Introduction
As the information era takes a new shape with introduction of network and digital platforms of communication and mode of doing things, which has been adopted into many sectors such as our personal lives, military, business and even the government, this means that there is an abundance of information available right at our fingertips. But this however faces a serious and more deadly enemy which revolves around hackers that are increasingly posing threats to the digital networks. Warfare is also changing drastically as new and more modern forms of fighting war are been seen without necessarily engaging into the battlefield. For example, the recent American fighting tactics were by use of modern and remote viewing gadgets …show more content…
in his research Cyber-Attacks: The New Front of Warfare a Growing Threat to U.S. Security 2011, says that cyber-attacks that have happened in the current days and those foreseeable in the future are an indication of the threat we face in regards to cyber systems vulnerability. Some of the allies associated with the U.S. such as in 2007 when Estonia was attacked could also very well indirectly have an outward effect on the national security of the U.S. Successive attacks on other countries leading to disruption either financially or in the national security may result in an explosive and negative effect towards the economy or might cause a shift in power balance from a global perspective. That is why the U.S. is taking initiative to assist countries attacked both from a military aid perspective and also financial aid because it is aware of the potential threat results. Since they U.S. has been quite dominant in the military sector over the years, it may see a shift in the way future warfare is conducted and this is one area that it is truly lacking. That is why the U.S. continues to modify it military presence to adapt to changing times thus enable it to defend its allies and itself against future threats and if recent events are anything to go by, then the art of warfare is truly becoming a more complex and dangerous …show more content…
in his A Short History of Computer Viruses and Attacks 2003, said that hacking activities of computer systems started as early as late 1970s which followed into the 80s as computer viruses and worms were developed that could attack computers and result in crashing of systems and softwares. In the 80s also saw the fast rise of hackers into the world as many would infiltrate computer networks and they would successfully code through security. It is reported that during the 80s and most specifically 1983 saw cyber hackers crack through government networks in the U.S. and they were reportedly using home based computers. It was in 1998, that over 500 computers belonging to the U.S. government and military sectors were taken over by hackers where this event was later known as “Solar Sunrise.” The attack was an indication to the government particularly the Department of Defense of the extent to which an attack could be executed by adversaries having better resources and skills. This was particularly worrying to the government because it showed how hackers could easily control and manipulate the country’s control and command center and if used together with military assault, this would be very disastrous. Fortunately for them, the attack was carried out by two citizens from the U.S. mainly teenagers and thus, were glad it was an inexpensive lesson on the relevance of cyber security to a