Viruses
Viruses are a self-replicating program that can attach itself to another program or file in order to reproduce. The virus can hide in unlikely locations in the memory of a computer system and attach itself to whatever file it sees fit to execute its code. It can also change its digital footprint each time it reproduces making it even harder to track down in the computer.Worms
Worms do not need another file or program to copy itself; it is a self-sustaining running program. Worms replicate over a network using protocols. The latest incarnation of worms make use of known vulnerabilities in systems to penetrate, execute their code, and replicate to other systems such as the Code Red II worm that infected more than 259 000 systems in less than 14 hours.[5] On a much larger scale, worms can be designed for industrial espionage to monitor and collect server and traffic activities then transmit it back to its creator.Trojan horses
A Trojan horse is designed to perform legitimate tasks but it also performs unknown and unwanted activity. It can be the basis of many viruses and worms installing onto the computer as keyboard loggers and backdoor software. In a commercial sense, Trojans can be imbedded in trial versions of software and can gather additional intelligence about the target without the person even knowing it happening. All three of these are likely to attack an individual and establishment through emails, web browsers, chat clients, remote software, and updates.Semantic attack is the modification and dissemination of correct and incorrect information. Information modified could have been done without the use computers even though new opportunities can be found by using them. To set someone into the wrong direction or to cover your tracks, the dissemination of incorrect information can be utilized.
Israel and Palestine
In the Israel-Palestine conflict cyber attacks were conducted in October 2000 when Israeli hackers launched DOS attacks on computers owned by Palestinian resistance organizations (Hamas) and Lebanese resistance organizations (Hezbullah). Anti-Israel hackers responded by crashing several Israeli web sites by flooding them with bogus traffic.[4]India and Pakistan
Main article: India-Pakistan relations
There were two such instances between India and Pakistan that
involved cyberspace conflicts, started in 1990s. Earlier cyber attacks
came to known as early as in 1999.[4] Since then, India and Pakistan were engaged in a long-term dispute over Kashmir which moved into cyberspace.
Historical accounts indicated that each country's hackers have been
repeatedly involved in attacking each other's computing database system.
The number of attacks has grown yearly: 45 in 1999, 133 in 2000, 275 by
the end of August 2001.[4] In 2010, Indian hackers laid a cyber attack at least 36 government database websites going by the name "Indian Cyber Army".[6] In 2013, Indian hackers hacked the official website of Election Commission of Pakistan in an attempt to retrieve sensitive database information.[7]
In retaliation, Pakistani hackers, calling themselves "True Cyber Army"
hacked and defaced ~1,059 websites of Indian election bodies.[7]According to the media, Pakistan's has been working on effective cyber security system, in a program called the "Cyber Secure Pakistan" (CSP).[8] The program was launched in April 2013 by Pakistan Information Security Association and the program as expanded to