Preview

Cyber Warfare: Cyber Terrorism

Powerful Essays
Open Document
Open Document
2860 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Warfare: Cyber Terrorism
The Threat
Cyber terrorism is the world’s newest threat against the United States. The FBI defines cyber terrorism as "The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents" (Elmusharaf, 2004). This definition provided by the FBI can be broken down into several layers. The first layer is that of the actors, their motives are political in nature and are thought out and planned. They are targeting computer systems which would include vital infrastructures that allow the US to function. Their wanted result is that of causing panic, mayhem, and even death to innocent civilians as well as US forces. The battle landscape against the United States has changed from the normal battle fields of sand and dirt to that of the information super highway. This allows for terrorist attacks that no longer target physical assets, but instead targets our computer systems, cyber infrastructure, and other computer based systems. These systems can include municipal systems, nuclear power plants, hospitals, and financial sectors.
The biggest threat from cyber terrorism is to the United States critical infrastructures (Piggin, 2010). These infrastructures include power grids, nuclear power plants, communications systems, water, food production, health care, financial and transportation (Piggin, 2010). Each one of these systems has its own vulnerabilities and own consequences if they are exploited.
Power grids are an obvious target; they provide power to the US and allow us to function normally throughout our day. Many people take this luxury for granted however once it fails it can throw an entire city into chaos. Such as the incident in August of 2003 in New York City and much of the New England area when the power grid failed leaving millions without power and entire cities gridlocked with traffic unable to move.



References: Hayes, J. J. (2010). The terrors and the errors [cyber-terrorist attack]. Engineering & Technology (17509637), 5(14), 52-53. doi:10.1049/et.2010.1413 Hinde, S Korchenko, O., Vasiliu, Y., & Gnatyuk, S. (2010). MODERN QUANTUM TECHNOLOGIES OF INFORMATION SECURITY AGAINST CYBER-TERRORIST ATTACKS. Aviation (1648-7788), 14(2), 58-69. Retrieved from EBSCOhost. Mann, P. (2002). Cyber Security 'Missing ' From Travel Defenses. Aviation Week & Space Technology, 157(2), 41. Retrieved from EBSCOhost. Neil, S. (2009). NON-PROFIT TARGETS CYBER-SECURITY IN PLANTS. Managing Automation, 24(9), 10-12. Retrieved from EBSCOhost. PATEL, S. C., BHATT, G. D., & GRAHAM, J. H. (2009). Improving The Cyber Security of Scada Communication Networks. Communications of the ACM, 52(7), 139-142. Retrieved from EBSCOhost Piggin, R Saini, H. H., & Saini, D. D. (2007). Proactive Cyber Defense and Reconfigurable Framework for Cyber Security. International Review on Computers & Software, 2(2), 89-97. Retrieved from EBSCOhost. State Drug Database Held Hostage Stevens, T., & Jusko, J. (2001). Cyber-terrorists under attack. Industry Week/IW, 250(2), 11. Retrieved from EBSCOhost. Tsuchiya, M. (2009). Defense against Cyber Terrorism: Head War and Body War. Conference Papers -- International Studies Association, 1-10. Retrieved from EBSCOhost. UK 'COULD BE TARGET FOR CYBER-TERRORISTS '. (2003). IEE Review, 49(2), 15. Retrieved from EBSCOhost.

You May Also Find These Documents Helpful

  • Good Essays

    White, J. R. (2009). Terrorism and Homeland Security (6th ed.). [Adobe Digital Edition]. doi: 1009-0001-15E7-000015E8…

    • 873 Words
    • 4 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Best Essays

    In the aftermath of the terrorist attacks of 9/11, securing the country has become a national priority. The events of 9/11 were the first attacks on the United States (U.S.) since Pearl Harbor which catapulted the U.S. into World War II. As of the writing of this paper, the U.S. has been engaged in the War on Terrorism for 13 years. During this period of time the U.S. has been kept free from terrorist attacks by changes to laws, technology, and investigative methods to combat terrorism internationally. Although there have been a number of changes to U.S. law and American citizens have been kept safe, the threat of terrorism has not abated. With the continued threat of terrorism to the U.S. and its citizens, there is a high probability that the U.S. will suffer another 9/11 type of event.…

    • 3080 Words
    • 13 Pages
    Best Essays
  • Better Essays

    Stuxnet

    • 933 Words
    • 4 Pages

    The discovery in June 2010 that a cyber worm dubbed ‘Stuxnet’ had struck the Iranian nuclear facility at Natanz suggested that, for cyber war, the future is now. Yet more important is the political and strategic context in which new cyber threats are emerging, and the effects the worm has generated in this respect. Perhaps most striking is the confluence between cyber crime and state action. States are capitalizing on technology whose development is driven by cyber crime, and perhaps outsourcing cyber attacks to non-attributable third parties, including criminal organizations. Cyber offers great potential for striking at enemies with less risk than using traditional military means. It is unclear how much the Stuxnet program cost, but it was almost certainly less than the cost of single fighter-bomber. Yet if damage from cyber attacks can be quickly repaired, careful strategic thought is required in comparing the cost and benefits of cyber versus traditional military attack. One important benefit of cyber attack may be its greater opportunity to achieve goals such as retarding the Iranian nuclear program without causing the loss of life or injury to innocent civilians that air strikes would seem more likely to inflict. Nevertheless, cyber attacks do carry a risk of collateral damage, with a risk of political blowback if the attacking parties are identified. Difficulty in identifying a cyber attacker presents multiple headaches for responding. A key strategic risk in cyber attack, finally, lies in potential escalatory responses. Strategies for using cyber weapons like Stuxnet need to take into account that adversaries may attempt to turn them back against us.…

    • 933 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    The United States safety and wellbeing relies on a resilient critical infrastructure, which is the assets, systems and networks that underpin American society. There are three different categories of threats. Natural threats, human- cause and accidental/technical threat. “Natural threats include weather problems in both hot and cold climates and also geological hazards like earthquakes, tsunamis, 18 International Journal of Control and Automation land shifting and volcanic eruption.” (Robles, Choi, Cho, Kim, G Park, Lee) The human caused threats are referred to as terrorism. “This may include cyber-attacks, rioting, product tampering, explosions and bombing.” (Robles, Choi, Cho, Kim, G Park, Lee) Technological threats are completely different;…

    • 887 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Terrorism is one of the most remembered and feared occurrences in the world. Terrorism changes the lives and hearts of everyone that it affects. This paper explores the different types of terrorism, who commits the acts, how it affects the surrounding world, and what can be done to prevent it. This review of the different types of terrorism focuses primarily on the specific types of terrorism. This paper then tries to relay to the reader the understanding of all types, and the differences between them.…

    • 1251 Words
    • 6 Pages
    Powerful Essays