Preview

Cyber Threats

Good Essays
Open Document
Open Document
641 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Threats
Cyber Threats
Roger Larew
SEC 402 Informational Warfare
February 16, 2011

Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents
Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm. According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber terrorism is often referred to as electronic terrorism or information war.
Based on recent reports and the information presented to congress, America has a long way to go before security threats are adequately addressed.
Almost half of 2,131 U.S. companies polled had no formal security policies in place, and most relied primarily on user passwords and multiple logons for protection. Only 49% of U.S. companies had plans to raise user awareness of policies and procedures in the next 12 month. Unbelievably only half of 150 companies surveyed by InformationWeek Research one week after the terrorist attacks said that they plan to reassess the security of their facilities in light of those events. We need more people to be doing more creative thinking about computer security, than those who are trying to attack us.
In December, 2000 the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction (aka The Gilmore Commission) released their second annual report which stated two possible cyber terrorist scenarios. First, "It is easy to



References: Cyber terrorism Testimony Before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives by Dorothy E. Denning of Georgetown University - May 23, 2000 - http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    AL Week 2 DIS 1 1

    • 379 Words
    • 2 Pages

    I have to say when you look at the past few decades are nation did not have the technology, man power and the resource that we have today. In doing so “The Department of Homeland Security (DHS) has wrestled with a variety of significant challenges, including coordinating across 22 preexisting agencies, reporting to a multitude of congressional committees, and interacting with the U.S. public in a manner that constantly tests the balance between security and privacy”. “Some have questioned and pointed out these challenges of evidence to Homeland Security that maybe they are dysfunctional of a department which is unable to effectively protect the nation”. When looking at this ever since the United States have been working constantly to help make Homeland Security better The Department of Homeland Security shows that there were no major attacks on American soil recently. After 9/11 the nation has grown stronger and the technology improves every day. In doing so “DHS must find ways to increase the nation’s defenses against cyberattacks, establish enhanced systems for secure screening and credentialing, and improve intelligence and information sharing, in all while operating in a constrained fiscal environment”. As we grow as a nation and the technology gets better every year we will have the knowledge so that hopefully we can get an edge on the terrorist. The bottom line is that when you look at this the terrorist is always one step…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In recent years our security, privacy, safety and our way of life has been invaded by individuals around the world. Today this great nation has rebuilt our national security and created the Department of Homeland Security (DHS). Their main focus is in developing methods that can protect us from future threats and implement security procedures that will keep us safe. Some of these policies and guidelines have now become laws that have no margin for error and show no compassion for those that chose to invade our country. Although these policies were established to protect us they have changed the way we view a threat and even our own government. This change has pushed some to see the DHS as a potential threat to their constitutional rights. As the DHS continues to evolve, they have created new ideas to help us become aware of what possible threats can be like in the XXI century. These procedures help invoke a better understanding of what measurements we can take to secure ourselves in case of an emergency while we wait for our government to take action.…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Good Essays

    There are numerous challenges emerging in homeland security. In my opinion, one of the biggest challenges is how the Internet is used. The Internet is being used by terrorist groups worldwide to spread their propaganda. These groups are using ungoverned Internet space to disseminate training material and poisonous propaganda to attract and lure individuals from around the world to their cause. They encourage these individuals to commit acts of violence in their own communities. These terror groups have used the Internet to provide these individuals vital training and information in the privacy of their own residence. With the Internet, these individuals no longer must travel out of country to obtain the training.…

    • 334 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    American Government

