Tuesday, June 11, 2019

Cyber Warfare in China Term Paper Example | Topics and Well Written Essays - 5000 words

Cyber Warfare in China - Term Paper ExampleMoreover, it is difficult to identify the sources of assail since the hackers can strike the target precisely without leaving many evidences about the culprits. Cyber warfare will involve disruption of crucial network services and data, violate to critical infrastructure, and the creation of uncertainty and doubt among opposing commanders and political leaders. Cyber-attack provides an ability to strike both tactical and strategic targets from a distance using gimcrack formations China is often been criminate for its involvement in cyber warfare with its enemy countries like the States, India etc. Peoples Liberation Army (PLA) of China is accused for conducting cyber warfare with many other(a) countries. In fact, PLA takes cyber war seriously as this kind of warfare offers an immediate way for the rude to overcome the superiority of the U.S. in warfare techniques and weaponry . America is one country which has superior military power than China. Based on the current capabilities, it is difficult for China to attack America directly. So, they are believed to be causing commodious problems to America with the help of cyber warfare. Same way, India is another country which is working against the interests of China. Indias has frontier disputes with China. Moreover, the acceptance given to the Tibetan leader Dalai Lama by India is indigestible to China. So they are causing huge problems to India with the help of cyber warfare. Because of the necessities of instant interchange of information between countries located at different parts of the world, most networks and the computers in the world are connected in or so ways. In a heavily globalized world, it is difficult for a country to isolate its computer networks from global networks. Moreover, majority of the computers in the networks are using same operating systems and networking technologies because of the monopoly of some companies in these sectors. For examp le, Windows is used as the operating system in majority of the computers all over the world. Same way, TCP/IP protocols are used in majority of the computer networks. Although a completely absolute map of the overall Net has not been produced, it is logical to reason that the 95% of privately owned networks are connected to each other in some way. The interoperability benefits of standardized protocols and the spread of recently devised worms and viruses such as Nimda and Sasser are testament to the links between these networks4. China has superior internet related technologies compared to many other countries in the world. Moreover, many of the Chinese youths are currently getting training on computer software. China knows very well that they can cause huge problems to enemies silently and escape from getting punished by others. After land, sea, air and space, warfare has entered the fifth domain cyberspace5. Until recent times, military powers were keen in accumulating arms and f or land, sea, air and space attacks and defense. However, the development of internet or cyber space opened another domain for

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.