Tuesday, April 14, 2020

Cyber Terrorism Essays - Cyberwarfare, Security, Cybercrime

Cyber Terrorism The face of global terrorism as we knew it to be 50 odd years ago is changing rapidly with the advancement of technology in today's society. Be it a kid trying to get his kicks bypassing the security or his local Internet Service Provider, or an established terrorist trying to get classified information, the amount of funds we put into protecting ourselves from cyberterrorism is not nearly enough if we were to think about what could be at harm. The vulnerability of commercial systems to cyberattacks is repeatedly demonstrated by events portrayed in the media and, there is no evidence that non-government systems are any more or less vulnerable than government ones, or that the security posture of either group, as a whole, is generally improving -- despite the availability and use of a growing supply of information security tools. In a recent study conducted by PricewaterhouseCoopers (PwC) of 4900 IT professionals across 30 nations found that this year alone 39,363 human years of productivity will be lost worldwide because of viruses and hacking . In total, the cheque this year to US firms with more than 1000 employees for viruses and computer hacking will amount to $266 billion, or more than 2.5 per cent of the nation's gross domestic product. The price tag worldwide soars to $1.6tn, according to the PwC study. The real effects of viruses are not as much as everybody shouts about. That said, I know of two cases where clients of ours have picked up contracts because their competitors were hit by the Love Bug, said Shipp. It's really difficult to estimate how much viruses cost. In the area of hacktivism, which involves the use of hacking tools and techniques of a disruptive nature of government or commercial systems, the Internet will serve mainly to draw attention to incidents, as such incidents are regularly over portrayed by news media. Whether that attention has the desired effect of changing policy decisions related to the issue at hand is much less certain. ?Hackers may feel a sense of power, because they can do it. Others do it for the challenge of the problem, using a protected system as just another playground to tune their skills. But some just do it for the recognition, hoping that someone will notice them and make the famous in the media. These people usually don't last very long in the grand scheme of things.? In April of 1999, Yahoo!, CNN and other prominent media web sites got hit by a organized and severe DOS (Denial Of Service) attack. The attack was done through university servers, in Canada and the US, which were hacked and made to be puppets of the perpetrators of the attack. The attack sent the affected companies stocks plummeting because they could not continue their daily business. While this is an extreme situation, similar situations happen almost daily. Packet sniffers are set up on networks to catch unencrypted passwords and logins, Trojans are planted to allow a hacker to gain access to you files without the user being even aware of it. With such lack or security evident among the bases of our society, what would happen if a hostile nation waged a cyber war on us? In the 1980s, Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, coined the term cyberterrorism to refer to the merging of cyberspace and terrorism . Mark Pollitt, special agent for the FBI, offered a definition: Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents. Politically motivated attacks that cause serious harm, such as severe economic hardship or sustained loss of power or water, might also be characterized as cyberterrorism. Like most other groups, terrorist groups are using the Internet extensively to spread their message and to communicate and coordinate action. However, there have been few if any computer network attacks that can match up to the terrorist acts caused by non electronic warfare. The 1998 e-mail bombing by the Internet Black Tigers against the Sri Lanken embassies was perhaps the closest thing to cyberterrorism that has occurred so