Free Essay

Cyberspace

In:

Submitted By ok123plus
Words 1655
Pages 7
Lab Assignment: Password Cracking Using Cain and Abel
Introduction

The objective of this lab assignment is to introduce you to various techniques used in password cracking. You will experience how it is done first hand by using a software application called “Cain and Abel.”
Background Information 1. About “Cain and Abel”

Cain and Abel is a powerful tool for system administrators, network administrators, and security professionals. Its web site states that it is password recovery tool for Microsoft Operating Systems. In order to release the full functionality of the Cain and Abel package, “Win Pcap” must be installed in order to provide network packet captures. Through this, Cain and Abel has the ability to crack encrypted passwords using Brute Force, Dictionary, or Cryptanalysis (via “rainbow tables”). The sniffer (captures and analyzes network traffic) in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms, including Kerberos. In addition to this, Cain and Abel can used to recover wireless passwords, uncover cached passwords, and analyze routing protocols. 2. Algorithms

There are two authentication protocols used to store passwords depending on which version of Windows is being run. The two are LM and NTLM. * LM

The LM, sometimes referred to as LanMan or the LAN Manager hash, is the primary authentication protocol that Microsoft employed in Windows versions prior to Windows NT; it is used to store user passwords in an encrypted format on the disk. In order to transform a user's password to the LM hash, the password is first converted to all uppercase letters. If the password is greater than 14 bytes (14 characters) any character after the 14th is truncated; likewise, if the password is less than 14 bytes, it is null-padded to be 14 bytes exactly. The password is then split into two, 7-byte halves. A null bit is inserted at the beginning of each half. The halves are then used as keys to DES encrypt the constant ASCII string “KGS!@#$%”. The concatenation of the two output values forms a 16-byte value, which is the LM Hash.

This algorithm is weak via its implementation. The maximum possible combination of values (key space) is restricted since it only uses uppercase character values in the ASCII character set. Additionally, since the algorithm breaks down the password into two separate pieces, each component can be attacked individually, allowing for a maximum possible password combination of 69 possible values to the power of 7 (69^7). * NT LAN Manager

NTLM, also known as NT LAN Manager, was first introduced in Microsoft Windows NT 3.1 to address the security weaknesses inherent in LM encryption. The NTLM algorithm is much stronger than the LM authentication protocol for several reasons: 1) NTLM passwords are based on Unicode, increasing the amount of possible characters that can be used 2) NTLM passwords are case sensitive and 3) NTLM passwords can be up to 128 characters long. All of these reasons imply that there is a much bigger keyspace, which would require for more time to analyze.
Goal

The goal of this lab is to use Cain and Abel to recover the passwords for user accounts on the machine. It is also to demonstrate the limitations to cracking passwords, i.e. not being able to recover a password in a reasonable amount of time if it is a "strong password".
Access the Virtual Lab
Detailed directions can be found at Content --> Virtual Lab Access.
Helps and supports information can be found at Content --> Class Tutoring.
Please seek support as soon as possible if you have any problems with this lab. In previous semesters, some students have had extreme difficulty getting connected so the sooner we can start troubleshooting, the better.
Experiments
A. CREATING USER ACCOUNTS

You will create 3 user accounts on the machine and make each password incrementally more complex. Password cracking takes time, so expect that when you begin cracking the password that there may be a long wait before it finishes. If it takes a long a time, feel free to exit the process.
Creating the necessary user accounts for this will be done through the Command Prompt window.

