preview

Cyber Warfare In Canada

Decent Essays

Cyber Security and Cyber Warfare Over several decades, digital innovators have developed and improved the ever-changing world of technology. From the countless social media websites, the ability to pay bills online, computer protocols, policies, and digital actions that govern the cyber-world has also grown beyond mental and physical grasp. Although many users of technology are quick to recognize innovations in software, such as new mobile phone updates or user friendly programs, many of the same monumental changes in hardware and data has also been made. Take for instance internal and external hard drives. A device that is centered around its software, hardware, and data collection and storage. According to Kovar (2012), in 1956, the …show more content…

Pfleeger, S. Pfleeger, and Margulies (2015) outline possible examples of cyber warfare between Canada and China (p. 844). According to Pfleeger, S. Pfleeger, and Margulies (2015), “the Canadian government revealed that several of its national departments had been victims of a cyber attack…” (p. 844). Eventually, the attack was unofficially traced to a computer in China (p. 844). Cyber warfare can be used negatively and positively. It is evident that China was seeking to gain protected information form Canada. Although a purpose of cyber warfare, it is not a conventional way of obtaining information. Additionally, cyber warfare can be used to collect intelligence on an enemy. Anyone seeking to gather intelligence on another individual or group can launch a cyber attack that gains access to protected files. This could be used to help future militant operations or expose critical information. Lastly, cyber warfare can be used to test systems internally. Acting with no malicious intent, “insiders” can utilizing cyber warfare tactics to attack their own cyber security barriers in order to test the strength of their systems. Seeking to expose the vulnerabilities in a system that contains important assets without actually harming the assets provides the system a diagnosis of what needs to be strengths and fixed. Identifying the problem or threats before an actual attack can ultimately save the protected

Get Access