Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
target. As the Internet becomes more a way of life with us,it is becoming easier for
its users to become targets of the cyberterrorists. The number of areas in which
cyberterrorists could strike is frightening, to say the least. The difference between
terrorist's side, with no danger to him at all. We also glimpse into the reasons that
caused terrorists to look towards the Web, and why the Internet is such an
attractive alternative to them. The growth of Information Technology has led to the
maximum havoc within a small time span. Various situations that can be viewed as
acts of cyberterrorism have also been covered. Banks are the most likely places
to receive threats, but it cannot be said that any establishment is beyond attack.
Tips by which we can protect ourselves from cyberterrorism have also been
weaknesses of existing systems, and figure out ways of ensuring the world's safety
from cyberterrorists. A number of issues here are ethical, in the sense that
computing technology is now available to the whole world, but if this gift is used
and mitigate cyberterrorism for the benefit of society, try to curtail its growth, so
CYBER TERRORISM
Andrey, Frederick, and Phillip (the Week Three team) aim to help promote
awareness about the dangers of Cyber Terrorism and Cyber Warfare. Many
individuals may not even be aware that Cyber Terrorism and Cyber Warfare exist
and as such are unaware of the damage it can cause. The Week Three team’s
how these attacks impact a nation, techniques used in the perpetration of these
attacks, and security measures that can be taken to guard against these attacks.
Purpose
ourselves. It is our purpose to raise awareness of this issue that affects many lives
today.
Scope
Initial analysis of what Cyber Terrorism and Cyber Warfare is. This report
gives a comprehensive review on these two terms are, how it affects us in our daily
member was responsible for one major category. After aggregating the research,
OVERVIEW
As the Internet becomes more pervasive in all areas of human endeavor,
communities and entire countries, without the inherent threat of capture, injury, or
assigned more responsibility while becoming more and more complex and
threat.
BASIC DEFINITION
Cyberterrorism is the leveraging of a target's computers and information ,
particularly via the Internet, to cause physical, real-world harm or severe disruption
activities, or the threat thereof, against computers and/or networks, with the
...subsumed over time to encompass such things as simply defacing a web site or
useful...
There are some that say cyberterrorism does not exist and is really a matter
technologies.
BACKGROUND INFORMATION
Public interest in cyberterrorism began in the late 1980s. As the year 2000
approached, the fear and uncertainty about the millennium bug heightened and
millennium bug was by no means a terrorist attack or plot against the world or the
United States, it did act as a catalyst in sparking the fears of a possibly large-scale
incidents seemed to change, often with exaggerated media reports. The high profile
terrorist attacks in the United States on September 11, 2001 lead to further media
Mainstream media coverage often discusses the possibility of a large attack making
Authors such as Winn Schwartau and John Arquilla are reported to have
had considerable financial success selling books which described what were
critics claim that these books were unrealistic in their assessments of whether the
attacks described (such as nuclear meltdowns and chemical plant explosions) were
that of non-falsifiability; that is, when the predicted disasters fail to occur, it only
goes to show how lucky we've been so far, rather than impugning the theory.
EFFECTS
of its resources and making it more vulnerable to military attack. Cyberterror can
also affect internet-based businesses. Like brick and mortar retailers and service
exchange for goods or paid services) could stand to lose money in the event of
downtime created by
CYBER CRIMINALS.
what is normally cybercrime becomes more political and therefore "terror" related.
Cyber Terrorism
There exist multiple expert definitions of what Cyber Terrorism is. The
and data which may result in damage (Pollitt, n.d.). We live in the information age
where computers have become an integral aspect of our daily existence. We use it
politically motivated attack against computer systems with the intent of causing
harm.
Cyber Warfare
Some may consider that Cyber Terrorism to be the same as Cyber Warfare.
Although both are similar, Cyber Warfare is not political motivated. The definition
of Cyber Warfare refers to the use of computers and the internet to conduct warfare
become more readily available to hostile nations. Nations that may decide to use
Attackers would penetrate and interrupt an electrical power grid system causing
blackouts. Depending on the size of this attack and its location, this may knock out
Implication
nation. A goal of these attacks is to create alarm and panic among citizens.