1. To get to the command prompt, select: Start > Command Prompt.
2. We will first practice creating and deleting user accounts. The syntax for adding a user is as follows: "net user [username] [password] /add".
Enter: net user test test123 /add
3. Verify that the user was added by running the command: net user
The new user account should show up on a list.
4. Once you are done creating the test account, you can delete them by using a similar syntax: "net user [username] /delete".
So enter: net user test /delete
5. Once again, verify that the accounts were deleted by running: net user
6. Create three user accounts with the following attributes:
TO create Password net user test *
There will request for password to be entered and reentered (Password will not show as it is been entered)
For the first account for user1, use a weak, single-case password as “security”. * For the second account for user2, use a slightly more complex password using alpha-numeric characters and a number as “hackin9”. * For the third account for user3, increase the complexity more by using a special character as “Pa$$w0rd" (note: 0 = zero)
Once you have created these three accounts, minimize the Command Prompt window (you will later delete these accounts). You are now ready to crack these passwords.
B. USING CAIN AND ABEL

Double click on the Cain icon on the desktop. (Note: a barebones user’s manual of the program is found at: http://www.oxid.it/ca_um/ ). You ought to maximum the window.
You might want to review the lab questions listed in Part G before you start using Cain and Abel.
1. Click the “Cracker” tab.
2. In the left window, click on “LM & NTLM Hashes.” Recall that these are the two authentication protocols described earlier that are used to store passwords in Windows.
3. Click on the plus sign which “add to the list” and the Next button. All of the user accounts on the machine should populate the right window.
4. Right click on the first account you created for user1. Attempt to discover the password via Brute Force. For this, attempt to apply Brute Force using the NTLM Hash. Click the Start button. Note the Time Left. Stop after a few minutes. Click Exit.
5. Next, perform a dictionary attack against the user accounts. Right click on the first account again and select Dictionary Attack using the NTLM Hash.
Before you click Start, note that a dictionary file has been specified for you:
C:\Program Files\Cain\Wordlists\Wordlist.txt
Click the Start button. Again note the results.
6. Repeat this procedure for the other two accounts. Note: When performing a subsequent dictionary attack, you may need to right click the wordlist and reset the file position to the initial position.
7. Repeat Steps 1 through 6 substituting LM for NTLM. After completing this step you will have results for Brute Force and Dictionary attacks on three passwords each encrypted using the NTLM and LM hash algorithms.
When done, close the Cain and Abel application.
C. DELETE THE USER ACCOUNTS

1. Open the Command Prompt window.
2. Using the syntax "net user [username] /delete", remove the three accounts you created. net user user1 /delete net user user2 /delete net user user3 /delete
3. Close the Command Prompt window.
D. EXITING THE APPLICATIONS

Log off the cloud application and disconnect the VPN.
Experiment Report

-Include experiment data and results (snapshots and tables) in the report.
-Your report should contain data generated from the exact usernames and passwords you created.
-Answer the following questions in a Word document and submit the file in the Lab1 Assignments folder.

Questions (Provide a minimum 100-word, fact-based response for each question. Be quantitative, show lab results, and show in-line citations, where appropriate. Include overall reference list at the end.) 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and contrast the results from the two methods used to crack the accounts for the three passwords each encrypted by the two hash algorithms. What conclusions can you make after using these two methods? 3. Research another algorithm used to store passwords that were not discussed here. (Include references in APA format.) 4. Research another password recovery software program and provide a thorough discussion of it. Compare and contrast it to Cain and Abel. (Include references in APA format.) 5. Anti-virus software detects Cain and Able as malware. Do you feel that Cain and Able is malware? Why or why not?
Grading
See corresponding rubric for details.
Notes
For this lab assignment, each student completes the lab exercise using the Cain and Abel software and prepares a report including lab results and addressing the questions.
The student must check the file(s) right after submission to make sure the right file(s) are submitted. No resubmission after the due date is allowed without prior approval from the instructor. Only valid submission in the correct assignments dropbox can be graded.
You are not required to turn this assignment to Turnitin.com.
Warning
Do NOT download this program and install on your local computer. For this assignment, it is strongly recommended to use a virtual private network (VPN) connection to the cloud environment to run the program.
If you download Cain and Abel, it will be detected and flagged as malware when using certain anti-virus programs and it runs on Windows only. Therefore, it is not recommended that you install the program on your computer.
Last Updated 7/22/2015

