{"id":762,"date":"2010-11-15T10:51:49","date_gmt":"2010-11-15T10:51:49","guid":{"rendered":"http:\/\/blog.soton.ac.uk\/comp6044\/?p=762"},"modified":"2010-11-15T10:53:07","modified_gmt":"2010-11-15T10:53:07","slug":"cyberwarfare-general-study","status":"publish","type":"post","link":"https:\/\/blog.soton.ac.uk\/comp6044\/2010\/11\/15\/cyberwarfare-general-study\/","title":{"rendered":"CyberWarfare &#8211; General Study"},"content":{"rendered":"<p>This week I decided to increase my understanding of CyberWarfare in general. I have read several articles and reports; \u00a0and, I have watched several videos on this issue from my IGOOGLE News feed.<\/p>\n<p>Things that I found interesting: Adam Segal is a Senior Fellow on the council of foreign relations. He talks about attacks on other people\u2019s infrastructure, websites, espionage, copyrights and so forth. As society we are mainly concerned with identity theft and someone taking our credit cards, however, in some places the individuals that get hold of this information are often used by the state for political reasons. \u00a0For example, attacks on Estonia. Some had relations to the Russian mafia. Similarly, attacks by Google were considered routine by security experts. It has been reported that China has been continuously trying to hack into GMAIL accounts of human rights activists.<\/p>\n<p>\u00a0It raises the notion as to how much the Chinese government has gained from CyberWarfare thus far if \u201camateur hackers\u201d\u00a0with surreptitious affiliations with the state are blamed.<\/p>\n<p>\u00a0According to Cyber experts, the criminals attack GMAIL accounts by a tactic known as \u201cphishing\u201d claiming to come from someone the user knows and trust. This highlights how easy it can be for individuals to get involved in releasing highly sensitive information without ever knowing. Therefore, for next week, I plan to learn more about understanding Computer Science and the common\u00a0Cyber methods used compare it to my understanding of Moral Philosophy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week I decided to increase my understanding of CyberWarfare in general. I have read several articles and reports; \u00a0and, I have watched several videos on this issue from my IGOOGLE News feed. Things that I found interesting: Adam Segal is a Senior Fellow on the council of foreign relations. He talks about attacks on [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-762","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts\/762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/comments?post=762"}],"version-history":[{"count":4,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts\/762\/revisions"}],"predecessor-version":[{"id":764,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/posts\/762\/revisions\/764"}],"wp:attachment":[{"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/media?parent=762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/categories?post=762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.soton.ac.uk\/comp6044\/wp-json\/wp\/v2\/tags?post=762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}