Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
Cyber Warfare and Physical Security

Cyber Warfare and Physical Security

Ratings: (0)|Views: 39 |Likes:
Published by Nan Hazureen

More info:

Categories:Types, School Work
Published by: Nan Hazureen on Jun 01, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOCX, PDF, TXT or read online from Scribd
See more
See less

11/01/2012

pdf

text

original

 
 
FACULTY OF COMPUTER SCIENCE &INFORMATION TECHNOLOGY 
 
FUNDAMENTAL OF COMPUTER NETWORKIAD2313
Lecturer’s name:
 MR NOOR RIZAL BIN ARBAINTOPIC:CYBER WARFARE & PHYSICAL SECURITY Prepared by:NAN HAZUREEN AZLIN BINTI LONG HAMDAN3112037401
 
Introduction
 
Cyber warfare
refers to politically motivated hacking to conduct sabotage and peeking. Itis a form of information warfare sometimes seen as analogous to conventional warfare
 
althoughthis analogy is controversial for both its accuracy and its political motivation. Governmentsecurity expert Richard A. Clarke, in his book 
Cyber War 
(May 2010), defines cyber warfare asan actions by a nation-state to penetrate another nation's computers or networks for the purposesof causing damage or disruption. The
 Economist 
describes cyberspace as "the fifth domain of 
warfare”, and William J. Lynn, U.S. Deputy Secretary of Defense, states that "as a doctrinal
matter, the Pentagon has formally recognized cyberspace as a new domain in warfare which hasbecome just as critical to military operations as land, sea, air, and space.
 
Literature Review
1.
 
Social Engineering
In the context of security, is understood to mean the art of manipulating peopleinto performing actions or divulging confidential information.
 
While it is similar to aconfidence trick or simple fraud, it is typically trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker nevercomes face-to-face with the victims. "Social engineering" as an act of psychologicalmanipulation had previously been associated with the social sciences, but its usage hascaught on among computer professionals.
2.
 
Surveillance Systems
Surveillance is the monitoring of the behavior, activities, or other changinginformation, usually of people for the purpose of influencing, managing, directing, orprotecting. Surveillance is therefore an ambiguous practice, sometimes creating positiveeffects, at other times negative. It is sometimes done in a surreptitious manner. It mostusually refers to observation of individuals or groups by government organizations, butdisease surveillance, for example, is monitoring the progress of a disease in a community.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->