
There are several methods of attack in cyber-warfare, this list is ranked in order of mildest to most severe. 
- Propaganda: Political messages can be spread through or to anyone with access to the internet.
 
- Gathering data: Classified information that is not handled securely can be intercepted and even modified, making espionage possible from the other side of the world. See Titan Rain and Moonlight Maze.
 
- Equipment disruption: Military activities that use computers and satellites for co-ordination are at risk from this type of attack. Orders and communications can be intercepted or replaced, putting soldiers at risk.
 
- Attacking critical infrastructure: Power, water, fuel, communications, commercial and transportation are all vulnerable to a cyber attack.
 
- Compromised Counterfeit Hardware: Common hardware used in computers and networks that have malicious software hidden inside the software, firmware or even the microprocessors.
 
 
No comments:
Post a Comment