Cyber Warfare
Name
Affiliation
Cyber Warfare
Cyber warfare is any felony that is commited using a computer or any other computer related device for example the internet. It spans from cyber fraud activities to a simple act like downloading a music file from the internet. It also include activities like creating a program that will create disturbances to the users of a particular group of computers and also posting text and pictures on the websites that will corrupt the minds of some individuals. When somebody information of a company that is suppose to be confidential is also considered as a cyber-warfare (Waxman, 2011). This activity is a great challenge in 2030 globalization vision for many organizations.
There are very many cyber warfare that can be commited using the computer or with the aid of a computer. The most appropriate way to look at it in detail is identifying them by the types and level of cyber Warfare. Cyber Warfare are a deliberate or unintentional unauthorized task, which cannot be avoided or is in avoidable that that is capable of causing a vagary on the cyberspace resources. The scope of cyber Warfare is expands from hardware, software, data that is stored, data in transit, people, documents and other hardware needed like printer cartridges.
The other Warfare is SQL injection. This is a unique Warfare that targets the web pages of the system application. It cuts down the communication between the database and the system application interface (Debeck, 2011). This Warfare is common in organization where system implementation is taking place. An example is a situation where an Warfare alters the name of the database and hence disconnects it from the user interface (United Nations Office for Disarmament Affairs, 2010). The best measure that can be used to curb this is by limiting the number of the people who has the right to manipulate the database activates and also the punishment that individual that uses a computer to physically hurt another person or tries to commit a felony with an aid of a computer is made severe (Stytz & Banks, 2010). There was also a provision of extensive security to media group that gave hand to the police while carrying out the investigation while the vulnerable Warfare that were frequent were blacklisted so that more security concern were availed in those areas.
Another Warfare that is very rampant is abuse of system access rights. This kind of Warfare is mostly executed by the employees in a company in and intention of vengeance or sabotage. Detecting such issue is cumbersome since the intrusion will be taking place internally and hence task tracking may be a challenge. The employees use his or her right to access the system to make alteration and modification of data with the intension of financial gains for example in an employee in the IT department of a water providing company can reduce the consumption figures of some specific accounts then liaise with the holders of those accounts for payment.
To combat all frauds that are related to inappropriate billing, the people that are authorized to enter the company’s data concerning the customers must exercise the professional ethics to the fullest. Individual that are given this assignment must have the appropriate integrity basing on the previous records. A body that vets such individual should be established. Such a body should be external and should randomly do the auditing to ensure that the way the vetted individuals execute their duties do not deteriorate with time. In addition, a rotational exercise should be in place to stop these individuals from getting acquainted with other employees in other departments and hence conspiracy is avoided. To stop this kind of Cyber Warfare, the company should put in place a tracking system which will compare each consumption figure with the average of the previous five or more months and hence gives an approximate value. In addition, the data security manager should utilize the advantages that the windows active directory has. The Microsoft windows group policy is applied in grouping the different categories of users that are suppose to get access to some particular information. It is a key component that gives specific setups for particular group of users.
Another type of Warfare that that mostly affects the system users who gives commonly known username and password as default credential is unauthorized access via default credential. A good example of this is where the system administrator in an institution put the name of the college as both username and password. This is very vulnerable to Warfare’s because they capitalized the idea of using the default credentials that are related to the institution such as setting the password of accessing the wireless network of Aberdeen College as aberdeencollege. Anyone who knows come within the coverage and has the intention of cracking this password can succeed. To avoid this, the default credential should be unique as in; it should not be related to the name of the institution or the company.
The other Warfare is the violation of acceptable system user policies. In some companies, the system once logged in by the user will remain on till logged out. A user can negligently abandon the system while logged in and go out, this can give an opportunity to unauthorized person to access the system and facilitate any harmful event like altering the data with the intention of causing an embarrassment to the company or the owner. An example of this is where somebody forgets to log from his email account and another person comes and send abusive or vulgar mails to some group of people. This can be detriment to the user’s attribute because everybody believes that the message comes from the rightful owner of the account. To eliminate this Warfare, everybody should be careful while using such system by ensuring that the log out process has been affected anytime you can to quit from using the system.
Nation State
A Nation state is a regional political group for which there is an autonomous composed Government. A Nation state is a state whose essential unwaveringness is to a social character toward oneself, which we call a Nation or nationality, and is currently the transcendent type of state association. Nation states have sway and authenticity. The importance of the Nation state is that, once merged around a specific nationality, it is a stable type of state association. It is the sole structure in which the development of popular government is conceivable and which does not tend to grow its territory (Arendt, 2009). This stable environment ended up being vital for the rise of present day money related, mechanical and innovative civilization in Western Europe in the seventeenth and eighteenth hundreds of years. The main noteworthy contenders were supreme China, which was innovatively exceedingly inventive however did not turned into a mechanical public opinion until current times, and the early Islamic Caliphate, which was likewise mechanically and socially imaginative yet was prevailed over by military and tribal states and afterward declined.
