Preview

Cyber Threats

Good Essays
Open Document
Open Document
641 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Threats
Cyber Threats
Roger Larew
SEC 402 Informational Warfare
February 16, 2011

Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents
Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm. According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber terrorism is often referred to as electronic terrorism or information war.
Based on recent reports and the information presented to congress, America has a long way to go before security threats are adequately addressed.
Almost half of 2,131 U.S. companies polled had no formal security policies in place, and most relied primarily on user passwords and multiple logons for protection. Only 49% of U.S. companies had plans to raise user awareness of policies and procedures in the next 12 month. Unbelievably only half of 150 companies surveyed by InformationWeek Research one week after the terrorist attacks said that they plan to reassess the security of their facilities in light of those events. We need more people to be doing more creative thinking about computer security, than those who are trying to attack us.
In December, 2000 the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction (aka The Gilmore Commission) released their second annual report which stated two possible cyber terrorist scenarios. First, "It is easy to



References: Cyber terrorism Testimony Before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives by Dorothy E. Denning of Georgetown University - May 23, 2000 - http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    The United States safety and wellbeing relies on a resilient critical infrastructure, which is the assets, systems and networks that underpin American society. There are three different categories of threats. Natural threats, human- cause and accidental/technical threat. “Natural threats include weather problems in both hot and cold climates and also geological hazards like earthquakes, tsunamis, 18 International Journal of Control and Automation land shifting and volcanic eruption.” (Robles, Choi, Cho, Kim, G Park, Lee) The human caused threats are referred to as terrorism. “This may include cyber-attacks, rioting, product tampering, explosions and bombing.” (Robles, Choi, Cho, Kim, G Park, Lee) Technological threats are completely different;…

    • 887 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Information technology has drastically altered the Homeland Security world in many ways. The largest form of information technology, the internet, has caused the greatest change for Homeland Security Agencies. For many years now the internet has widely been used for terrorist communication, but more concerning now is the internet is being used to generate support and as a recruiting tool for terrorist organizations. In addition, they are also using the internet for training of terrorists since training camps are being actively pursued and neutralized by the intelligence community.…

    • 493 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Crime Theories

    • 770 Words
    • 4 Pages

    References: Taylor, R., Fritsch, E., Liederbach, J., & Holt, T. (2011). Digital crime and digital terrorism. (2nd…

    • 770 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    AL Week 2 DIS 1 1

    • 379 Words
    • 2 Pages

    I have to say when you look at the past few decades are nation did not have the technology, man power and the resource that we have today. In doing so “The Department of Homeland Security (DHS) has wrestled with a variety of significant challenges, including coordinating across 22 preexisting agencies, reporting to a multitude of congressional committees, and interacting with the U.S. public in a manner that constantly tests the balance between security and privacy”. “Some have questioned and pointed out these challenges of evidence to Homeland Security that maybe they are dysfunctional of a department which is unable to effectively protect the nation”. When looking at this ever since the United States have been working constantly to help make Homeland Security better The Department of Homeland Security shows that there were no major attacks on American soil recently. After 9/11 the nation has grown stronger and the technology improves every day. In doing so “DHS must find ways to increase the nation’s defenses against cyberattacks, establish enhanced systems for secure screening and credentialing, and improve intelligence and information sharing, in all while operating in a constrained fiscal environment”. As we grow as a nation and the technology gets better every year we will have the knowledge so that hopefully we can get an edge on the terrorist. The bottom line is that when you look at this the terrorist is always one step…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The FBI has identified the most significant cyber threats to our nation as those with high intent and high capability to inflict damage or death in the U.S., to illicitly acquire assets, or to illegally obtain sensitive or classified U.S. military, intelligence, or economic information.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Port Security

    • 1593 Words
    • 7 Pages

    References: Forest, J, Howard, R, Moore, J. (2005). Homeland Security and Terrorism. New York, NY: McGraw Hill.…

    • 1593 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    There are numerous challenges emerging in homeland security. In my opinion, one of the biggest challenges is how the Internet is used. The Internet is being used by terrorist groups worldwide to spread their propaganda. These groups are using ungoverned Internet space to disseminate training material and poisonous propaganda to attract and lure individuals from around the world to their cause. They encourage these individuals to commit acts of violence in their own communities. These terror groups have used the Internet to provide these individuals vital training and information in the privacy of their own residence. With the Internet, these individuals no longer must travel out of country to obtain the training.…

    • 334 Words
    • 2 Pages
    Good Essays
  • Good Essays

    References: Combs, C. (2010). Terrorism in the Twenty-First Century ( 6th Ed.), Charlotte, NC.: Pearson…