Similar Documents

Free Essay

Cyberspace

...living. Today, technology has become very advanced, dealing with worldwide problems in a more efficient manner. However, many are abusing this breakthrough invention because internet users are not aware of the vital connection that the real world has with the virtual world. In the article “Character Education for Cyberspace: Developing Good Netizens” by Andrew J. Milson and Beong-Wan Chu, human’s actions opposing from the real world is explained. Furthermore, in the article “We Need to Learn to Become Digital Citizens,” by Nick Harkaway, the connection between the real world and the virtual world is clarified and the importance of becoming a smart internet user is expressed. This paper will illustrate the authors’ claims in emphasizing the dangers of the virtual world that humans are ignorant toward by asserting claims sub claims, and examples to express their purpose. The main argument of the article, “Character Education for Cyberspace: Developing Good Netizens” by Andrew J. Milson and Beong-Wan Chu, is that cyberspace allows people to communicate and say words that they would not say or do in real life. Milson and Chu state, “In the most complex sense, cyberspace may be conceived as a parallel world where people can conduct ordinary activities without engaging in the physical acts traditionally associated with such activities” (Milson and Chu 1). They are saying that the internet gives people the opportunity to talk to one another and speak their minds without having to do...

Words: 1796 - Pages: 8

Free Essay

Cyberspace

...A Different Word: Subcultures in Cyberspace Student’s Name Institutional Affiliation A Different Word: Subcultures in Cyberspace The way people organize, govern and create meaning in their lives is associated with social patterns that link to other cultures. This describes the study of sociocultural anthropology. This brief essay will examine: Egao, cyberpunk, queer and ethnic cyber-subcultures and relate them to sociocultural anthropology. This field of study as several concerns from the environment to health issues, however, the main in terms of cyber-subcultures deals with social change. Social change can be described as any event that causes a dramatic change immediately or over time. The presence of the Internet and cyberspace has already caused several changes in society. Facebook (FB), Twitter and other social media sights have made it possible to connect with people from different states and countries in seconds. It also makes it possible to find lost friends and reconnect with distant family members. There are opportunities to play games, exchange video files and stream live footage. The possibilities are seemingly endless. Within this new frontier of freedom along with social media Egao can be found. Egao Egao can be defined as a cyber-subculture in satire with the mainstream (Zhang, 2010). It can be accessed from mobile phones and other electronic devices. There are several forms which include: text, audio, image, or video. This particular sub-culture...

Words: 1018 - Pages: 5

Free Essay

Why Microsoft's Craig Mundie Worries About Weapons of Mass Disruption Current Event Ii

...Why Microsoft's Craig Mundie Worries About Weapons Of Mass Disruption We live in a world were computers are quickly becoming ubiquitous.Chances are that you have one in your pocket right now. There are also a few controlling your car, the traffic lights on the streets, and plenty other ones you might not be aware about. The professional world has not been immune to this phenomenon. Computer have been able to shrink our world in to what Marshall McLuhan referred as a global village (Understanding Media 1964). We are at a point were it is just as easy to move information locally as it is globally, thus transforming the business environment and making business happen faster than ever before. As computers become more common place in our life, people like Craig Mundie (Senior advisor to Microsoft CEO Steve Ballmer), are becoming concerned about what happens when people with access to technology want to cause harm. Craig tells us that there are basically five types of malevolent things people can do in the cyber world. These are: malicious mischief, crime, espionage, warfare, and terrorism. And they can be perpetrated by: amateurs, pros, and governments. Mundie spends a lot of time talking to world leaders about current issues regarding internet security and where this field is headed in the future. Mundie is most alarmed about what he calls “weapons of mass disruption” he states that “on the Internet, things can happen so fast, at such a high scale, I believe no country has...

Words: 959 - Pages: 4

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. Skeptics...

