Due the advancement of the internet cyber warfare becoming increasingly common and dangerous hazard to the digital world. Cyber warfare is a board term that explains the technological force among cyberspace. It is just like a simply digital attacks like computer virus or hacking by country to create a vital destruction or may be death. Use of computer technology to disrupt the activities of state and organization especially the deliberate attacking of information systems for strategic or military purposes is referred to cyber warfare. Whether it is a cyber warfare attack or not is considered according to the several factors like identity of the attacker, what they did, how they did and how much damage. But the individual attacker or group are not considered as cyber warfare and states support for them to create those attacks. Some governments made this as an important role in their military strategies. Although cyber warfare are hard threats they may be soft as espionage and propaganda.
The problem with these are it very hard to find who did this. But mostly attackers take the responsibility after happen and sometimes they aren’t do that. Imagine you wake up with a cyberattack in your country. All the data stored in the government destroyed like birth certificates, health information, education related documents and much more, power supply and water supply disabled, transport system not in work and immigration purposes canceled. This seems unreal. But this may be going happen in such condition. If there a question that anyone may go under cyber warfare and answer is yes.
How cyber weapons work
Nations build their digital armies and they need arm those armies. That means developing new types of weapons. State sponsored cyber warfare sometimes use tools as criminal hackers and sometimes same victim need further more. As a result state sponsored attacker used old hacker standby of denial of service attack. UK’s GCHQ attack is this kind of Cyber Warfare attack. There a big difference between military grade cyber weapons and hacking tools is the most complicated digital weapons want to break things. The weapons used to create real physical damage are most expensive to build and have very short shelf life.
5G is the fifth generation (thus, the "G") of mobile wireless systems, a way for devices, both mobile and stationary, to send and receive data without being plugged into a wall in your home or at the office. Typically, a new generation is named (sometimes retroactively) when it denotes a significant leap in wireless mobile technologies. 5G might enable driverless cars, delivery drones, and may even replace the WiFi in your home and office.
Cyber warfare examples
A recent example comes from Russia - a country implicated of many and various cyberattacks in the country. Russia is accused to escalate many cyber-attacks against Ukraine. It included the black energy attack that cut the power of 70 000 homes in country in 2015. Also the Notpetya malware which called ransomware but it made to destroy whole system. North Korea, which generated headlines on its nuclear-minded and tempestuous diplomatic relationship with the US, was also active in cyberspace. North Korea state is linked to the dangerous hacking organization named HIDDEN COBRA, also known as the Lazaro Group. The Sony hack in 2014 and the hack of Bangladeshi Bank both pinned by those hackers.
Cyber warfare examples
It is very important to have better and well trained cyber security and micro electrical security experts in military and others. That means more familiar with cyber space and flexible people as they can response innovative and complex attacks. The government need to dedicate more funds for the development and betterment of IT infrastructure. Apart from that have to grants business in important institute like hospitals and banks for advance their cyber defense. Awareness programs for people is very essential as they should aware about potential threat.
There is no any international law for cyber warfare. So thelegal states of cyber warfare blurred. But cyber warfare is not covered by law. Lack of sufficient legal framework cause grey area in some states planning to exploit. Those grey area began shrink recently. Then the scholars get together and explain how international law affect to cyber warfare. This is the base of Tallinn Manual. The scholars made a book and backed to NATO-affiliated Cooperative Cyber Defence Centre of Excellence (CCDCoE). The first version of this is about cyber-attacks and second edition needs to build legal framework. This represents when violation of international law in cyber space and how the state respond. There are 154 rules in the manual and consist how lawyers think about international law can be applied in cyber warfare
Finally cyber warfare is already here and it will continue for future. The objective of this article is as explained above to give understanding about cyber warfare, attacks related and future targets. Every person should have good understanding about these things as it will become serious problem in future too.