Argument Table for E-Warfare

Argument Table for E-Warfare

|Introduction |
|The extensive use of computer networks in today’s workplace has led to the genesis of a novel concept, namely, information warfare. |
|The use of viruses and worms provide malicious users a tactical advantage as well as strategic advantage over their adversaries. |
|The essay will describe how information warfare (IW) can be used to gain a strategic as well as tactical advantage over businesses, military|
|and personal users. |
|Consequences and remedial actions will also be discussed |
|What is information warfare and how is it applied? |
|The major IW actors |Lofaro 1998, vertical and horizontal cultures |
|Three types of information warfare |Elbirt 2003, there are three types of information warfare |
|Defensive |[Write about the intents and steps involved also] |
|Offensive |Overill 2001, tools and techniques have been mentioned here |
|Exploitative |[The three types are explained here as well] |
|Tools used in information warfare | |
|Virus, Trojans, Worms |...

Similar Essays