Is your money as safe as you think?
Wednesday, November 20, 2013
If your bank was hacked, would you move your money?
Effect of Cyberterrorism on Business
Cyberterrorism and it's Effects on Business.
After doing a fair amount of research on the topic of cyberterrorism, it seems to me that what has the most potential for damage or destruction due to cyberterrorism is the business sector. For example, during a DDoS attack, a corporations entire website could be shut down for a relatively long period of time. This can have disastrous effects on the business, and potentially drive away many customers since it seems the company is weak or has insufficient protection.
One great example of how cyberterrorism has had a strong impact on the private sector is when a cyber group hacked into the twitter account of the Associated Press. The group posted a message saying that the white house had been bombed and Barack Obama was injured. This was only on twitter for two minutes but guess what happened... The stock market plummeted and $150 million in equity vanished momentarily. Luckily, twitter was able to regain control over the AP's account in such a short amount of time, otherwise who knows if it would have made such a swift and complete recovery.
Of all of the potential different ways that cyberterrorism can effect us, I believe it has the potential to have the greatest impact on business.
Respond by telling me if you agree with this, and if not, what is it that you think is the most vulnerable.
After doing a fair amount of research on the topic of cyberterrorism, it seems to me that what has the most potential for damage or destruction due to cyberterrorism is the business sector. For example, during a DDoS attack, a corporations entire website could be shut down for a relatively long period of time. This can have disastrous effects on the business, and potentially drive away many customers since it seems the company is weak or has insufficient protection.
One great example of how cyberterrorism has had a strong impact on the private sector is when a cyber group hacked into the twitter account of the Associated Press. The group posted a message saying that the white house had been bombed and Barack Obama was injured. This was only on twitter for two minutes but guess what happened... The stock market plummeted and $150 million in equity vanished momentarily. Luckily, twitter was able to regain control over the AP's account in such a short amount of time, otherwise who knows if it would have made such a swift and complete recovery.
Of all of the potential different ways that cyberterrorism can effect us, I believe it has the potential to have the greatest impact on business.
Respond by telling me if you agree with this, and if not, what is it that you think is the most vulnerable.
Monday, November 18, 2013
DDoS Attacks: Cyberterror or Cyber Warfare?
On of the most common types of cyber attacks occurring today is known as a distributed denial of service attack, or DDoS. Distributed Denial-Of-Service is a form of electronic attack involving multiple computers, which send repeated HTTP requests or pings to a server to load it down and render it inaccessible for a period of time. The purpose of DDoS attacks are typically most comparable to street protests, so these types of attacks are usually seen as such. An example of a large DDoS attack was Operation Titstorm, which were a series of denial-of-service attacks conducted by the Anonymous online community against the Australian government in response to proposed web censorship regulations.
Now let me define both cyberterrorism and cyber warfare.
Cyberterrorism: “A criminal act perpetrated through computers resulting in violence, death and/or destruction, and creating terror for the purpose of coercing a government to change its policies.” (Wilson, 2003)
Cyber Warfare: "Refers to politically motivated hacking to conduct sabotage and espionage."
At first glance, I would say this is an easy one... a DDoS attack is an example of Cyber Warfare. However, if a successful DDoS attack shuts down a major server in say China, then wouldn't that constitute a form of destruction? Also, the last part of the definition that says "creating terror for the purpose of coercing a government to change its policies" sounds an awful lot like the purpose of a street protest, which is regularly compared to it's virtual version known as DDoS.
Sources:
http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/
http://en.wikipedia.org/wiki/Denial-of-service_attack
Now let me define both cyberterrorism and cyber warfare.
Cyberterrorism: “A criminal act perpetrated through computers resulting in violence, death and/or destruction, and creating terror for the purpose of coercing a government to change its policies.” (Wilson, 2003)
Cyber Warfare: "Refers to politically motivated hacking to conduct sabotage and espionage."
At first glance, I would say this is an easy one... a DDoS attack is an example of Cyber Warfare. However, if a successful DDoS attack shuts down a major server in say China, then wouldn't that constitute a form of destruction? Also, the last part of the definition that says "creating terror for the purpose of coercing a government to change its policies" sounds an awful lot like the purpose of a street protest, which is regularly compared to it's virtual version known as DDoS.
