Professional Documents
Culture Documents
Introduction
1. Cyberspace is the ultimate result of the combination of the man and the machine.
It is the total interconnectedness of the human beings, through computers and
telecommunication without the regard of physical geography.
2. The credit for invention and popularization of this term lies with William Gibson;
he used it first in his novel ‘Neuromancer’ 1994.
3. Cyberspace is often used as a metaphor for describing the non physical terrain
created by the computer system. It is a space created by the online systems, in which
people and systems can act react and interact with the other. Just as physical space it
involves objects and different modes of transportation and delivery. It is governed by
similar rules and laws.
4. The Mongols is a classical example of a force that fought with cyber warfare
principles. They were organized more as a network than as a hierarchy. Also the
relatively minor military power of Viet Cong defeated a major military power like the
United States just by operating more like a network than an institution. In both the cases
the opponents were as organised as an institution, whose force was designed to fight in
attrition battles.
Netwar
7. Netwar refers to information related conflict at a grand level between nation and
societies. It means trying to disrupt damage or modify what a target population ‘knows’
or what it ‘thinks it knows’ about itself and the world around it. It may involve public
diplomacy, propaganda and psychological campaigns, political and cultural subversion or
interference of local media.
Cyberwar
9. This form of warfare may involve diverse technologies notably for command,
control, communication and intelligence (C3I), for intelligence collection, processing and
distribution for tactical communication positioning and identification friend or foe (IFF)
and for smart weapon systems.
11. The first step in attack of an information system is cyber infiltration; all systems
that incorporate software are vulnerable to cyber infiltration
12. it may be followed by a cyber raid which may affect an organisation via transfer ,
destruction and altering of records.
13. the software of the information system can be manipulated via various means, it
encompasses cyber manipulation.
14. the software can be copied damaged or rewritten ,it is termed as cyber assault.
16. Weapon system. With the advent of numerous technological breakthrough most
of the erstwhile mechanical system are being replaced by computer controlled ones. High
tech avionics in fighter plane, missile launch system, communication system etc. and
pose as a lucrative target. Cyber infiltration of c3i system providing data to modern
weapon such allows an avenue for cyber raid, manipulation and assault. For example in
the new generation aircrafts the GPS automatically updates the info necessary for aircraft
flight control, it can be manipulated to allow undetected infiltration of the aircraft. The
navigational system of guided missiles can be controlled by correct sequential inputs and
right reprogramming to hit a friendly target instead of a hostile one.
17. The first rule in identifying cyber warfare vulnerabilities is that any software
controlled system that can accept an input can theoretically infiltrated and attacked. In
other words all systems except that except external inputs are vulnerable.
18. The second rule is to expect every software controlled system to be the target of
cyber infiltration.
Defensive operations
Offensive Operations
Offence is the best form of defence and it can be proactively employed in cyber
warfare. The following methods can be used for offence:
IC 69166M
Lt Shamsher Kelshikar
65 Fd Regt