The term information warfare or Info War refers to the use of information and communication technologies (ICT) for competitive advantages over an opponent.
Examples of information warfare weapons include viruses, worms, Trojan horses, logic bombs, trap doors, nano machines and microbes, electronic jamming, and penetration exploits and tools.
information,warfare into the following categories:
Command and control warfare (C2 warfare): In the computer security industry. C2 warfare refers to the impact an attacker possesses over a compromised system or network that they control.
Intelligence-based warfare:
Intelligence-based warfare is a sensor-based technology that directly corrupts technological systems. According to Libicki, “intelligence-based warfare” is a warfare that consists of the design, protection. Denial of systems that seek sufficient knowledge to dominate the battle space.
Also Read this Blog Climbing the Cyber Security Certification Ladder
Electronic warfare:
According to Libicki, electronic warfare uses radio electronic and cryptographic techniques to degrade communication. Radio electronic techniques attack the physical means of sending information. Whereas cryptographic techniques use bits and bytes to disrupt the means of sending information.
Psychological warfare:
Psychological warfare is the use of various techniques such as propaganda. A -id terror to demoralize one’s adversary in an attempt to succeed in the battle.
Hacker warfare:
According to Libicki, the purpose of this type of warfare can vary from shutdown of systems, data errors, theft of information, theft of services, system monitoring, false messaging, and access to data. Hackers generally use viruses, logic bombs, and sniffers to perform these attacks.
According to Libicki, the purpose of this type of warfare can vary from shutdown of systems, data errors, theft of information, theft of services, and access to data. Hackers generally use viruses, logic bombs, Trojan horses, and sniffers to perform these attacks.
Economic warfare:
According Libicki, economic information warfare can affect the economy of a business or nation by blocking the flow of information. This could be especially devastating to organizations that do a lot of business in the digital world.
Related Product Certified Ethical Hacker | CEH Certification
Cyber warfare:
Libicki defines cyber warfare as the use of information systems against the virtual personas of individuals or groups. It is the broadest of all information warfare and includes information terrorism, semantic attacks. Simulate-warfare (simulated war, for example, acquiring weapons for mere demonstration rather than actual use).
Each form of the information warfare, mentioned above, consists of both defensive and offensive strategies.
Defensive data Warfare:
Involves all methods and actions to defend against attacks on ICT assets. Information warfare has become just about similar with revolution in data technologies, its potential to rework military ways and capabilities. There is a growing agreement that national prosperity, if not survival, depends on our ability to effectively leverage info technology.
In some quarters, IW has even been related to the investing of knowledge technologies to realize larger effectiveness and efficiency. This has stretched that means of information warfare to the limit and has sowed For this reason. This treatment of the topic uses the term “information strategies” to ask the popularity and utilization of knowledge and information technologies as associate instrument of national power .
Offensive data Warfare:
Involves attacks against ICT assets of associate opponent. The set of activities carried out by people and teams with specific political and strategic objectives geared toward the integrity, handiness and confidentiality of information collected, keep and transferred inside information systems connected. Further, Valerie and Knights stress that info and Offensive Information Warfare area unit closely interlinked and kind a mutual.
Dependency:
By coupling these OIW operations with specific Internet-based propaganda activities, terrorist organizations could succeed their main objective: Gaining packaging for his or her cause since they employ supposedly ‘harmless’ or ‘non-lethal’ actions. Whereas at a similar time hampering specific initiatives by governments and commercial institutions
People also ask Questions
- What are the 4 types of cyber attacks?
- What is the most dangerous cyber attack?
- What is a military cyber attack?
- What are the Top 5 cyber crimes?
Cyber Security Related Things
- Top Cyber security Certifications of 2020 India
- Concept of Security, Cyber Space & Cyber Crime
- 10 Steps to Cyber Security
- Climbing the Cyber Security Certification Ladder
- Top 5 Key Elements of an Information Security
- Essential Terminology in Cyber security
- Top categories which includes in Information Warfare
- What is Defense in Depth? & How Defense in depth Works
- Information Security Incidents
- What is Information Security & types of Security policies
- Overview of Cyber security Frameworks
- 9 Tips for Top Data Backup Strategy
- What is Cyber Kill Chain? and it’s 7 Phases
- A Need for Tactics, Techniques & Procedures
- An Overview of knowledge Acquisition
- Business Needs and Requirements
- What is Pyramid of Pain ? & It’s types
- Top IT Management Certifications of 2020 to Impress Recruiters
- Best Cyber security career 2020 road map for IT Professionals
- 15 Benefits Of Security Certifications to Upgrade Career Path 2020
- 6 Things You Should know About Social Engineering
This Article Posted By
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com