Attackers want to show how badly they can damage their victim nations by
hacking into government computers and taking control of critical systems. This can
could let this happen and what they can do to protect themselves and their families.
Computer attacks have been raising the cyber warfare bar to a new level.
Each year there are more and more cyber attacks recorded through the world
(Germain, The Winds of Cyber War, 2008). In 2007, the U.S. Department of
breaches of government and private computer systems. The prior year’s report
showed 24,000 attempts; a significant 158% increase in 2007 (Germain, The Art of
Due to the increase of cyber attacks, the US Government is trying their best
worldwide have experienced a cyber attack (U.S. Urged To Curb Hackers as Cyber
Attacks Increase, 2010). It’s becoming such a big issue that 42 percent of
businesses rated cyber crime as the biggest threat to them, that’s more than
terrorism, traditional crime, and natural disasters combined. Due to the increasing
threat, in May 2009, the U.S. President accepted a Cyberspace Policy Review (The
U.S. structures and policies for cyber security and is an effort to work towards a
There are several popular cyber attack methods. These popular methods
include denial of service, distributed denial of service, and botnets (Cyber Attack
with useless network traffic, resulting in the blocking of legitimate network traffic
to the user. Distributed denial of service is similar in that it overwhelms the target
computer with network traffic, but instead this attack is launched from many
computers. The other popular method of attack is the use of botnets. A botnet is a
spam, and phishing scams. The word “bot” is short for “robots,” because they are
allows an unauthorized user to remotely control the system for malicious purposes
Popular Targets
Financial institutions and utility grids are now the prime targets of cyber
warfare and cyber espionage. After a report was released stating that electric power
grid has been infiltrated by foreign spies, the U.S. government has admitted that it
homeland Security claimed “The vulnerability is something [we] have know about
for years.” World Bank has also reported being infiltrated at least six times in just
one year (Behar, 2008). Many other banks, like Bank of America, have also been
the victims of cyber attack. For instance, on January 29 th, 2010, their website was
CyberSecurity
attacks and reduce the consequences of attacks.” (Beidleman, 2009) While this
paper was written in regards to governments, the concept holds true for businesses
as well. Cyber Security can be seen as two parts: resistance and mitigation of
damage.
technologies. The most prevalent security technology for large organizations is the
firewall. The firewall is literally the first line of defense when it comes to a
computer network. The firewall sits between the internal network of a company
and the outside world. It analyzes all incoming and outgoing transmissions and
provides multiple security services. Incoming packets are all screened for
malicious data before being rebroadcast into the network. Outgoing packets are
also all screened. Most firewalls come with features that allow for statistical
may indicate an issue and prompt the firewall to notify a systems administrator for
further investigation.
The major forms of attack described in the last section (packet flooding and
that no legitimate forms of data can be accepted into the system. Firewalls block
DoS attacks by identifying the sending source and blacklisting all data from that
the firewall blocks all traffic from that originating source. Moreover, firewalls can
detect botnet computers from within an internal network based on outgoing traffic
and can take steps to disinfect them. This involves automatically isolating the
infected nodes and informing a systems administrator who takes further steps to fix
the device.
workstations in the network. The rationale behind this procedure is that individual
workstations may be infected by code that slips past the firewall. Security software
such as anti-virus and anti-spyware programs should be implemented and kept up-
to-date with the latest virus definitions. In addition, all devices on the network
should be kept up-to-date with the latest updates to seal potential security
vulnerabilities.
On the user side, there are several best-practices that can be used to prevent
or mitigate damage from cyber terrorist attacks. Firstly is the issue of access
control – users should only have access to resources that they require. The
attackers, their level of access in the system is limited. To prevent the accounts
from being compromised in the first place, policies should be in place that enforce
‘”
Moreover, the password policy should require that passwords be reset every
month and that identical passwords or password characters may not be reused for a
set period of time. This is so that cyber terrorists cannot run automated programs
The final step to deterring cyber attack is continual penetration testing and
system, vulnerabilities may be identified and fixed before they can be taken
should keep backups of their data in an easily-retrievable format. This way, should
a cyber attack succeed in destroying data, files can be restored from the time of the
last backup.
