Iwar Arnstad
   HOME

TheInfoList



OR:

iWar is the term used by
NATO The North Atlantic Treaty Organization (NATO ; , OTAN), also called the North Atlantic Alliance, is an intergovernmental organization, intergovernmental Transnationalism, transnational military alliance of 32 Member states of NATO, member s ...
to describe a form of
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
-based
warfare War is an armed conflict between the armed forces of State (polity), states, or between governmental forces and armed groups that are organized under a certain command structure and have the capacity to sustain military operations, or betwe ...
.


iWar comparisons

iWar is distinct in that
information warfare Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from ''cyberwarfare'' that attacks computers, software, and ...
pertains to issues of intelligence, whereas
cyber-warfare Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic w ...
and
cyber-terrorism Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside t ...
pertain to issues o
extelligence.
These refer to degrees of sensitivity in
military A military, also known collectively as armed forces, is a heavily armed, highly organized force primarily intended for warfare. Militaries are typically authorized and maintained by a sovereign state, with their members identifiable by a d ...
and
infrastructure Infrastructure is the set of facilities and systems that serve a country, city, or other area, and encompasses the services and facilities necessary for its economy, households and firms to function. Infrastructure is composed of public and pri ...
assets, battlefield communications and
satellite A satellite or an artificial satellite is an object, typically a spacecraft, placed into orbit around a celestial body. They have a variety of uses, including communication relay, weather forecasting, navigation ( GPS), broadcasting, scient ...
tactical assessments. iWar refers to attacks carried out over the
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, that target specific assets within
Internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
superstructure, for example:
website A website (also written as a web site) is any web page whose content is identified by a common domain name and is published on at least one web server. Websites are typically dedicated to a particular topic or purpose, such as news, educatio ...
s that provide access to
online service An online service provider (OSP) can, for example, be an Internet service provider, an email provider, a news provider (press), an entertainment provider (music, movies), a search engine, an e-commerce site, an online banking site, a health site, ...
s.


iWar attack

iWar has an example in having been conducted by
denial-of-service attacks In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
, using high volume bombardment during information requests, bottlenecking Internet based computer networking.


In the future

The two trends of increasing vulnerability over the Internet and ease of attack make conflagration of iWar probable.


2008 Russia-Georgian conflict

The
2008 South Ossetia war The August 2008 Russo-Georgian War, also known as the Russian invasion of Georgia,Occasionally, the war is also referred to by other names, such as the Five-Day War and August War. was a war waged against Georgia by the Russian Federation and the ...
heralded the arrival of iWar.The Canadian Press: Russia-Georgian conflict heralds arrival of iWar
/ref>


See also


References


Further reading

* * *


External links


IWS - The Information Warfare Site
Cyberwarfare Information operations and warfare Propaganda techniques Psychological warfare techniques 21st-century conflicts {{mil-stub