Words: 3494 - Pages: 14

Free Essay

International Security

...International Security: Cyber Warfare – notes 10/3/12 * Review * Drones * What is Cyber Warfare? * Cyberspace: Interconnected network of information systems * Cyber warfare: using cyber capabilities to disrupt information in computers of another state * Inexpensive, just need to create unique computer code * Types * Denial of Service (DoS) * Goal: shut down network * Method: flood networkd with so many extra requests it overloads * Variant: Distributed (DDoS) attack from many infected bots * “carpet bomb in cyberspace” * Variant: Permanent (PDoS) * Damagers hardware * Malicious Programs * Goal: Disrupt of gain control of target computer * Method: Open a back door for remote access * Types: * Virus: Attached to file, self-replicates * Worm: Self-replicates, travels unaided * Trojan Horse: Apparently harmless program with code inside to gain system control * Logic bomb: * Goal: Coordinate timing of an attack * Method: Watch for specific event or predetermined time to trigger malicious code * Digital Manipulation * Goal: misinform/deceive audience * Method: Digitally alter images/audio * Extent: Real-time video, voice morphing * Cyber Espionage * Definition: Using cyber capabilities to acquire information about another...

Words: 406 - Pages: 2

Premium Essay

Cyber

...CYBER WARFARE Student’s Name Institution of Affiliation CYBER WARFARE Cyber warfare is also commonly referred to as the cyber attack. It involves both the attacks and the counter cyber warfare. By definition, it is an intentional breaching of a person’s or community computer system with an intended to fraud money or steal knowledge from the system. Therefore, it involves manipulation of the computer systems, disabling or to wipe out the aggregate information contained in the system of equipment. It has thus been a stern challenge in the economic and national and the world security. As thus, it has become a primary concern for all business people protecting their ideas not to be leaked, in the military due to the protection of national security and also by the government which has to keep it a secret of all what is happening within it. The issue of the cyber attacks has not been one event but something that has occurred over time as a result of inventions and innovations by the governments and security agencies. It was triggered by the need to safeguard one's interests and at the same time keep secrets that if they leak the competitors or the enemies can use them against you. One of the periods that can be credited to giving birth to the period of developments that led to cyber attacks is 1918 all the way to 1939 whereby there was increased military revolution. One of these advances was the use of modern aircraft, weapons, and military strategies and, of course, the technology...

Words: 1263 - Pages: 6

Premium Essay

Network Security

...ENTERPRISE INFORMATION SECURITY BY CRAIG CANNON MELBOURNE, FLORIDA JANUARY 25TH 2013 In her article “Cyber Security without Cyber War”, Mary Ellen O’Connell does a brilliant job in giving the reader an overall view of the debate concerning which government should have primary responsibility of the internet when it comes to the legal authority of cyberspace. She begins the article by citing two major players in this debate: the U.S. Military with its rules and legislation vs. NATO and its international law. According to O’Connell, the USA feels that the military should have primary responsibility over the internet since it has the largest number of technical experts and legal authorities with respect to cyberspace than anyone else in the world. Many in the international community would disagree with allowing the US military to police the internet. They raise the question: What legal rules would be used to guide the military in its supervision of the internet. They believe that using international law is the best way to govern cyberspace usage. (Johnson, 1996) Still others favor the US military’s Cold War strategy of deterrence as a way of patrolling the internet. These that favor the US military option feel that the US should not observe international laws with respect to the internet at all. One major scenario based question that has been raised is in the event of a cyber-attack how would international law apply the use of force...

Words: 1872 - Pages: 8

Free Essay

Management

...[pic] MASTER OF MANAGEMENT CORPORATE GOVERNANCE, ETHICS AND VALUES GSGM7253 TERM PAPER Issues and challenges in cyber ethic PREPARED BY: |MEOR NORULAZMI BIN MAT SALLEH |MD1409MD0030 | Contents Introduction 2 Literature Review 3 Recommendations 6 Conclusion 8 References 10 Introduction This article will highlight the issue and challenges in cyber ethic. It will cover general outlined the concept of cyber ethic and tries to relate it with the globalization of internet which was a way of living nowadays. Have you noticed that the whole world is now watching the same movies, listening to the same music and reading the same books? Of course not 100%, but the majority of the people on the planet do it the same thing as mentioned above. Why these activities happen, whereas they live not at the same location or place? This is what we call it as internet culture. Since the 1990’s, the Internet has a revolutionary impact on our culture. People around the world, start to use communication by instant messaging, electronic mail, interactive video call. Also, watching a movie, discussion and shopping they're using a World Wide Web or website.   Today, internet become part of living. I define frequent use of the Internet as...