Until Nation states showed up in the sixteenth and seventeenth century, government was by rulers whose power did not determine from the individuals whom they administered, who were termed their “subjects”. States decided in that way had seven separate structures, individual guideline, religious government, city state, theocracy, military state, tribal state, and domain. The key capacity of such a ruler was to attain peace and request, by judging debate and instituting laws by which question could be evaded. This could just be performed if his (infrequently, her) power did not determine from his subjects, and to strengthen that power the idea of authenticity emerged, which characterized a right to govern autonomously of any protected framework. Authenticity must be sure keeping in mind the end goal to be compelling, and a debated authenticity was undesirable and may offer ascent to civil war.
Individual guideline was the ordinary first type of nation state association, very nearly constantly acknowledged by a genetic line. It was for the most part underpinned by a religious approval, truly the ordinary wellspring of profound quality. Theocracies emerged when religious power got to be stronger than particular tenet, in spite of the fact that the two may be joined together. City states emerged in Europe, likewise when particular tenet was powerless, so as to endeavor the included worth possible in terms of professional career. Before the included quality from exchange and industry was accessible to states, the main manifestation of riches was the surplus possible from farming. Particular states accordingly had an innate propensity to try to enlarge their domains, by success, legacy, or different means, and along these lines regional realms emerged. In a few states, the armed force picked up control of its own recruitment and advancement and set up a free military rank, which we call military standard. In a few states with a pastoral hinterland, pastoral tribes built a type of tribal government, additionally for the most part underpinned by a religious assent. In spite of the fact that the center of most regional domains were close to home states, they have additionally been theocracies, city states, military states, and tribal states (Favell, 2010).
The stronghold of a Nation state involved the exchange of authenticity from a ruler not responsible to those he administered to one responsible to the Nation. This emerged as the improvement of riches from enhanced agribusiness, exchange, and industry made a common public opinion. The civil pop culture looked for a common personality, through dialect, religion, regular social associations, and imparted encounters and diversions, and along these lines turned into a Nation. We can distinguish three stages in the improvement of every Nation state. Stage I was the advancement of a nationality inside a plainly characterized pre Nation State. Stage II was the exchange of authenticity from the ruler to the Nation, by some type of disobedience to the ruler or statement of nationality. Stage III was the outflow of that authenticity by a lawful methodology called a Constitution, under which the administration could be named and evacuated, its powers might be wrangled about and affirmed, and both the legislature and private case are liable to law. Most present nation states have made the move to Phase II and of these an expanding number, maybe a greater part; have made the further move to Phase III.
At the point when Nation states emerged they expanded their national riches by taking part in more across the board exchange, and had a common longing to procure exchanging stations. Thusly, exchanging or pioneer domains emerged, which rivaled one another as new exchanging open doors showed up. There were accordingly two sorts of realm, regional and exchanging. From the perspective of the subject people groups, exchanging domains were likewise not established despite the fact that the center state may be. Despite the fact that at the begin of the twentieth century the world’s wealthiest states were Nation states, they were few in number and most of the world’s populace were liable to realms, either regional or exchanging, all of which have now been isolated into states of which the extraordinary greater part are Nation States.
Globalization
Globalization is a standout amongst the most discussed issues of the day. It is all around on TV, on sites, learning diaries, work gathering rooms and in association’s meeting rooms. Strikingly, for so generally an utilized term, there does not seem to have an absolutely concurred definition. One of the much of the time utilized definitions is that globalization alludes to the developing reconciliation of social orders over the world, it has taken numerous structures, and it is hard to talk about it in a general manner. However, the greater part of the times the term is utilized is to allude to the budgetary mix of the world markets. Thusly our principle dialog will be on the monetary joining of the world and what negative impacts of globalization are, particularly the negative impacts Palast (2002) contends that globalization bankrupts the world’s poor, advancing the rich and pulverizing nature’s domain, while few supporters see it as a quick approach to widespread peace and success.
Numerous created nations began to change in the 1980’s after the burden of World Bank and IMF structural modification approaches. Backers would contend that this liberalization would help budgetary development, which will diminish neediness and that nations with more open markets will have encountered higher development rates that those with protectionist strategies (Ades &Glaeser 1999). However, Manenji (1998) contends that unregulated facilitated commerce, driven exclusively by business sector strengths, in that while it has raised expectations for everyday comforts for some individuals, particularly in created nations, it has not done so for the poorest. Following 20 years of exchange liberalization, destitution in numerous nations has not fallen. For instance in horticulture where the poorest make the majority of their living, nourishment imports are halfway in charge of pulverization of little agriculturists, for instance Malawi which creates rice which it sold in most South African nations now need to battle with rice which is sold at much less expensive rates, which is foreign from Asia.
Global exchange foodstuffs is expanding much speedier than nourishment creation; it took off as an aftereffect of exchange liberalization under the IMF, WTO and World Bank. As an outcome more land in creating nations is constantly utilized by expansive multinational organizations to develop nourishment for the fare market, which has suggestions for sustenance creation for nearby individuals. The cost of numerous farming wares, for example, espresso and tea are at close to unequaled lows. This has an expansive hindering effect on poor agriculturists, for the reason that purchasing foreign made sustenance costs are low to the point that there is no good reason for develop them.
