There are several methods of attack in cyber-warfare, this list is ranked in order of mildest to most severe.
- Propaganda: Political messages can be spread through or to anyone with access to the internet.
- Gathering data: Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world. See Titan Rain and Moonlight Maze.
- Equipment disruption: Military activities that use computers and satellites for co-ordination are at risk from this type of attack. Orders and communications can be intercepted or replaced, putting soldiers at risk.
- Attacking critical infrastructure: Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.
- Compromised Counterfeit Hardware: Common hardware used in computers and networks that have malicious software hidden inside the software, firmware or even the microprocessors.
No comments:
Post a Comment