IJMTES – Paper Presented in: ‘2 day State Level workshop on Cyber Fest 17’, conducted by: ‘Department of Computer Engineering, Marathwada Mitra Mandal College of Engineering, Pune’ on 22-23 Feb 2017

Journal Title : International Journal of Modern Trends in Engineering and Science

Paper Title : CYBER ATTACKS AND INFORMATION WARFARE ON SOCIAL MEDIA

Author’s Name : Nidhi Kelaunnamed

Paper Presented in : ‘2 day State Level workshop on Cyber Fest 17’, conducted by: ‘Department of Computer Engineering, Marathwada Mitra Mandal College of Engineering, Pune’ on 22-23 Feb 2017

Volume 04 Issue 05 2017

ISSN no:  2348-3121

Page no: 61-62

Abstract – The main purpose of this paper was to use the rising discipline of futures studies through the means of social science to genetare new things about Information Warfare and will look at all the types of Cyber attacks with the context of Cyber Warfare’s. Information warfare is the tactical and strategic use of information to gain an advantage. Information warfare is also known as cyber warfare, electronic warfare and cyber attack. Information Warfare has recently become of increasing importance to the military, the intelligence community, and the business world. It has become the concept for understanding cyber war, hacker war, netwar, and other network related conflicts. Information warfare is a concept of information society conflicts and threats. Information warfare means the use of information during the crises or during achievement of certain objective.

Keywords— Cyber Warfare, Information Warfare, Cyber Attack

References

  1. Alberts, D.S. & Czerwinski, T.J. 2002. Preface. In Alberts, D.S. & Czerwinski, T.J. (Eds.), Complexity, Global Politics and National Security. 2nd edition. Honolulu: University Press of the Pacific.
  2. Daniel E Magsig, Information Warfare In The Information Age, 1996.
  3. Dr. David S. Alberts, Defensive Information Warfare, NDU Press Book, 1996.
  4. http://www.ndu.edu/ndu/inss/books/diw/index.html
  5. Russel Deborah and Gangemi G.T., Computer Security Basics, (O’Reilly & Associates, 1994)
Scroll Up