Sources:
http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/
http://en.wikipedia.org/wiki/Denial-of-service_attack
Cyberterrorism vs. Traditional Terrorism: Who is more threatening?
Our government continues to try and reach out to congress about the threat of cyber attacks in the future. I feel like every few articles online speak about how we need to prepare for this new threat.
On November 14, FBI director James Comey testified to Congress that the threat of traditional terrorist attacks on our nation continues to decrease, while the threat of cyber attacks and cyberterrorism continues to rise at a rapid rate. Three national officials all agreed that within the next decade, cyber attacks would be the nations number one domestic threat.
On November 14, FBI director James Comey testified to Congress that the threat of traditional terrorist attacks on our nation continues to decrease, while the threat of cyber attacks and cyberterrorism continues to rise at a rapid rate. Three national officials all agreed that within the next decade, cyber attacks would be the nations number one domestic threat.
Of the two types of terrorism mentioned, which one do you feel more threatened by? I'll be honest, because cyberterrorism can be a difficult concept to grasp, and the effects of it can be hard to visualize, I still personally feel more threatened by the thought of traditional terrorism. That isn't to say that one is more dangerous than the other, but it is just my gut reaction to the terms.
Tell me which one you feel the most threatened by and why. For me, old fashioned bombings and hijackings are what really gets my pulse going.
Prosecution?
An interesting thought popped into my head today as I sat back and thought about the various cyberterrorist attacks that have taken place over the last few years. Do you think the FBI should attempt to track down anonymous cyberterrorist groups and put a few of the members in jail? Most of these groups act anonymously and lure in hundreds of random citizens to help execute these events, but there has to be a few select leaders in these groups. Are there even specific laws these people are breaking? Do we need to evaluate the laws regarding this topic and potentially pass new ones?
If the FBI tracked down the top dogs of some of these groups, surely it would hinder their ability to pull of future attacks, and also scare others enough to keep them from joining in on these attacks as helpers. Some people may not even feel most of the cyber attacks are worthy of prosecution, that these groups are just using technology as a way of protesting or getting their message out into the world effectively. Where does it cross the line though, that after an attack is executed, somebody needs to go to jail. Should it be if it causes stress to others? Harm to others? Financial loss for others?
If the FBI tracked down the top dogs of some of these groups, surely it would hinder their ability to pull of future attacks, and also scare others enough to keep them from joining in on these attacks as helpers. Some people may not even feel most of the cyber attacks are worthy of prosecution, that these groups are just using technology as a way of protesting or getting their message out into the world effectively. Where does it cross the line though, that after an attack is executed, somebody needs to go to jail. Should it be if it causes stress to others? Harm to others? Financial loss for others?
I say we need to locate a few of these groups and try to put them away!
Sunday, November 10, 2013
Operation: Titstorm
The cybergroup known as Anonymous conducted a series of attacks in February of 2010 in response to the Australian governments proposed web censorship regulations. Operation Titstorm was the name given to the cyber attacks by the attackers. The attack began as a protest responding to a plan by Australian Telecommunications Minister Stephen Conroy that would require internet service providers to block Australian users from accessing illegal and what the government deemed as "unwanted" content. Websites to be blocked feature pornography showing rape, bestiality, child sex abuse, small-breasted women (who may appear under the legal age), and female ejaculation. The proposed filter also includes gambling sites along with others showing drug use. Anonymous conducted a DDoS attack, or Distributed Denial of Service attack that resulted in lapses of access to government websites on the 10th and 11th of February, 2010. This was accompanied by emails, faxes, and phone calls harassing government offices. The actual size of the attack and number of perpetrators involved is unknown but it was estimated that the number of systems involved ranged from the hundreds to the thousands. The amount of traffic caused disruption on multiple government websites.
Do you feel this is a viable form of protest? Would you participate in this form of protesting? Do you think this would be effective?
