What is Cyber War ?
Cyber war is insidious and is fought out of sight. Cyber war fought in a location which can not be touched , seen and not felt. We can see physical instruments like computers, cable, however these instruments interact in virtual. This facilities a reach that can extend from one part of the world to attack on public or private sector entities in another part of the world, while the perpetrator remains unknown in a legally provable sense.
Source:- https://airpowerasia.files.wordpress.com/2020/06/cyber-warfare.jpg?w=1568
When will the Cyber War begin ?
There is mainly one reason for Cyber War cause it is virtually impossible to identify every cyber attacker that occurs. Some attacks can not be detected for many years. And still after many years no traces were float. Cyber War is generally different from cyber crime. And no one can create a ICT ecosystem just for themselves because today’s computer and software easily available in any country
Why does Cyber War occur?
Like we are attacking in a smaller nations, or a terrorist organizations like ISIS, the use of DDOS attacks are much cheaper to launch than conventional warfare tools against an enemy possessing greater resources in terms of weapons, money and troops
What are the main types of cyber attacks ?
Offensive attacks for sabotage:
The main purpose of these kinds of operations is to destroy the target, typically critical infrastructure such as communication systems, power grid or transportation. Economic systems are also target of Cyber War.
Stuxnet:
Stuxnet is the thus best familiar example of a cyber weapon develop by US and israeli intelligence agencies. therefore, It is design to sabotage the iranian industry by attacking nuclear sites that were advancing their uranium enrichment program.
Cyber espionage:
The act of information gathering to obtain sensitive, proprietary or classified information from individuals and governments also for military, political or economic advantage using illegal exploitation methods on the internet, networks, software and computers.
Unpatched Software:
Vulnerabilities in software are however discover every day and those software providers develop and release patches to cover loops holes.
Phishing Attacks:
In a computer’s system, phishing attacks exploit our own gullibility and trusting nature. A phishing attack is when a hacker fishes for information, through a text message, e-mail, or even a print letter send to a user from what appears to be a reputable source.
Network-traveling Worms:
A computer worm copies itself onto other computers, causing network overloads or delivering a malicious virus payload. These viruses might delete files, encrypt files in ransomware attacks. Most commonly worms deliver a payload that installs a backdoor, enabling the computer to be control as a botnet by hackers.
DDoS Attacks:
Dedicated denial-of-service, attacks drive what network recognized as legitimate traffic through your servers, overloading systems. DDoS attacks are often use to silence businesses or overwhelm a financial institution.
A History of Cyber Attacks
1988-The First: The Morris Worm
The first cyber attack began with good intentions and ended with unexpected consequences. In 1988, Cornell University graduate student, Robert Tappan Morris, developed a program to assess the size of the internet. The program would crawl the web, install itself on the other computers
Source:- https://cyberhoot.com/wp-content/uploads/2020/02/malware-worms-blog-banner-730×300-1.png
1995-LA KIIS FM Porsche
In Cyber attacks, Kevin Poulsen developed a program to cheat in a radio contest.LA KIIS FM was giving away a Porsche to the 102nd caller, and Poulsen naturally wanted to win. He infiltrate the phone network to block their ability to receive calls, so Poulsen was assure the 102nd caller slot.
2002-Internet Attack
In 2002 marking a first in the history of cyber attacks By targeting the thirteen Domain Name System(DNS) root servers, a DDoS attack assaulted the entire internet for an hour. While most users were Unaffected, the DDoS attack could have shut down the internet if it had been sustain for a longer period.
2008-The Church of scientology
A hacker group refer as Anonymous target the Church of Scientology as part of a political activism movement against the church refer “Project Chanology”. In a week, the scientology website was hit with as many as 500 DDoS attacks. Some of these were strong enough to even bring the website down.
2014-JPMorgan Chase
The accounts of 76 million households and 7 million small businesses were compromise in a cyber attack during the summer of 2014. The hacker gained access to names, addresses, phone numbers, and emails of the account holders, but there was no evidence that passwords or social security numbers had been retrieve.
2018-Exactis
340 million records were leak by an anonymous marketing firm located in Florida: Exactis That’s more than double the enormous Equifax breach 2017.
Your name, phone number, interests, habits, number of children and many other personal Information.
written by: Abhishek Kumar
reviewed by: Sayan Chatterjee
If you are Interested In Machine Learning You Can Check Machine Learning Internship Program
Also Check Other Technical And Non Technical Internship Programs