Words: 2841 - Pages: 12

Free Essay

Cybersecurity

...Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 Cybersecurity and U.S.-China Relations 网络安全与美中关系 Kenneth Lieberthal and Peter W. Singer 李侃如,彼得. W. 辛格 February 2012 Authors’ Note F or the last year, the John L. Thornton China Center and the 21st Century Defense Initiative at Brookings have convened a working group on cybersecurity and U.S.-China relations, which the two authors organized and co-chaired. The research was motivated by our sense that: 1) the many policy issues involved in cybersecurity, especially in its impact on foreign relations, were already significant and would grow rapidly in importance in the coming years; 2) that such issues, if not well managed, could provide a major source of international friction, especially in U.S.-China relations; and 3) the newness of the field added a particularly complicating factor, making cybersecurity one of the most important but least understood emerging flashpoints in global security. A key aspect of the effort was to convene several dozen knowledgeable Americans from both the private and public sector, including the civilian government, military, corporate, think tank, and university communities. With such dynamic and fast-changing events playing out, the Brookings project not only sought to study the key issues in cybersecurity and how they impact U.S.-China relations, but also to break down some of the organizational and bureaucratic stovepipes that have limited...

Words: 17963 - Pages: 72

Free Essay

Cyberterrorism

...Cyber terrorism Assignment #10 6/15/2012 TS 5999 Table of Contents Abstract………………………………………………………2 Introduction…………………………………………………..3 What is Cyberterrorism?....................................................3-4 History…………………………………………………………4 Examples of cyberterrorism…………………………………4-6 Level of cyber terror capability ……………………………..6 Figure 1……………………………………………………….7 Prevention of cyberterrorism……………………………….7-8 Conclusion ……………………………………………………..8 Reference ……………………………………………………...9-10 Abstract Cyberterrorism has increasing become one of the most significant threats nationally and internationally. Being that the internet makes it easier for terrorist to communicate, organize terrorist cells, share information, plan attacks; the internet also is used to cyber terrorist acts. Since the September 11th terror attacks on the US, American have remained on high alert for possibly another terror attack. The government has many action plans ready in the event that they get wind of another attack or an attack happens. Law enforcement has received training in terrorism prevention and detection techniques, granted terrorist are always looking for ways to improve their methods of attack. This paper will look at all the different aspects of cyberterrorism and review the different cases of cyberterrorism nationally and internationally. Introduction The use of computers and the internet have been an important part of our daily lives. Computers and the internet makes...

Words: 1895 - Pages: 8

Premium Essay

Cyber Terrorism

...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned...

Words: 4562 - Pages: 19

Free Essay

Living in the Age of Cyber Attacks and Cyber Warfare

...Living in the Age of Cyber Attacks and Cyber Warfare UMUC   If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment of the Die Hard series, Live Free or Die Hard. While those movies had a profound impact on the lives of the characters in the script, the audience probably thought it was merely fiction, not fully based on fact. In Live Free or Die Hard, John McClain (played by the indefatigable Bruce Willis) is attempting to stop a domestic cyber-terrorist who is acting out on a vendetta against the United States. The cyber-terrorist is successful in launching an online attack to overload and destroy a power grid that left much of America’s East Coast in darkness. When I first saw this movie, I was curious if an attack like that was really possible; however, most people around me just labeled the movie as “Hollywood’s overactive imagination”. With cyber attacks literally having the ability to affect lives in a nanosecond, it is vital that everyone understand what cyber attacks entail, the impact of these cyber attacks on a domestic and international scale, and knowing what to expect in the future while living in a world dominated by virtual experiences...

