Cyber Warfare And Pop Culture

Improved Essays
Abstract
This paper presents information derived from peered reviewed works on the topic of cyber warfare that was gathered using the Virginia Wesleyan College Online Library. Cyber warfare is often categorized with nuclear, chemical and biological weapons as a potential weapon of mass destruction (WMD). Cyber warfare is at its basic level the gathering of electronic information. The term cyber warfare is often exploited to describe a new type of warfare and to create the notion that computers and networks are a new battlefield. Habitually, especially in pop-culture, this leads to an enlarged version of an imaginative story which many stand to benefit from. This paper aims to shed light on such hoaxes and hypes while telling the story of cyber

Related Documents

  • Decent Essays

    The internet, is it changing the way we think? An article written by John Naughton strives to challenge the reader to think on the social, political and cultural effect the internet has on humans. The target audience of his piece is the mature reader, familiar with psychology, or philosophy or technology. The piece would appeal to a person interested in just one of those fields, as the article touches on each subject. John Naughton provides his answer to is the internet changing the way we think through three strong rhetorical choices, the opinions of others, questions posed, and claims in juxtaposition.…

    • 294 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Technology can prove to be both a benefit to our lives as well as a hindrance. Today, people have come to rely on technology and the Internet to function in everyday life. While it helped advance our society to a great degree, it has also created new issues such as cyberbullying, Internet addiction, and “catfishing”—pretending to be someone else online for the purpose of tricking another individual. Carl Hiaasen discusses both the pros and cons of technology in the novel Skink: No Surrender. He uses connects technology with nature to show both how it can be important but not always necessary, and he uses unique, resourceful characters to deal with the situation their own way.…

    • 1967 Words
    • 8 Pages
    Superior Essays
  • Great Essays

    In M.Fawcett’s essay, Google Never Forgets: A Cautionary Tale, the author warns the readers to be extra careful of what you decide to post on the Internet. The Internet creates the digital equivalent of an unauthorized biography to record your thoughts, life experiences, as well as your embarrassing stories. With the strong search engine, Google records everything you put on the web including many years before. Having an online existence comes with many implications. There are types of services, media, social networks and details that can create an individual’s online existence.…

    • 1662 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Cyberwarfare In America

    • 242 Words
    • 1 Pages

    Looking at above, they are the some of important and critical target which comes under cyberwarfare in America. As the term cyberwarfare is not just only applicable to the inside activities of country itself thought it’s not limited to that; cyberwarfare also includes the attacks which are made by other nation. One of the most targeted nation among the countries is United States of America and the most of them comes from the China, including satellite in the space are also attacked by them, with supporting example “In January 2007, China used a grounded-based missile to destroy a defunct weather satellite in orbit some 500 miles above the earth’s surface” (Douglas, and Melik 138). In America, most of their services are depended on the satellites…

    • 242 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Hackers In Pop Culture

    • 1655 Words
    • 7 Pages

    Pop culture and mainstream media influences must be explored in order for people to fully understand how society’s perception of hackers has changed over the last 50 years. Before the 1980s, hacking was nothing more than computer enthusiasts modifying computers and phone phreaks exploiting phone networks to make free calls. Many people did not know what a hacker was until the 1980s when hacker groups began to form and engage in illegal activities. Personal computers were becoming more popular in the 1980s and many people were just learning how to use them. Some hackers took advantage of this and would access systems illegally for personal gain.…

    • 1655 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Cyber warfare is defined as “actions by nation-state used to invade another nation´s networks or computer to cause damage and disruption.” Today we can also see that cyber warfare is being used by terrorist organizations, companies, political or ideological extremist groups as well. From a rational perspective, ethical decision-making involves balancing risk between mission, soldiers and civilians.…

    • 913 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Abstract This case study examines the correlations between the cyber-attack on Sony and the release of the movie ‘The Interview,’ and the reaction of the American public. After the recent cyber-attacks on Sony, cyber warfare is becoming more recognizable as the new form of global terrorism. The problems of this case study involve the outrage of North Korea, the freedom of the American people, and the damage done to Sony as a business directly and indirectly. This case study begins to explain how cyber warfare represents a dangerous weapon that has the potential to alter the way the world conducts war. Sony Case Study: A Cyber War with North Korea Sony Computer System Hacking On November 22, 2014, Sony computer systems were hacked as well as a number of other areas such as gaming systems, customer accounts, and Sony websites.…

