Cyber Security and Cyber War

  • Kartikeye Joshi
  • Show Author Details
  • Kartikeye Joshi

    Student at Law College Dehradun, Faculty of Uttaranchal University, India

  • img Download Full Paper

Abstract

Dependence on laptop systems has had a transformative effect on human society. Cybernetics is now woven into the core features of without a doubt every essential institution, together with our oldest ones. War is one such business organization, and the virtual revolution’s effect on it has been profound. The American army, which has no peer, is form of absolutely reliant on excessive-tech laptop systems. Given the Internet’s ability for entire-spectrum surveillance and records disruption, the marshaling of laptop networks represents the subsequent stage of cyberwar. Indeed, it's miles upon us already. In Cybersecurity: What Everyone Needs to Know, said professionals Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics took place and provide a purpose of wherein it's far headed. They start with an evidence of what cyberspace is earlier than shifting directly to discussions of the way it may be exploited and why it's so hard to shield.

Type

Research Paper

Information

International Journal of Law Management and Humanities, Volume 4, Issue 4, Page 496 - 508

DOI: https://doij.org/10.10000/IJLMH.111335

Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution -NonCommercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/), which permits remixing, adapting, and building upon the work for non-commercial use, provided the original work is properly cited.

Copyright

Copyright © IJLMH 2021