Chapter 2 Flashcards

1
Q

what did toeffler identified

A

the three waves in the evolution of warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1st Wave

A

agrarian (Farming) based on the theme of economic production at the time. people used clubs arrows and knives for killing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2nd wave

A

the industrial wave: based on the shift of economic production at the beginning with the industrial revolution. the civil war made the shift in the types of weapons like accurate and deadly rifles and artillery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wave 3

A

the post industrial waves. information warfare including the use of high tech weapons (software) that invades computer systems in order to destroy nation states without the use of traditional armies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information warfare is..

A

when the United States or our allies does it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyber terrorism is

A

When our enemies oppose the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

psychological operations

A

techniques used to influence the state of mind of an adversary

example: in the industrial era involves civilian bombing campaigns designed to break the will of the enemy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

physical destruction

A

These involve physical attacks on information systems (computer networks) where information warfare is used to ultimately create physical destruction.

example: stuxnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information attacks

A

These involve the direct corruption of data without the physical destruction of facilities.

An example would be the introduction of malicious software (computer virus) designed to hobble the normal operation of software within a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

computer virus

A

a piece of computer code that attaches to other software and uses it to spread across computer systems. This generally requires some action on the part of the legitimate user of the computer system (e.g. clicking on an email attachment).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

computer worm

A

a piece of computer code or program that reproduces itself over computer networks. These “seek out” computers and systems it is designed to infiltrate independent of the actions of legitimate users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of service attacks

A

These simply prevent the use of computer systems by legitimate users.

example social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

promotion/ propaganda

A

recruitment of new members with the use of technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what do terrorist groups effectively use to recruit new members

A

websites and social media networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISIS

A

middle eastern terrorist group, islamic state. fought them in Iraq (2003-2011)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hamas

A

a political party in Palestinian territories. At war with Israel.

17
Q

Hezbollah

A

comprised of Shia Muslims based on Lebanon and supported by Iran

18
Q

four types of cyber terrorism

A

Infrastructure attacks
Information attacks
Technological facilitation
Promotion/propaganda