    • 945 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Case Study: Anonymous

    • 1979 Words
    • 8 Pages

    Case study: Anonymous While the motivation of terrorist acts remains the same, the rapid evolution of technique has provided to those that use terror as a method to attain their goals, new weapons with a potential that is not fully quantified. The database, the measures of protection and security, the equipments meant to reassure our safety are exposed to those new types of weapons, the traditional methods of fight becoming impractical. The cyber-crimes are a supplement for cyber-terrorism in what concerns the methods used although the motivations are different from each person. Many of these attacks are made either to produce anarchy, for amusement, to reaffirm the hacker?s position, or from a political motivation.…

    • 1979 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    That same year, cyber space was adopted by the military as the fifth domain of warfare (Rowen, 2016). Since then, the Army has been racing to react to this new battlefield by assigning new CI agents directly from Counterintelligence Special Agent Course (CISAC) to specialized cyber units with limited knowledge in computer systems, networks, and CI as a whole. The current process is undermining and weakening the necessary support, strength, and expertise to mitigate, neutralize, and exploit Foreign Intelligence Entities and International Terrorist Organizations in the cyber domain. When Soldiers are accepted to CISAC and become a CI Special Agents, the Soldiers are taught the basics of the multiple disciplines in the CI field. Support cyber is barely covered in the course brief compared to the other…

    • 1295 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Cyber warfare is now commonplace throughout the world because just about any country can do it. This causes it to have many various effects throughout the world. “Cyberwarfare is Internet-based conflict involving politically motivated attacks on information and information systems.” (Rouse, 2010) Not much is actually known about the effects of cyber warfare because most cases either go undiscovered or are seen as warnings.…

    • 1814 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Spear Phishing Attacks

    • 747 Words
    • 3 Pages

    The digital revolution, which started in the 1950s, has introduced us as to the cyber world. Thanks to the Internet and wireless technologies, the information-sharing has revolutionized the world, made significant enhancements in science, engineering, and medicine; created a large number of billionaires and has a tremendous impact on our daily life. It also rendered the physical boundaries between the countries less significant because most of the mankind is now very well-connected and interacts through the Internet on a regular basis. Despite of all the glorious advantages and the fantastic wonders of the cyber age, nations have to deal with the serious threats of cyberwarfare. Since 1998, Internet usage has been prevalent, which has opened…

    • 747 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyberwarfare Report

    • 809 Words
    • 4 Pages

    Cyberwarfare is defined as a new generation of war that uses computers and software to attack networks and acquire data or damage important infrastructures to get advantage in a military campaign. Nowadays, cyber espionage to obtain access to data bases is common. By using viruses or spyware hackers can invade military or governmental networks to get classified information in order to gain intelligence. An example was the cyber spy GhostNet supposedly used by China in 2009. According to the report presented by the National Security Institute (NSI) (2009), there is “documented evidence of a cyber espionage network—GhostNet—infecting at least 1,295 computers in 103 countries, of which close to 30% can be considered as high-value diplomatic, political,…

    • 809 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Virtual Conflicts

    • 2069 Words
    • 9 Pages

    The compositional dichotomy of virtual space creates a dynamic that, among other things, can cause states to lack a unified language and vision of virtual warfare. A large part of this division is driven from their divergent interests and relative power. An anecdote of this was showcased at the Budapest Conference on Cyberspace (2012) as well as the World Conference on International Telecommunications in Dubai (2012), when both conferences were back-to-back episodes of continual disagreements between predominantly Western caucuses holding a conception of virtual space as an international space for the free exchanges of information and non-Western predominantly authoritarian caucuses who advocated for national control of information spaces and…

    • 2069 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Islamic Extremists

    • 759 Words
    • 4 Pages

    Advancements in new technology have helped birth a globalization effect around the world, by providing lightning fast communications at a low cost. The United States now faces new threats created by these technologies, such as the Internet. Moreover, Islamic extremists have had significant success in tormenting the world and generating devastating assaults producing mass casualties. These mass casualty attacks are a physical form of violence which manifest in ways, such as shootings, bombings, stabbings, or utilizing vehicles to cause destruction. While deadly attacks are occurring throughout the world, a vastly different threat arises from the Internet which has helped bring the world together.…

    • 759 Words
    • 4 Pages
    Improved Essays