    • 670 Words
    • 3 Pages
    Good Essays
  • Better Essays

    From the extensive evolution of computers to the introduction and mass popularity of the Internet. From bombs to missiles, from bases to shuttles. The world of technology is seemingly endless. In modern times computers and the Internet possess tremendous power and have a wide range of capabilities for better or for worse. Terrorism is for the worse and yet unfortunately, the evolution of technology has advanced the means to commit acts of terrorism, both actual terrorism but also cyber terrorism.T hink about the seemingly endless depth of technology, the complex features that go into making a bomb mechanism, you can only come to the solid conclusion that yes, technology has had a worldwide effect on the act of terrorism.…

    • 2408 Words
    • 10 Pages
    Better Essays
  • Best Essays

    Patriot Act

    • 2067 Words
    • 9 Pages

    After the attacks which happened in the United States, the Congress agreed in one voice to have laws that would counter terrorism. This was undertaken in the quest to have safe America and security of the citizens of America. The main intention was to ensure that terrorism was fought in the United States and indeed, the whole world. This aspect allowed and gave the law the power and freedom to investigate the activities that are undertaken on the internet. This will be a way of protecting citizens and internet users from attacks that are bound to take place online. The act, therefore, allowed the people undertaking the investigations to use tools in the process of investigations for activities which are considered to be suspect. The tools that have been allowed by the act to be used in the fight of terrorisms and organized crime have been in…

    • 2067 Words
    • 9 Pages
    Best Essays
  • Better Essays

    References: Combs, C. (2011). Terrorism in the twenty-first century (7th ed.). Boston, MA: Pearson Publishing…

    • 1017 Words
    • 5 Pages
    Better Essays
  • Better Essays

    In recent years our security, privacy, safety and our way of life has been invaded by individuals around the world. Today this great nation has rebuilt our national security and created the Department of Homeland Security (DHS). Their main focus is in developing methods that can protect us from future threats and implement security procedures that will keep us safe. Some of these policies and guidelines have now become laws that have no margin for error and show no compassion for those that chose to invade our country. Although these policies were established to protect us they have changed the way we view a threat and even our own government. This change has pushed some to see the DHS as a potential threat to their constitutional rights. As the DHS continues to evolve, they have created new ideas to help us become aware of what possible threats can be like in the XXI century. These procedures help invoke a better understanding of what measurements we can take to secure ourselves in case of an emergency while we wait for our government to take action.…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Cybersecurity Resolution

    • 3606 Words
    • 15 Pages

    SIGNATORIES: The Kingdom of Saudi Arabia, The French Republic, The Republic of the Philippines, Democratic Republic of Algeria, The Russian Federation, The Republic of Croatia, The Republic of India, The Republic of Tunisia, United States of America, The Islamic Republic of Afghanistan, The Argentine Republic, The Commonwealth of Australia, The Republic of Azerbajian, The Kingdom of Bahrain, The People’s Republic of Bangladesh, The Kingdom of Belgium, The Federated Republic of Brazil, The Kingdom of Cambodia, Canada, The Republic of Chile, The Republic of Colombia, The Republic of Croatia, The Republic of Cuba, The Czech Republic, The Democratic People’s Republic of Korea, The Democratic Republic of Congo, The Arab Republic of Egypt, Georgia, The Federal Republic of Germany, The Republic of Ghana, The Republic of Guatemala, The Republic of Indonesia, The Islamic Republic of Iran, The Republic of Iraq, The Republic of Ireland, The State of Israel, The Italian Republic, Jamaica, The Republic of Kenya, The State of Kuwait, Laos, Libya, Luxembourg, Malaysia, Mauritius, Mexico, Morocco, Namibia, Netherlands, New Zealand, Nigeria, Norway, Pakistan, Paraguay, Peru, Poland, Portugal, Qatar, Republic of Korea, Rwanda, Serbia, Spain, Sri Lanka, Sudan, Sweden, Switzerland, Syria, Thailand, Togo, Turkey, Uganda, Ukraine, UAE, UK, US, Venezuela…

    • 3606 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Terrorism is growing threat that is being discussed all around the world. This is because the threat of terroristic violence is increasing at an extremely fast rate. For the United States, the threat of domestic and international terrorism weighs on the minds of the federal government and private citizens. The 2014 Quadrennial Homeland Security Review even went as far as to note that terrorism is one of the six strategic challenges that are likely to affect the United States throughout the next five years (DHS, 2014). However, the United States has been on high alert since the attacks on New York and the Pentagon on September 11, 2001. This orchestrated attack forced America to rethink its policies over the protection of the country from within. This event led to the creation of the Department of Homeland Security and many other overhauls in regards to terrorism. However the threat continues to grow. With group like the Islamic State and Boko Haram conducting massive attacks overseas, Americans are concerned that this threat will make its way across the ocean. However, in several ways it has already arrived in the United States. There are many reasons why the federal government put terrorism on its list of threats facing the future of the county.…

    • 1565 Words
    • 7 Pages
    Powerful Essays