Sources:
http://en.wikipedia.org/wiki/February_2010_Australian_cyberattacks
"Pure" Cyberterrorism
There is another aspect of cyberterrorism out there that many people aren't familiar with. The concept of "pure" cyberterrorism. Pure cyberterrorism is accomplished by utilizing computer technology and the internet to inflict destruction or damage on tangible property, and even death or injury to individuals. It is this pure cyberterrorism that most writers mean when they discuss the dangers posed by the cyberterrorist. This separation of the various types of cyberterrorism poses a significant impact on our ability to protect ourselves.
I have yet to find any solid examples where pure cyberterrorism has had any real existence. Most of the cyber attacks happening now create fear and panic, but do not cause damage to tangible property.
Are you more concerned with the fear and panic that cyberterrorism can create, or the possibility of this "pure cyberterrorism" where actual tangible damage can occur as a result? Do you feel that pure cyberterrorism is even possible?
If you can demonstrate any evidence of pure cyberterrorism occurring in the past (physical property damaged or lives lost), please list below...
Sources:
http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/
I have yet to find any solid examples where pure cyberterrorism has had any real existence. Most of the cyber attacks happening now create fear and panic, but do not cause damage to tangible property.
Are you more concerned with the fear and panic that cyberterrorism can create, or the possibility of this "pure cyberterrorism" where actual tangible damage can occur as a result? Do you feel that pure cyberterrorism is even possible?
If you can demonstrate any evidence of pure cyberterrorism occurring in the past (physical property damaged or lives lost), please list below...
Sources:
http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/
Friday, November 8, 2013
Cyber Terrorism Real?
Is the Cyber Terrorism
Real?
Many articles and studies underline the problems that have
arisen due to cyber terrorism.
The FBI defines cyber terrorism as a “premeditated,
politically motivated attack against information, computer systems, computer
programs and data which results in violence against non-combatant targets by
subnational groups or clandestine agents.”
If the FBI considers cyber terrorism as a violent crime,
then is it a crime if no one is physical harmed. Most cyber-attacks are nonviolent. However they are detrimental to an economy or
society.
This does not mean that there are no acts of violence being
committed by cyber-attacks. Terrorists
organizations try to break down national infrastructures with the intent of
harming national citizens or overall governments.
However, by the FBI’s take on cyber terrorism, terrorists
organization’s malicious attempts still
wouldn’t fit the FBI’s standards of cyber terrorism.
Where is the line
drawn between regular cyber-attacks and cyber-terrorism?
Do you believe
Cyber-Terrorism even exists?
Work Cited
Singer, Peter W. "The Cyber
Terror Bogeyman." The Brookings Institution. Brookings,
Nov. 2012. Web. 08
Nov. 2013.
Cyber Terrorism Affects with Economic Espionage and Intellectual Property
Cyber Terrorism Affects with Economic Espionage and Intellectual Property
The Chinese government is known for engaging in economic
espionage in cyberspace. The Chinese are the world’s most active and persistent
practitioners of cyber espionage today. Evidence of China’s economically disturbing
theft of registered technologies as well as other intellectual property from the
United States and other countries. Cyber terrorists from any nation have the
ability to cripple our national infrastructures. Over the past few years, our
government has revealed that the threat of economic cyber espionage appears even
more of a threat than previously discovered. The cyber espionage and theft
among companies’ intellectual work has increased in the U.S. economy and globally
over the past decade. Evidence shows us that China plans to help build its own economy
by the theft of intellectual property. That is easier than creating innovation and
investment standards within its research and development fields (Top two fields
within US economy). The Chinese steal innovations and intellectual property due
to it being less costly and more effective then attaining them by legal courses
of action. The Chinese turn the stolen ideas straight into production. This
makes them able to create products much quicker and cheaper than other
countries’ companies. Cyberspace is a perfect platform for stealing intellectual
resources. Hackers can easily breach systems that transfer large amounts of
data, while corporations and governments have a very hard time identifying
specific criminals. The cyber threat is
very real and detrimental to our nation.
Do you think the government should
step in with more laws to protect intellectual property, or should that be left
up to the individual companies?
Works Cited
Subscribe to:
Posts (Atom)