Cyber warfare is the use of computers and the Internet in conducting
warfare in cyberspace.
Cyber Warrior:
A Cyber Warrior is a person who is highly skilled in the art of Cyber
Warfare. Governments, their militaries, law enforcement, and the
private sector around the world are taking the initiative to train
their people in the field of cyber warfare.
Cyber Warfare Terrain:
The cyber warfare terrain includes all aspects of the Internet from
the backbones of the web, to the Internet Service Providers, to the
varying types of data communication mediums and network equipment. The
terrain does not end in a field, mountain range, or a coastline,
rather the cyber warfare terrain encompasses the cities, communities,
and the world, in which we live. The 21st century battlefield is
comprised of many components that include the Internet and all things
that connect from a computer to the Internet. This would include: web
servers, enterprise information systems, client server systems,
datacommunication media [i.e., Cable, DSL, T1-T3, OC12-OC48, frame
relay, ATM, varying types of satellites, oceanic cables, etc.],
network equipment, and the desktops/laptops that are in our
businnesses and homes. The terrain will also encompass information
systems like the electrical grids, telecommunication systems, and
various corporate and military robotics systems.
Cyber Warfare Tactics:
There are several methods of attack in cyberwarfare, this list is
ranked in order of mildest to most severe.
* Cyber espionage: Cyber espionage is the act or practice of
obtaining secrets (sensitive, proprietary or classified information)
from individuals, competitors, rivals, groups, governments and enemies
also for military, political, or economic advantage using illegal
exploitation methods on internet, networks, software and or computers.
* Web vandalism: Attacks that deface web pages, or
denial-of-service attacks. This is normally swiftly combated and of
little harm.
* Propaganda: Political messages can be spread through or to
anyone with access to the internet or any device that receives digital
transmissions from the Internet to include cell phones, PDAs, etc.
* Gathering data: Classified information that is not handled
securely can be intercepted and even modified, making espionage
possible from the other side of the world. See Titan Rain and
Moonlight Maze.
* Distributed Denial-of-Service Attacks: Large numbers of
computers controlled by one person launch a DoS attack against systems
* Equipment disruption: Military activities that use computers and
satellites for coordination are at risk from this type of attack.
Orders and communications can be intercepted or replaced, putting
soldiers at risk.
* Attacking critical infrastructure: Power, water, fuel,
communications, commercial and transportation are all vulnerable to a
cyber attack.
* Compromised Counterfeit Hardware: Common hardware used in
computers and networks that have malicious software hidden inside the
software, firmware or even the microprocessors.
Continue reading: http://en.wikipedia.org/wiki/Cyberwarfare