    • 328 Words
    • 2 Pages

    Contention 2) Cyber attacks are dilemmas that can be prohibited. Subpoint A: There are many ways for the United States to be attacked by terrorists other than the bombings itself, they are called Cyber Attacks. Cyber Attacks are an attempt by hackers to damage or destroy a computer network or system. These are attacks that can affect us deeply because Americans today are becoming more and more dependent on the internet. Though the government of America has much of it’s private information recorded on paper, yes but much is saved on the Internet as backup. With this, terrorist groups hire hackers or even study about computers to be able to launch a Cyber Attack that would help them steal and even look through the information to give them an advantage. With them knowing the key aspects of the government that would help them to bring even more danger upon not only the government but also the Citizens and other individuals that live here in our country. With cyber attacks it would lead to Cyber Warfare. Cyber warfare can be like any other war, just because it isn’t being fought face to face or weapons being involved it is of high danger either way. With this,the enemies can find ways to hurt us as a country, cause damage that would take years to recovers just like 9/11.Which would cause wars amongst the nations/countries. As Martin C. Libicki from the RAND corporation states “ Because much of what goes on in cyberspace is invisible, what one state perceives as normal operating procedure, another could perceive as just about anything.” With this he means even if one self may think what they put on the internet even with high security, others can use it for anything even if the person may think it’s harmful. The U.S. has been receiving cyber attacks from china which has leaded us to enormous losses to U.S. jobs states Senator Brown…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Americans are becoming more and more codependent on technology. The vast majority of homes in the United States have at least one home personal computer (PC) that is connected to the internet. Americans have gotten accustom to being able to access the internet from their homes. Banking, social media, video teleconferencing and business ventures are all examples of how the internet is being used. The availability of the internet and computers in homes have simplified lives in the United States, however this allows cyber-terrorist to have direct access to the most personal of information. Much like the attacks that took place on September 11th the average American is completely unaware of the vulnerabilities that lye waiting around every corner of cyberspace. Cyber-terrorism not only affects individuals, it can also affect the entire nation. The United States critical infrastructures are becoming more dependent on computer networks for there operations. If security is not stepped up terrorist may be able to disrupt or shut down critical support systems. Americans and American companies must educate themselves on the vulnerabilities that cyber-terrorism presents and begin to work toward securing our networks in the same manner as we do our borders.…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    Because of this, the organization of Homeland Security was created to protect the safety of the American people and its soil. Since then Homeland had held the perpetrators accountable and has worked to prevent the recurrence of similar atrocities on any scale whether abroad or at home. “The War on Terror extends beyond the current armed conflict that arose out of the attacks of September 11, 2001, and embraces all facets of continuing U.S. efforts to bring an end to the scourge of terrorism.” (The White House) There have been may success due to the relentless actions of DHS: “They have deprived al-Qaida of safe haven in Afghanistan and helped a democratic government to rise in its place. Once a terrorist sanctuary ruled by the repressive Taliban regime, Afghanistan is now a full partner in the War on Terror.” (The White House) There has been “a multinational coalition joined by the Iraqis, which is aggressively prosecuting the war against the terrorists in Iraq and have strengthened the ability of the United States to disrupt and help prevent future attacks in the Homeland by enhancing counterterrorism architecture through the creation of the Department of Homeland.” (The White House) Yet, we are still not sate, we still continue to face terrorist attacks and challenges. “Terrorist networks today are more dispersed and less centralized. They are more reliant on smaller cells inspired by a common ideology and less directed by a central command structure.” (The White House) Although, the United Sates has considerately improved the economy such as; air, land, sea, and border security, Homeland is not immune from attack. “Terrorists have declared their intention to acquire and use weapons of mass destruction (WMD) to inflict even more catastrophic attacks against the United States, our allies, partners, and other interests around the world.” (The White…

    • 887 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Answer: because cyberwarfare is more complex than conventional warfare. Cyberwarfare is Internet based conflict that involves political motivated attacks on information systems. Cyberwarfare attacks are disabling financial systems and communication networks. This is a serious problem because the potential targets for these attacks are military power grids but this cyberwarfare is targeting MNC, technology firms, and news organizations. This causes Obama (who is the official first cyberwarfare president) to not only worry about who is attacking his military but who is attacking and targeting his country.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cybersecurity Resolution

    • 3606 Words
    • 15 Pages

    Deeply concerned that the prevalence of the use of the Internet for terrorist purposes is a rapidly growing phenomenon that will pose as a threat to many other…

    • 3606 Words
    • 15 Pages
    Powerful Essays