1 / 8

Military

Military. Cyber Warfare S mart Weapons Development Espionage. Cyber Warfare. The use of the internet to wage war in the virtual world that effects the real world. Types of Cyber Warfare. Web Vandalism Propaganda Gathering Data Equipment Disruption Attacking Critical Infrastructure.

ownah
Download Presentation

Military

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Military Cyber Warfare Smart Weapons Development Espionage

  2. Cyber Warfare The use of the internet to wage war in the virtual world that effects the real world.

  3. Types of Cyber Warfare • Web Vandalism • Propaganda • Gathering Data • Equipment Disruption • Attacking Critical Infrastructure

  4. Smart Weapons Development • what are smart weapons? This is the deployment of high performance computing into already existing war machinery such as planes, tanks, bombs, torpedoes and so on. These laser guided machinery have high performing multi-processors that find it difficult to operate under the circumstances they operate under hence enclosures are built for them to be kept inside missiles etc to keep them working. This makes us think of the costs!

  5. Advantages/disadvantages • Pilotless • More manoeuvrable • Carry more harmful substances • The bigger the sting the bigger the damage • Waste of computers • Price of maintenance • No one is responsible if ‘something’ goes wrong

  6. How smart weapons work... • They are programmed to run on 5 simple ‘search and destroy’ steps: • Detection of target area. • Detection of target itself. • Orientation of target. • Target recognition. • Weapon release. • Find out more HERE

  7. Espionage A form of intelligence gathering which involves active penetration of a location where sensitive data is stored and is the systematic use of spies to get military or political secrets without permission of the holder of the information. Basically, espionage is spying.

  8. Thank You

More Related