Consequently a percentage of the ranchers are currently forsaking espresso and tea developing for pill development and these pills are, no doubt unlawfully transported to the West and destroying the lives of many individuals, which causes the western governments to use limitless measure of cash to battle this issue and blaming creating nations for corrupt conduct by not doing what’s necessary to avert drug development. Inside the created world we can say that the development of medication creating plants, for example, the opium poppy is not a satisfactory thing to do, yet reprimanding those nations of corrupt conduct and rebuffing them monetarily and politically won’t take care of the current issue. Hence the Governments must thoroughly consider contrasts in social circumstances, technique and why it has happened and get to the base of the issue, when this will be carried out it will be clear to see that there is nothing to do with ethics however with circumstances those nations are continuously pushed into. For associations and nations not handling the issues in just ways is basically getting to their decision for one set of movements over an alternate set of activities. The way that distinctive parts of the world have diverse good practices shows none, of these that they are all just as great nor that any of them is fundamentally improper (de George, 1978). There is nothing the matter with that; however, there is nothing right with that either.
The ideal approach to manage globalization is frankly about it. Globalization brings open doors yet it likewise brings dangers, actually, when neediness falling largely there could be local builds about which public opinion needs to be concentered. Particularly for the creating nations, with their potential absence of recourses for state-of-the-art enactment, it is paramount to recollect that not everything that is lawful is correct. Lawfulness is frequently just the moral least. Subsequently where national principles are deficient, the organization would need to implement their higher gauges and not exploit them. Business is a piece of our public and morals has put good to go as in any viable a piece of social life (de George, 1978).
Recommendations
The following recommendations will help prevent the world from cyber warfare:
The recommendation that I give concerning the security issues that are brought about by all the cyber related issues is that any weakness that can give the Warfare a room to get access to any computer or internet-based materials should not be left. In addition, severe punishment should be put in place for anybody that is convicted with any cyber warfare activity so that the others may fear to engage on it (Knapp & Boulton, 2006). In addition, any other party that handles any internet related information that is meant to be used at any event should be vigilant because some of the employees in these places conspire with the warfare in accomplishing the Warfares. This can be done by applying group policy settings in the computers that those users that do not need to get access to such sensitive information are locked out.
The last layer of the group policy object is used by the administrator to lock down the computers that those particular users operate by applying policy setting to each user (United Nations Office for Disarmament Affairs, 2010). The properties of multiple local group objects are derived from the processing order. The processing order of the three layers differs. The third layer contains specific user settings that are set to one user on a computer that he/she uses.
One way of ensuring this setting is by redirecting the desktop components that you do not want those specific users to get access. The other way of doing this is by redirecting the start menu and giving the computer a different start menu for example that of windows 9x/NT.
Moreover, the investigation department that deals specifically with cyber warfare should be established and all the laws and regulation governing the cyber warfare must be redefined such that any sign of cyber related warfare is punished.
Conclusion
Basing on the rate at which the technology is evolving, the future of Cyber Warfare, Globalization, and change states to Nation State is unpredictable. This is because the people who engage themselves in cyber warfare and Globalization are also professionals in the field who could be having the intension to cause harm or could be some who are trying to text their prowess in technology and as a result execute a felony. In general, the best way to combat the whole thing is by ensuring that everybody who interacts with the computer becomes conscious and practices the professional ethics as cyber warfare can destroy the world.
References
Ades, A and Glaeser, E (1999) Evidence on Growth, Increasing Returns and the extent of the Market, Quarterly Journal of Economics: 114(3), pp.1025-1046
Arendt, H. (2009). The Decline of the Nation-State and the End of the Rights of Man.
De George, R (1978) Ethics, free enterprise and Public policy, Oxford: Oxford University Press.
Favell, A. (2010). Integration nations: the nation-state and research on immigrants in Western Europe. Selected Studies in International Migration and Immigrant Incorporation, 1, 371.Palast, G (2002) The best democracy money can buy, London: Pluto Press. Manenji, F (1998) the effects of globalization on culture in Africa in the eyes of an African woman, www.wcc-coe.org/wcc/what/jpc/effglob.html Mohamad, M (2002) Globalization and Developing Countries, www.globalpolicy.org/globaliz/define/1009malaysiamp.htm
Debeck, C. (2011). The Correlates of Cyber Warfare: A database for the modern era.
Dipert, R. R. (2010). The ethics of cyber warfare. Journal of Military Ethics, 9(4), 384-410.
Stytz, M. R., & Banks, S. B. (2010). Addressing Simulation Issues Posed by Cyber Warfare Technologies. SCS M&S Magazine. n (3).
United Nations. Office for Disarmament Affairs. (2010). Cyber warfare and its impact on international security (No. 19). United Nations Publications.
Waxman, M. C. (2011). Cyber-Warfare and the Use of Force: Back to the Future of Article 2 (4). Yale J. Int’l L., 36, 421.