Reference Hub2
Virtual Threats and Asymmetric Military Challenges

Virtual Threats and Asymmetric Military Challenges

C. V. Suresh Babu, P. M. Akshara
ISBN13: 9781668488461|ISBN10: 1668488469|ISBN13 Softcover: 9781668488508|EISBN13: 9781668488478
DOI: 10.4018/978-1-6684-8846-1.ch004
Cite Chapter Cite Chapter

MLA

Suresh Babu, C. V., and P. M. Akshara. "Virtual Threats and Asymmetric Military Challenges." Cyber Security Policies and Strategies of the World's Leading States, edited by Nika Chitadze, IGI Global, 2023, pp. 49-68. https://doi.org/10.4018/978-1-6684-8846-1.ch004

APA

Suresh Babu, C. V. & Akshara, P. M. (2023). Virtual Threats and Asymmetric Military Challenges. In N. Chitadze (Ed.), Cyber Security Policies and Strategies of the World's Leading States (pp. 49-68). IGI Global. https://doi.org/10.4018/978-1-6684-8846-1.ch004

Chicago

Suresh Babu, C. V., and P. M. Akshara. "Virtual Threats and Asymmetric Military Challenges." In Cyber Security Policies and Strategies of the World's Leading States, edited by Nika Chitadze, 49-68. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8846-1.ch004

Export Reference

Mendeley
Favorite

Abstract

Security challenges are faced by every single country on this planet. These threats can occur through violent non-state habitats, any organized group of criminals, economic threats, disasters, or native citizens. In ancient wars, nations used physical forces and weapons as a tool to acquire regions, resources. Whereas, in the future, a wide range of technologies like automated weapons, drones, and cyber warfare may come into action. A single person can control an army of computers, and the person behind the actions can go unidentified. The surging need for the use of computers has greatly imposed an effect on the military. Unlike traditional warfare, where large mobilizations of military forces were involved, in modern warfare, integration with latest innovations in military forces like guided munition systems, explosives, and nuclear weapons are brought into use. As a result, there rises an inevitable need to acquire insight into the field of cyber military technology. This chapter mainly aims to analyse the nation's virtual threats and asymmetric military challenges.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.