Impact of Cyber Security on Modern Warfare

Year : 2024 | Volume : 12 | Issue : 03 | Page : 29 33
    By

    Muhammad Aftab Khalid,

  • Ahthasham Sajid,

  • Fariha Shoukat,

  1. Student, Department of Computer Science, Faculty of ICT, Baluchistan University of Information Technology Engineering and Management Sciences, Quetta, Baluchistan, Pakistan
  2. Assistant Professor, Department of Information Security, Riphah Institute of Systems Engineering, Riphah International University, Islamabad, Pakistan
  3. Student, Department of Data Science, Riphah Institute of Systems Engineering, Riphah International University, Islamabad, Pakistan

Abstract

Cyber technology is frequently utilized to share information and data and to develop communication with a nearly infinite audience. This technology has developed a worldwide network. As a contemporary military instrument, cyber technology has the potential to be used in a variety of ways. Today’s cyber warfare dangers might be encountered in a variety of ways since modern cyber warfare has taken a backseat to physical war techniques in the twenty-first century. Extremist groups may also utilize it to spread their religious beliefs. The goal of the dissemination is to generate public support for the terrorist cause and distribute the message. To find and connect with like-minded individuals from across the globe, it is quite inexpensive to use the internet. Additionally, it aids in terrorism-related activities such as fundraising, propaganda, training, and inciting. The ease with which young people can access cyber technology can lead to radicalization in just a few minutes. The potential of cyber technology to promote information and idea sharing—which is acknowledged as a fundamental human right—is just one of its many advantages. To be clear, the same technology may be used to assist terrorism or to incite hatred and violence in society. One problem in the fight against terrorism is the use of cyber technology for radicalization and terrorism.

Keywords: Cyber technology, cyber security, cyberwarfare, terrorism, radicalization, social media

[This article belongs to Journal Of Network security ]

How to cite this article:
Muhammad Aftab Khalid, Ahthasham Sajid, Fariha Shoukat. Impact of Cyber Security on Modern Warfare. Journal Of Network security. 2024; 12(03):29-33.
How to cite this URL:
Muhammad Aftab Khalid, Ahthasham Sajid, Fariha Shoukat. Impact of Cyber Security on Modern Warfare. Journal Of Network security. 2024; 12(03):29-33. Available from: https://journals.stmjournals.com/jons/article=2024/view=180523


References

  1. Ogun MN. Terrorist use of internet: possible suggestions to prevent the usage for terrorist purposes. J Appl Secur Res. 2012;7:203–17. DOI: 10.1080/19361610.2012.656252.
  2. Khan S, Butt KM. Cyber technology, radicalization and terrorism in Pakistan. J Indian Stud. 2017 Dec 31;3(2):119–28.
  3. Meleagrou-Hitchens A, Kaderbhai N. Research perspectives on online radicalisation: a literature review, 2006-2016. 2017. Available from: https://icsr.info/wp-content/uploads/2017/05/ICSR-Paper_Research-Perspectives-on-Online-Radicalisation-A-Literature-Review-2006-2016.pdf
  4. Whittaker J. Online radicalisation: what we know. 2022. Available from: https://home-affairs.ec.
    eu/system/files/2023-11/RAN-online-radicalisation_en.pdf
  5. Khan RA. Meta-analysis of cyber dominance in modern warfare: attacks and mitigation strategies. Turk J Comput Math Educ (TURCOMAT). 2023 Jul 8;14(3):1051–61.
  6. Altmann J, Vidal F, Capurro R, Britz J, Hausmanninger T, Nagenborg M, Nakada M, Weil F. Cyber warfare. Int Rev Inf Ethics. 2013;20:12.
  7. Basholli F. Cyber warfare, a new aspect of modern warfare. In: VI International Scientific Conference on Security, CONFSEC 2022 Dec. 2022. p. 52–4.
  8. Sheth A, Bhosale S, Kurupkar F. Research paper on cyber security. Emerging advancement and challenges in science, technology and management. Contemporary Research in India [Special Issue]. 2021 Apr 23-24. p. 246.
  9. Khan S, Butt KM. Cyber technology, radicalization and terrorism in Pakistan. J Indian Stud. 2017 Dec 31;3(2):119–28.
  10. Katyal NK. Criminal law in cyberspace. Univ Pa Law Rev. 2001;149:1003–14. DOI: 10.2307/331
  11. Weimann G. Cyber-fatwas and terrorism. Stud Confl Terror. 2011;34:765–81. DOI: 10.1080/105762011.604831.

Regular Issue Subscription Original Research
Volume 12
Issue 03
Received 12/09/2024
Accepted 23/09/2024
Published 29/10/2024


Login


My IP

PlumX Metrics