Tuesday, February 4, 2020

Cyber Warfare in China Term Paper Example | Topics and Well Written Essays - 5000 words

Cyber Warfare in China - Term Paper Example Moreover, it is difficult to identify the sources of attack since the hackers can strike the target precisely without leaving many evidences about the culprits. Cyber warfare will involve disruption of crucial network services and data, damage to critical infrastructure, and the creation of uncertainty and doubt among opposing commanders and political leaders. Cyber-attack provides an ability to strike both tactical and strategic targets from a distance using inexpensive systems China is often been accused for its involvement in cyber warfare with its enemy countries like America, India etc. People’s Liberation Army (PLA) of China is accused for conducting cyber warfare with many other countries. In fact, â€Å"PLA takes cyber war seriously as this kind of warfare offers an immediate way for the country to overcome the superiority of the U.S. in warfare techniques and weaponry† . America is one country which has superior military power than China. Based on the current capabilities, it is difficult for China to attack America directly. So, they are believed to be causing huge problems to America with the help of cyber warfare. Same way, India is another country which is working against the interests of China. India’s has frontier disputes with China. Moreover, the acceptance given to the Tibetan leader Dalai Lama by India is indigestible to China. So they are causing huge problems to India with the help of cyber warfare. Because of the necessities of instant interchange of information between countries located at different parts of the world, most networks and the computers in the world are connected in some ways. In a heavily globalized world, it is difficult for a country to isolate its computer networks from global networks. Moreover, majority of the computers in the networks are using same operating systems and networking technologies because of the monopoly of some companies in these sectors. For example, Windows is used as the operating system in majority of the computers all over the world. Same way, TCP/IP protocols are used in majority of the computer networks. Although a completely accurate map of the overall Net has not been produced, it is logical to reason that the 95% of privately owned networks are connected to each other in some way. The interoperability benefits of standardized protocols and the spread of recently devised worms and viruses such as Nimda and Sasser are testament to th e links between these networks4. China has superior internet related technologies compared to many other countries in the world. Moreover, many of the Chinese youths are currently getting training on computer software. China knows very well that they can cause huge problems to enemies silently and escape from getting punished by others. â€Å"After land, sea, air and space, warfare has entered the fifth domain: cyberspace†5. Until recent times, military powers were keen in accumulating arms and for land, sea, air and space attacks and defense. However, the development of internet or cyber space opened another domain for

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.