for predicting, identifying and countering cyber attacks. Otherwise, we might just be headed for a cyber Armageddon!<\/p>\n<p>References<\/p>\n<p>Andres,J.,Winterfield.,S. (2011).Cyber Warfare: Techniques, Tactics and Tools for Security <\/p>\n<p>Practitioners. Waltham,MA: Syngress<\/p>\n<p>Bodenheimer,DZ.(2012).Cyberwarfare in the Stuxnet Age Can Cannonball Law  Keep Pace <\/p>\n<p>With  the Digital Battlefield? The SciTech Lawyer, 8 (3) (Winter,2012).Retrieved on 17 April,2013 from   HYPERLINK &#8220;http:\/\/www.crowell.com\/files\/2012-bodenheimer-the-scitech-lawyer.pdf&#8221; http:\/\/www.crowell.com\/files\/2012-bodenheimer-the-scitech-lawyer.pdf<\/p>\n<p>Clarke, R,A.(2010).Cyber War.New York,NY:Harper Collins<\/p>\n<p>Guttman,B., Roback,EA. (1995). An Introduction to Computer Security: The NIST Handbook. <\/p>\n<p>Nist special Publication800-12. Retrieved on 17 April,2013 from  HYPERLINK &#8220;http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-12\/handbook.pdf&#8221; http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-12\/handbook.pdf<\/p>\n<p>Dilanian, K (2013)&#8221;Cyber-attacks a bigger threat than Al Qaeda, officials say&#8221;, Los Angeles <\/p>\n<p>Times, March 12, 2013. Retrieved on 17 April,2013  HYPERLINK &#8220;http:\/\/articles.latimes.com\/2013\/mar\/12\/world\/la-fg-worldwide-threats-20130313&#8221; http:\/\/articles.latimes.com\/2013\/mar\/12\/world\/la-fg-worldwide-threats-20130313<\/p>\n<p>Lynn, W.J. ,III. &#8220;Defending a New Domain: The Pentagon&#8217;s Cyberstrategy&#8221;, Foreign Affairs, <\/p>\n<p>Sept\/Oct. 2010, pp. 97\u2013108<\/p>\n<p>Lockwood, J. (1996). Lockwood Analytical Method for Prediction, DC: JMIC.<\/p>\n<p>Menn, J. (2012, June 18). \u201cHacked companies fight cyber criminals.\u201d Retrieved on 17 <\/p>\n<p>April,2013 from the Canada.com website:  HYPERLINK &#8220;http:\/\/www.canada.com\/technology\/Hacked+companies+fight+cyber+criminals\/&#8221; http:\/\/www.canada.com\/technology\/Hacked+companies+fight+cyber+criminals\/<\/p>\n<p>O\u2019Connel,ME (2012).Cyber Security without Cyber War. Oxford :Oxford University Press<\/p>\n<p>Office of the Privacy Commissioner of Canada (2011). <\/p>\n<p>\u201cFundamental\u00a0Privacy\u00a0Rights\u00a0within\u00a0a\u00a0Shared\u00a0Vision\u00a0for\u00a0Perimeter\u00a0Security\u00a0and\u00a0Economic\u00a0Competitiveness\u201d.Submission\u00a0by\u00a0the\u00a0Office\u00a0of\u00a0the\u00a0Privacy\u00a0Commissioner\u00a0of\u00a0Canada\u00a0to\u00a0the\u00a0 Government\u00a0of\u00a0Canada\u2019s\u00a0Beyond\u00a0the\u00a0Border\u00a0Working\u00a0Group\u00a0public\u00a0consultation.<\/p>\n<p>Taddeo, M (2012). \u201cInformation Warfare: a Philosophical Perspective.\u201dPresented at the 2012 <\/p>\n<p>4th International Conference on Cyber Conflict. Retrieved on 17 April,2013  HYPERLINK &#8220;http:\/\/www.ccdcoe.org\/publications\/2012proceedings\/3_5_Taddeo_AnAnalysisForAJustCyberWarfare.pdf&#8221; http:\/\/www.ccdcoe.org\/publications\/2012proceedings\/3_5_Taddeo_AnAnalysisForAJustCyberWarfare.pdf<\/p>\n<p>Wilson,C (2008). Botnets, Cybercrime, and Cyberterrorism:Vulnerabilities and Policy Issues for <\/p>\n<p>Congress.CRS Report for Congress Order Code RL32114.Updated January 28,2008. Retrieved from  HYPERLINK &#8220;http:\/\/www.fas.org\/sgp\/crs\/terror\/RL32114.pdf&#8221; http:\/\/www.fas.org\/sgp\/crs\/terror\/RL32114.pdf<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author\u2019s Name Institutional affiliation Introduction Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state to maliciously<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-35954","post","type-post","status-publish","format-standard","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state - sheilathewriter<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state - sheilathewriter\" \/>\n<meta property=\"og:description\" content=\"Author\u2019s Name Institutional affiliation Introduction Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state to maliciously\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/\" \/>\n<meta property=\"og:site_name\" content=\"sheilathewriter\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-26T22:59:23+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/\",\"name\":\"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state - sheilathewriter\",\"isPartOf\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\"},\"datePublished\":\"2024-04-26T22:59:23+00:00\",\"author\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\"},\"breadcrumb\":{\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sheilathewriter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#website\",\"url\":\"https:\/\/sheilathewriter.com\/blog\/\",\"name\":\"sheilathewriter\",\"description\":\"Custom essay writing\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/opskill.com\/propapers\"],\"url\":\"https:\/\/sheilathewriter.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state - sheilathewriter","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/","og_locale":"en_US","og_type":"article","og_title":"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state - sheilathewriter","og_description":"Author\u2019s Name Institutional affiliation Introduction Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state to maliciously","og_url":"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/","og_site_name":"sheilathewriter","article_published_time":"2024-04-26T22:59:23+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/","url":"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/","name":"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state - sheilathewriter","isPartOf":{"@id":"https:\/\/sheilathewriter.com\/blog\/#website"},"datePublished":"2024-04-26T22:59:23+00:00","author":{"@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab"},"breadcrumb":{"@id":"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sheilathewriter.com\/blog\/cyberwarfare-which-is-defined-by-clarke-2010-as-action-by-a-given-nation-state\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sheilathewriter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyberwarfare, which is defined by Clarke (2010) as action by a given nation-state"}]},{"@type":"WebSite","@id":"https:\/\/sheilathewriter.com\/blog\/#website","url":"https:\/\/sheilathewriter.com\/blog\/","name":"sheilathewriter","description":"Custom essay writing","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sheilathewriter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/f5844d28db4a1882523a0a69560bf0ab","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sheilathewriter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9cf817440d627e98709fcac9c5cc379958985e679d683af80df1879b5a471013?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/opskill.com\/propapers"],"url":"https:\/\/sheilathewriter.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/35954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/comments?post=35954"}],"version-history":[{"count":0,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/posts\/35954\/revisions"}],"wp:attachment":[{"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/media?parent=35954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/categories?post=35954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sheilathewriter.com\/blog\/wp-json\/wp\/v2\/tags?post=35954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}