Wednesday, November 20, 2013

If your bank was hacked, would you move your money?

Is your money as safe as you think?


I have a question for everyone. Let's say you do your banking with Wells Fargo and you have all of your money with them.  Well what if Wells Fargo's main computers were hacked into by a cyber group and they flooded the system with a DDoS attack and the companies website was down for two days. No money was stolen from clients or anything of that sort, but still a vulnerability in the banks system was found and executed upon. Would you keep your money with that bank, or would you go to a new bank due to the fact that it was already proven that someone could hack into even the companies most protected computers? That is a very serious concern for banks these days. Think about all of the clients that would leave if they found out their banks security systems had vulnerabilities that could allow people to steal their personal information and money out of their accounts. In my opinion, bank web security will become the next biggest thing and the best protected banks will be the most successful. 




So tell me... Would you switch banks if yours was hacked into by a cyber group?

Effect of Cyberterrorism on Business

Cyberterrorism and it's Effects on Business.

After doing a fair amount of research on the topic of cyberterrorism, it seems to me that what has the most potential for damage or destruction due to cyberterrorism is the business sector. For example, during a DDoS attack, a corporations entire website could be shut down for a relatively long period of time. This can have disastrous effects on the business, and potentially drive away many customers since it seems the company is weak or has insufficient protection.

One great example of how cyberterrorism has had a strong impact on the private sector is when a cyber group hacked into the twitter account of the Associated Press. The group posted a message saying that the white house had been bombed and Barack Obama was injured. This was only on twitter for two minutes but guess what happened... The stock market plummeted and $150 million in equity vanished momentarily. Luckily, twitter was able to regain control over the AP's account in such a short amount of time, otherwise who knows if it would have made such a swift and complete recovery.

Of all of the potential different ways that cyberterrorism can effect us, I believe it has the potential to have the greatest impact on business.


Respond by telling me if you agree with this, and if not, what is it that you think is the most vulnerable.

Monday, November 18, 2013

DDoS Attacks: Cyberterror or Cyber Warfare?

On of the most common types of cyber attacks occurring today is known as a distributed denial of service attack, or DDoS. Distributed Denial-Of-Service is a form of electronic attack involving multiple computers, which send repeated HTTP requests or pings to a server to load it down and render it inaccessible for a period of time.  The purpose of DDoS attacks are typically most comparable to street protests, so these types of attacks are usually seen as such.  An example of a large DDoS attack was Operation Titstorm, which were a series of denial-of-service attacks conducted by the Anonymous online community against the Australian government in response to proposed web censorship regulations. 

Now let me define both cyberterrorism and cyber warfare.

Cyberterrorism: “A criminal act perpetrated through computers resulting in violence, death and/or destruction, and creating terror for the purpose of coercing a government to change its policies.” (Wilson, 2003)

Cyber Warfare:  "Refers to politically motivated hacking to conduct sabotage and espionage."

At first glance, I would say this is an easy one... a DDoS attack is an example of Cyber Warfare. However, if a successful DDoS attack shuts down a major server in say China, then wouldn't that constitute a form of destruction? Also, the last part of the definition that says "creating terror for the purpose of coercing a government to change its policies" sounds an awful lot like the purpose of a street protest, which is regularly compared to it's virtual version known as DDoS.






Sources: 
http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/
http://en.wikipedia.org/wiki/Denial-of-service_attack

Cyberterrorism vs. Traditional Terrorism: Who is more threatening?

Our government continues to try and reach out to congress about the threat of cyber attacks in the future. I feel like every few articles online speak about how we need to prepare for this new threat.
On November 14, FBI director James Comey testified to Congress that the threat of traditional terrorist attacks on our nation continues to decrease, while the threat of cyber attacks and cyberterrorism continues to rise at a rapid rate. Three national officials all agreed that within the next decade, cyber attacks would be the nations number one domestic threat.




Of the two types of terrorism mentioned, which one do you feel more threatened by? I'll be honest, because cyberterrorism can be a difficult concept to grasp, and the effects of it can be hard to visualize, I still personally feel more threatened by the thought of traditional terrorism. That isn't to say that one is more dangerous than the other, but it is just my gut reaction to the terms.

Tell me which one you feel the most threatened by and why. For me, old fashioned bombings and hijackings are what really gets my pulse going.

Prosecution?

An interesting thought popped into my head today as I sat back and thought about the various cyberterrorist attacks that have taken place over the last few years. Do you think the FBI should attempt to track down anonymous cyberterrorist groups and put a few of the members in jail? Most of these groups act anonymously and lure in hundreds of random citizens to help execute these events, but there has to be a few select leaders in these groups. Are there even specific laws these people are breaking? Do we need to evaluate the laws regarding this topic and potentially pass new ones?

If the FBI tracked down the top dogs of some of these groups, surely it would hinder their ability to pull of future attacks, and also scare others enough to keep them from joining in on these attacks as helpers. Some people may not even feel most of the cyber attacks are worthy of prosecution, that these groups are just using technology as a way of protesting or getting their message out into the world effectively. Where does it cross the line though, that after an attack is executed, somebody needs to go to jail. Should it be if it causes stress to others? Harm to others? Financial loss for others?


I say we need to locate a few of these groups and try to put them away!

Sunday, November 10, 2013

Operation: Titstorm


The cybergroup known as Anonymous conducted a series of attacks in February of 2010 in response to the Australian governments proposed web censorship regulations. Operation Titstorm was the name given to the cyber attacks by the attackers. The attack began as a protest responding to a plan by Australian Telecommunications Minister Stephen Conroy that would require internet service providers to block Australian users from accessing illegal and what the government deemed as "unwanted" content. Websites to be blocked feature pornography showing rape, bestialitychild sex abuse, small-breasted women (who may appear under the legal age), and female ejaculation The proposed filter also includes gambling sites along with others showing drug use. Anonymous conducted a DDoS attack, or Distributed Denial of Service attack that resulted in lapses of access to government websites on the 10th and 11th of February, 2010. This was accompanied by emails, faxes, and phone calls harassing government offices. The actual size of the attack and number of perpetrators involved is unknown but it was estimated that the number of systems involved ranged from the hundreds to the thousands. The amount of traffic caused disruption on multiple government websites.



Do you feel this is a viable form of protest? Would you participate in this form of protesting? Do you think this would be effective?

Sources:
http://en.wikipedia.org/wiki/February_2010_Australian_cyberattacks

"Pure" Cyberterrorism

There is another aspect of cyberterrorism out there that many people aren't familiar with. The concept of "pure" cyberterrorism. Pure cyberterrorism is accomplished by utilizing computer technology and the internet to inflict destruction or damage on tangible property, and even death or injury to individuals.  It is this pure cyberterrorism that most writers mean when they discuss the dangers posed by the cyberterrorist. This separation of the various types of cyberterrorism poses a significant impact on our ability to protect ourselves.


I have yet to find any solid examples where pure cyberterrorism has had any real existence. Most of the cyber attacks happening now create fear and panic, but do not cause damage to tangible property.


Are you more concerned with the fear and panic that cyberterrorism can create, or the possibility of this "pure cyberterrorism" where actual tangible damage can occur as a result? Do you feel that pure cyberterrorism is even possible? 

If you can demonstrate any evidence of pure cyberterrorism occurring in the past (physical property damaged or lives lost),  please list below...





Sources:

http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/