Information Warfare and its Strategic

“Information warfare refers to the conflict between two Information or more groups in the information environment. The main purpose of information warfare is the deletion of critical information. It is performed by insiders, terrorists, hackers, criminals, etc. The target of information warfare is to gain information superiority.”

Information warfare refers to creating chaos by damaging the computer system and resources that are used to manage the various sector of critical infrastructure.

It targets the information systems that are used to manage the power grids, air traffic control systems, telecommunications, research and development activities, defense systems, stock exchanges etc.

Information warfare involves the use and management of information and communication technology in pursuit of a competitive advantage over an opponent. It results in the loss of data, illegal exploitation of the communication systems, data manipulation, manipulation of information system etc.

The main motives of information warfares are gaining a competitive edge, revenge, political advantage, military advantage etc.

Information warfare includes the use and abuse of computer system and resources to undermine the information infrastructure of an adversary. The main objectives of information warfare are obtaining information of an adversary, causing severe destruction information infrastructure of a nation and spreading propaganda.

 

Attack Strategies Used in Information Warfare

  • Access to the data can be denied by attacking the hardware or systems containing the data or its collection or deletion of data. It could also involve the delaying of access to data to the points at which it becomes useless.
  • Disruption can b caused to the system that collects and stores the data, or to that part of the system which disseminates it. Destruction of the data can occur by physical destruction of the storage medium, or the data itself, so it becomes irrecoverable in the time needed to make it useful.
  • The corporate data is confidential and can also be of competitive advantage. Theft of this data might give insights into the workings of the attacked thereby giving the attacker a possible business, negotiation, or criminal advantage.
  • Information can be manipulated or created to provide the target or its environment with a perception that develops behaviors detrimental to the target, or beneficial to the attacker.
  • Information can be intercepted thus giving the interceptor an advantageous insight into the target organization’s strengths, weaknesses, and intentions. This information can be gained legitimately or illegitimately.

Related Post

Economic Consequences of Cyber Terrorism

Terrorist Atrocities

Role of Information Technology for Terrorists

Types of Cyber Terrorism – Privacy Violation

Characteristics of Cyber Terrorism

What is Cyber Terrorism? Factors of Cyber Terrorism