CRUNCHER Aug.2015 | Page 22

CYBERWAR It is a fifth generation type of war means instead of fight- ing with weapons and nuclear bombs Now a days hackers of one nation are destroying the others nations communications and obtaining The secrets of the other nations bank details, military details etc. ABOUT CYBER WAR: The nebulous term “cyber warfare” refers to fullon conflict between countries or terror groups featuring digital attacks on computer systems. But its more devastating, violent impacts are considered by many analysts to be largely theoretical at this point. Cyber warfare is the greatest threat facing the United States – outstripping even terrorism – according to defence, military, and national security leaders in a Defence News poll, a sign that hawkish warnings about an imminent “cyber Pearl Harbour” have been absorbed in defence circles. But 45 percent of the 352 industry leaders polled said cyber warfare is the gravest danger to the U.S., underlining the government’s shift in priority – and resources That cyber war tactics might blur with traditional terrorism – were underlined in June 2012, when information security expert Eugene Kaspersky announced his lab’s discovery of the Flame virus that targeted computers in Iran. ATTACKING METHODS: Sabotage: Military and financial computer systems are at risk for the distribution of normal operation and equipment (communication, fuel, power) Espionage and security breaches: These illegal methods are used to disable network, software, computers or internet to steal classified information about Military, political or financial gain. It vitally needed is legislation that would grant at least one capable government organisation the authority to track cyber-intruders and criminals. v “It’s not cyber war, its cyber terrorism and I’m afraid it’s just the beginning of the game,” Kaspersky said at a conference in Tel Aviv. “I’m afraid it will be the end of the world as we know it.” A few months later, Panetta compounded fears when he warned of a “new, profound sense of vulnerability” in the U.S. due to the prospect of cyber warfare. CONCLUSION: Hacking which was just a pass time for many to play tricks on their fellow companions and to display their shills in scripting and other fields of shell level programs have turned to a crime that is not stoppable until it is thought by the ones who use it for destruction -VIGNESHWARAN D R IV year