CONCLUSION
After a thorough analysis on why Cyber Terrorism and Cyber Warfare
occur, the determination was that these events for the reason of bringing fear to the
public. Even though these acts can be politically motivated, the goal is still the
same. There are many different methods for such attacks, like using botnets or
denial of service to bring down popular targets; institutions and power grids. Even
with these methods of attack, the use of network security products, such as
firewalls and anti-virus, can greatly reduce the risk of being a victim of cyber
attacks.
REFERENCES
Behar, R. (2008, October 10). World Bank Under Cyber Siege in 'Unprecedented
Crisis'. Retrieved May 7, 2010, from
http://www.foxnews.com/story/0,2933,435681,00.html
Beidleman, S. (2009). Defining and deterring cyber war. Strategy Research
Project, Retrieved from
http://www.dtic.mil/srch/doc?collection=t3&id=ADA500795
Carney, J. (2010, January 29). Bank of America's Website Has Been Down All
Morning. Retrieved May 10, 2010, from
http://www.businessinsider.com/bank-of-americas-website-has-been-down-
all-morning-2010-1
Cyber Attack Techniques. (2009, May 28). Retrieved April 28, 2010, from
http://www.cybersecuritymarket.com/2009/05/28/cyber-attack-techniques/
Germain, J. M. (2008, April 29). The Art of Cyber Warfare, Part 1: The Digital
Battlefield. Retrieved April 20, 2010, from
http://www.ecommercetimes.com/story/62779.html
Germain, J. M. (2008, September 16). The Winds of Cyber War. Retrieved April
10, 2010, from http://www.technewsworld.com/story/The-Winds-of-Cyber-
War-64494.html
LaMonica, M. (2009, April 8). Report: Spies hacked into U.S. electricity grid.
Retrieved May 3, 2010, from http://news.cnet.com/8301-11128_3-
10214898-54.html
Lewis, J. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other
Cyber Threats:. Retrieved April 30, 2010, from
http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf
Contents
INTRODUCTION .......................................................................................................................... 1
Purpose........................................................................................................................................ 3
Scope ........................................................................................................................................... 3
Implication .................................................................................................................................... 10
CyberSecurity ............................................................................................................................... 13
CONCLUSION ............................................................................................................................. 17
REFERENCES ............................................................................................................................. 18
ABSTRACT
Cyber Terrorism and Cyber Warfare are considered a priority threat for
nations including the United States, China, and the United Kingdom. These attacks
can have devastating consequences on the welfare a nation and of its citizens. A
collaborated to analyze the threat of Cyber Terrorism and Cyber Warfare. The
team’s goal was to identify the threats and techniques used in such tactics as well
as identify potential solutions. The research team concluded that there is not a be-
all-end-all remedy to Cyber Terrorism and Cyber Warfare but that there are
proactive measures that may be taken to reduce the frequency of attacks and
must be noted that law is always seven steps behind the technology. This is so
because we have a tendency to make laws when the problem reaches at its zenith.
We do not appreciate the need of the hour till the problem takes a precarious
dimension. At that stage it is always very difficult, if not impossible, to deal with
this stand of non-enactment is that “the measures suggested are not adequate to
deal with the problem”. It must be appreciated that “something is better then
nothing”. The ultimate solution to any problem is not to enact a plethora of statutes
but their rigorous and dedicated enforcement. The courts may apply the existing
it is not the “enactment” of a law but the desire, will and efforts to accept and
enforce it in its true letter and spirit, which can confer the most strongest, secure
and safest protection for any purpose. The enforcement of these rights requires a
“qualitative effort” and not a “quantitative effort”. Thus, till a law dealing
expressly with cyber terrorism is enacted, we must not feel shy and hesitant to use