- 8
- 0
- 约6.3千字
- 约 13页
- 2016-08-19 发布于河南
- 举报
cyber attack
Lowercase Letter Name Quiz AccelerEdTM Presented by Cyber attack 1.Brief History of Cyber Warefare(战争) 2.Roles of Computers in Computer Crimes 3.Non-traditional warfare 4.Need for cooperation 5.Security alarm . War has traditionally been by military forces through the use of military weapons (small arms, bombs, shells, rockets etc.), with the aim of limiting or weakening opponents’ military forces, but in this information age , warfare is beginning to change. A country like North Korea could threaten to disrupt or disable US infrastructures (基础设施) without the need of a fighter jet(喷气式飞机) or as much as dropping a bomb(炸弹). Brief History of Cyber Warefare Major use of information warfare was in 1999 when hackers in Serbia(塞尔维亚)attacked NATO (北大西洋公约组织)systems in retaliation (反击)of NATO bombing campaign in Kosovo. In 1979 the first hacker forum was created using messaging board from crude electronics. Further cyber warfare were recorded in 1994 with the stealing of millions of dollars from Citibank(花旗银行) by Russian Vladimir(弗拉基米尔)led group of hackers. 1999 Chinese cyber attacks on and defacing of U.S governmental websites after the accidental bombing of the Chinese embassy in Belgrade(贝尔格莱德), U.S military computer warfare on foreign bank account of Serbian(塞尔维亚人)leaders and Yugoslav(南斯拉夫)president. In 2003, series of assaults code named “Titan Rain” were launch against US government computer systems by hackers traced to China. Roles of Computers in Computer Crimes When cyber warfare is mentioned, other terms that come to mind include: information warfare, cyber attack, cybercrime, cyberspace, computer crime, hacking, etc. Information warfare and cyber attack are sometimes used interchangeably(可交换的) with cyber warfare. The role of computers in cybercrime is divided into 3 groups Computers as target. When computer
原创力文档

文档评论(0)