Cyberwarfare, also known as cyberwar and Cyber Warfare, is the use of computers and the Internet in conducting warfare in cyberspace. A cyber warrior is a person who is highly skilled in the art of Cyber Warfare. The necessary skills that a cyber warrior shall possess will vary in magnitude; however, the key skills shall include: information security, hacking, espionage, and computer forensics (计算札幌取证). Governments, their militaries, law enforcement, and the private sector around the world are taking the initiative to train their people in the-field of cyber warfare. The Internet security company McAfee stated in their 2007 annual report that approximately 120 countries have been developing ways to use the Internet as a weapon and target financial markets, government computer systems and utilities. The cyber warfare terrain includes all aspects of the Internet from the backbones of the web, to the Internet Service Providers, to the varying types of data communication mediums and network equipment. The terrain does not end in a field, mountain range, or a coastline, rather the cyber warfare terrain encompasses the cities, communities, and the world, in which we live. The 21st .century battlefield is comprised of many components that include the Internet and all things that connect from a computer to the Internet. This would include: web servers, enterprise information systems, client server systems, data communication media, network equipment, and the desktops/laptops that are in our businesses and homes. The terrain will also encompass information systems like the electrical grids, telecommunication systems, and various corporate and military robotics systems. There are several methods of attack in cyberwarfare. Cyber espionage is the act or practice of obtaining secrets (sensitive, proprietary or classified information) from individuals, competitors, rivals, groups, governments and enemies also for military, political, or economic advantage using illegal exploitation methods on Internet, networks, software and or computers. Web vandalism refers to attacks that deface web pages, or denial-of-service attacks. This is normally swiftly combated and of little harm. Propaganda is also the common tactics. Political messages can be spread through or to anyone with access to the Internet or any device that receives digital transmissions from the Internet to include cell phones, PDAs, etc. Gathering data is to intercept even modify classified information that is not handled securely, making espionage possible from the other side of the world. There are also distributed Denial-of-Service attacks. Military activities that use computers and satellites for coordination are at risk from the type of attack--equipment disruption, for orders and communications can be intercepted or replaced, putting soldiers at risk. Attacking critical infrastructure and using compromised counterfeit hardware are also tactics in cyber war. Cyber warrior is a person ______.
A.who is good at the art of warfare B.who only provides service to governments and their militaries C.who possesses some key skills, including information security, hacking, espionage, and computer forensics D.who is under training now