International Journal of Social Science & Economic Research
Submit Paper

Title:
HOW CYBER WARFARE CONTROLS MODERN-DAY CROSS-BORDER POLITICS

Authors:
Abhinav Chaudhary

|| ||

Abhinav Chaudhary
Delhi, India

MLA 8
Chaudhary, Abhinav. "HOW CYBER WARFARE CONTROLS MODERN-DAY CROSS-BORDER POLITICS." Int. j. of Social Science and Economic Research, vol. 7, no. 10, Oct. 2022, pp. 3314-3334, doi.org/10.46609/IJSSER.2022.v07i10.008. Accessed Oct. 2022.
APA 6
Chaudhary, A. (2022, October). HOW CYBER WARFARE CONTROLS MODERN-DAY CROSS-BORDER POLITICS. Int. j. of Social Science and Economic Research, 7(10), 3314-3334. Retrieved from https://doi.org/10.46609/IJSSER.2022.v07i10.008
Chicago
Chaudhary, Abhinav. "HOW CYBER WARFARE CONTROLS MODERN-DAY CROSS-BORDER POLITICS." Int. j. of Social Science and Economic Research 7, no. 10 (October 2022), 3314-3334. Accessed October, 2022. https://doi.org/10.46609/IJSSER.2022.v07i10.008.

References

[1]. Anon, 10 ways to reduce cybersecurity risk for your organization. Upguard. Available at: https://www.upguard.com/blog/reduce-cybersecurity-risk [Accessed September 22, 2022].
[2]. Anon, 2021. What is cyber warfare: Types, examples & mitigation: Imperva. Learning Center. Available at
[3]. : https://www.imperva.com/learn/application-security/cyber-warfare/[Accessed September 22, 2022].
[4]. Anon, 2022. Iran–Saudi Arabia proxy conflict. Wikipedia. Available at: https://en.wikipedia.org/wiki/Iran%E2%80%93Saudi_Arabia_proxy_conflict
[5]. [Accessed September 22, 2022].
[6]. Anon, 2022. Russian interference in the 2016 United States elections. Wikipedia. Available at:
[7]. https://simple.wikipedia.org/wiki/Russian_interference_in_the_2016_United_States_ele ctions [Accessed September 22, 2022].
[8]. Anon, 2022. Secondary research: Definition, methods, & examples. Qualtrics AU. Available at:
[9]. https://www.qualtrics.com/au/experiencemanagement/research/secondaryresearch/?rid=ip&prevsite=en&newsite=au&geo=IN&geomatch=au [Accessed September 22, 2022].
[10]. Anon, 2022. Shamoon. Wikipedia. Available at: https://en.wikipedia.org/wiki/Shamoon [Accessed September 22, 2022].
[11]. Anon, 2022. Sony Pictures hack. Wikipedia. Available at: https://en.wikipedia.org/wiki/Sony_Pictures_hack [Accessed September 22, 2022].
[12]. Anon, 2022. Stuxnet. Wikipedia. Available at: https://en.wikipedia.org/wiki/Stuxnet [Accessed September 22, 2022].
[13]. Anon, 2022. WannaCry ransomware attack. Wikipedia. Available at: https://en.wikipedia.org/wiki/WannaCry_ransomware_attack [Accessed September 22, 2022].
[14]. Anon, What is cyber warfare? Fortinet. Available at: https://www.fortinet.com/resources/cyberglossary/cyber-warfare#:~:text=Cyber%20Wa rfare%20is%20typically%20defined,denial%2Dof%2Dservice%20attacks [Accessed September 22, 2022].
[15]. Djs, 2021. Pros and cons of cyber warfare. Bohatala. Available at: https://bohatala.com/pros-cons-cyber-warfare/ [Accessed September 22, 2022].
[16]. Elazari, K., 2021. Cyber warfare in global conflicts. Iberdrola. Available at: https://www.iberdrola.com/shapes-en/keren-elazari-cyber-warfare-in-context-of-global- conflicts [Accessed September 22, 2022].
[17]. Gazula, M.B., 2017. Cyber Warfare Conflict Analysis and Case Studies. MIT CAMS. Available at: https://cams.mit.edu/wp-content/uploads/2017-10.pdf [Accessed September 22, 2022].
[18]. Menon, N., 2021. The potential impact of cyber capabilities on future strategy. E-IR. Available at: https://www.e-ir.info/2021/05/05/the-potential-impact-of-cyber-capabilities-on-future-st rategy/ [Accessed September 22, 2022].
[19]. O'Neil, M., 2016. Cybercrime dilemma: Is it possible to guarantee both security and privacy? Brookings. Available at: https://www.brookings.edu/articles/cybercrime-dilemma-is-it-possible-to-guarantee-bot h-security-and-privacy/ [Accessed September 22, 2022].

ABSTRACT:
Cyber warfare allows a nation to weaken, disrupt and destroy enemy nations by attacking them in cyberspace without putting any actual human lives on the line. Today, all systems and individuals have become interconnected and interdependent to a point never imaginable before. Further, the military’s reliance on computers and network systems has also increased exponentially. While this interdependence and interconnectivity provide various workflow advantages, it also makes these networks a ripe target for cyber attacks. These attacks are capable of disrupting a nation’s most critical civilian systems namely communication, finance, healthcare, transportation, etc. as well as military systems. These matters concerning national security have made cyberspace a subject of high political importance. Cyber-attacks and cyber-warfare have entered the arsenal of modern warfare and being preemptive by setting up enhanced defenses against these attacks is our only option. This research paper aims to analyze and document various instances of cyber warfare in the past years. This analysis will help us define what cyber warfare is and its extent. We stand to learn the various approaches taken by different governments to orchestrate such an attack. Further, we’ll try to understand the strategies put in place by various current governments of the world trying to shield themselves from such an attack. Lastly, we’ll look into how the advent of cyber warfare will change the world in years to come forcing governing agencies of the world to come up with laws or a single autonomous body to stop cyber warfare.

IJSSER is Member of