Words: 2352 - Pages: 10

Free Essay

Change Managment

...Cyber Terrorism Mahesh kanneboina Wilmington University Abstract The Internet is the global connection of interconnected computer networks where information can be shared among users around the world. But these days the Internet is not secure as the fundamental mechanics of the Internet are well known to many people and leading to long-standing security issues caused by the bad people who could build a “cyber nuke” to take down the network. This paper discusses about the cyber terrorism where a hacker or terrorist attacks the confidential websites of the nation and gets the important information for their activities. This cyber terrorism came into light after the 9/11 attack on WTC and from then the media focused its attention on Cyber security that has reflected public policy concerns worldwide about this topic. Security of Internet and BGP The Internet is where every network is able to reach every other network. According to industry analysts, there are 794 million people online world-wide and it is expected to be more in the coming years. This represents a lot of data interchange. But many small businesses, and even large organizations, do not know how to protect their sensitive data, thus making it easy for criminals. Online Security is a growing concern for governments around the world. Border Gateway Protocol (BGP) is the protocol which makes core routing decisions on the Internet, but unfortunately, BGP is not secure because some network administrator...

Words: 2007 - Pages: 9

Free Essay

Cyber Crimes

...The internet has changed how organizations conduct business. Within moments information exchange occurs and a profit is made. It has changed how crimes are investigated and solved by law enforcement agencies. Unfortunately, it has also changed how criminals conduct their crimes- through cyberspace. President Obama, Sony executives, Target organization and many of its’ customers have all been victims of some form of cyber crimes. This writer will provide a brief overview of the six types of cybercrimes and the economic loss as it affects America’s businesses. TYPES OF CYBER CRIME The growth and availability of technology has resulted in cyber attacks becoming a major concern for governments worldwide (Dzielinski, 2014). Small companies along with the larger corporations are now being targeted. A recent survey reported that more than one-third of small companies have been victims of some form of cyber attacks (Dzielinski, 2014). Approximately 75 percent of these companies were unable to recover their stolen data. The Central Intelligence Agency (CIA) has classified cyber crimes into six categories; fraud, computer trespassing, hardware hijacking, bullying-harassment-stalking, spam, and cyber warfare. Financial fraud is considered to be the most common of the six cyber attacks. The Target Corporation, the third largest U.S. retailer, and its customers were affected in 2013 (Target Corporation, 2013). Despite in place security measures, Target failed to detect...

Words: 1600 - Pages: 7

Premium Essay

Cyberwarfare

..."War is no longer a lively adventure or expedition into romance,matching man to man in a test of the stout-hearted. Instead, it is aimed against the cities mankind has built. Its goal is their total destruction and devastation." - General Dwight D. Eisenhower, Edinburgh, Scotland, October 3, 1946 Discuss the key concepts and ideas of cyberwarfare INTRODUCTION Significant of Paper Methodology of Paper Cyberwar is warfare, hostile influence which is fought in cyberspace. Cyberwar is netwar by the military. It includes hackers, listeners of communications systems, van Elckradiation115 listeners and so on. Cyberwar consists of information terrorism, semantic attack, simulation warfare and Gibson warfare. Typically Cyberwar is warfare, or hostile influence between attack- and defence programs in computers, computer networks and communication systems. For many, the term cyber war conjures up images of deadly, malicious programmes causing computer systems to freeze, weapon systems to fail, thwarting vaunted technological prowess for a bloodless conquest. This picture, in which cyber war is isolated from broader conflict, operates in an altogether different realm from traditional warfare and offers a bloodless alternative to the dangers and costs of modern warfare, is attractive but unrealistic. Such a scenario is not beyond the realm of possibility, but it is unlikely. Cyber warfare will almost certainly have very real physical consequences. Computer technology differs from other...

Words: 5055 - Pages: 21