Cyberwarfare+-+ivan

=Cyberwarfare=

Is defined as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.", Mr. Richard A. Clarke said in his book about cyberwarfare.
 * Wikipedia:**

The //Economist// describes cyberwarfare as "the fifth domain of warfare, and Mr. William James states that "as a doctrinal matter, the Pentagon has formally recognized cyberspace as a new domain in warfare. . . [which] has become just as critical to military operations as land, sea, air, and space."

Contents from Wikipedia is a good plan to follow:

 * [|Methods of attack]
 * [|Espionage and national security breaches]
 * [|Sabotage]
 * [|2] [|Motivations]
 * [|Military]
 * [|Civil]
 * [|Private sector]
 * [|Reaction by government agencies]
 * [|Cyberwarfare limitation treaty]
 * [|Computer security policy]

So the first thing is the methods of attack:

Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary or classified information) from individuals, competitors, rivals, groups, governments and enemies also for military, political, or economic advantage using illegal exploitation methods on internet, networks, software and or computers. Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world.

Military activities that use computers and satellites for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to disruption. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market. In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the //New York Times.//

//What are the military service securities to protect their computer?//

//US military hackers and spies will get down to their cyber war activities. The declarations for taking cyber defense measures can be heard more and more often in the US. US analysts state that information and communication networks, on which the national infrastructure depends on, are becoming vulnerable for cyber criminals.//

//Cyberspace defense issue is urgent not only for the US. “The statistics revealed that cybercriminals have upped the ante and are becoming more sophisticated and creative, distributing more aggressive forms of malware” - defense IQ website states. However it seems that the US is too concerned with the problem of cyber defense in comparison with other countries.//

//The// //Cyberspace Policy Review// //summed up the state of things in the US cyberspace and national information security. It was proposed to a appoint cyber security policy official responsible for coordinating the US cyber security policies and activities.//

//The report outlined a new comprehensive framework to facilitate coordinated responses by government, the private sector, and allies to a significant cyber incident. The new system of coordination would enable Federal, State, local, and tribal governments to work with industry to improve the plans and resources they have in place in advance to detect, prevent, and respond to significant cyber security incidents.//

//The future strategy://

//- Cyber must be recognized as a warfare domain equal to land, sea, and air;//

//- Any defensive posture must go beyond “good hygiene” to include sophisticated and accurate operations that allow rapid response;//

//- Cyber defenses must reach beyond the department’s dot-mil world into commercial networks, as governed by Homeland Security;//

//- Cyber defenses must be pursued with international allies for an effective “shared warning” of threats; and//