StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Sectors Targeted by Cyber Terrorism - Research Paper Example

Cite this document
Summary
The paper "Sectors Targeted by Cyber Terrorism" highlights that the choice of the method employed to fight cybercrimes vary from company to company. Some network owners at times use more than one technique to fully ensure that the security of their networks is not compromised…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Sectors Targeted by Cyber Terrorism
Read Text Preview

Extract of sample "Sectors Targeted by Cyber Terrorism"

Computer sciences and Information technology Cyber Terrorism and Network Security Cyber terrorism refers to the use of computer and computer networks to cause harm intimidate or coerce others (Brenner, 2012). The use of computers and the internet to carry out criminal activities has been on the rise and has affected several sectors worldwide. In the United States of America, the top targets of cyber criminals and cyber terrorist have been the security sector and the financial sector. Cyber terrorists have unlawfully invaded financial institution systems and caused losses to them. Sectors Targeted by Cyber Terrorism The security sector and the financial institutions have not been the only targets of cyber terrorism. The manufacturing sector has also been heavily targeted and attacked by cyber terrorists and criminals. This has been done especially to access information about manufacturing processes and control process. Cyber terrorist may attack manufacturing industries systems so as to get access to the data concerning the processes and procedures used in that industry. This information may then be used elsewhere to manufacture counterfeit commodities. Cyber terrorist also attack the automated machine control processes so as to cause accidents in that particular industry. These may be politically motivated attacks. The other sector that is targeted by cyber terrorists is the health care sector. The sector has been at risk since it has not invested in cybercrime security procedures. These attacks may results into financial losses and even deaths. These cyber terrorist can access the hospital data system and for example change the medicine prescription of a patient resulting into death of the patient (Krasavin, 2004). The transport sector and the critical infrastructure of the country are also top targets of cyber terrorists. These cyber criminals can use their software to interfere with for example flight schedules in order to cause confusion in airports. Communication systems have also been attacked by cyber terrorists leading to access of vital information and confidential information of the American citizens. Cyber terrorists have as well targeted the education sector in the United States of America. This has been for example done through accessing the databases of various education institutions and changing the grades of the students or interfering with the curriculum. These terrorists have also used the internet to carrying out cyber bullying in order to intimidate students. In addition to that, students’ work and assignments have also been attacked and interfered with through spamming and other malwares. Cyber crime is therefore a threat to all sectors of the United States of America economy. In order to combat cyber crimes and protect the economy of the United States of America to the effects associated with these computer related crimes, the government came up with the cyber security frame work. The objective of this presidential executive order is to help various sector combat cyber crimes (Executive Order no.13636 2013). The framework core contains a set of cyber security activities, results and some known references. The aim of the frame work core is to help the company identify its cyber related risks. This is a positive step since it helps sensitize companies about cyber crimes. The order also has a framework tier that helps the company identify mechanisms for combating these cyber crimes. It enables the company come up with mechanisms for managing the risks related to cybercrimes (Symantec, 2006) This executive president order, though voluntary in its implementation, is a positive step in combating cyber crimes. Network Protection Techniques Due to the rise of cyber related crimes and attacks on computers, networks and systems, computer data security has been achieved through various ways. The aim of these methods and ways used is to protect the computer or network from foreign attacks launched cyber criminals and cyber terrorists. Snorby is an example of a web application that has been developed to help in ensuring the security of a network. Snorby is a front end web application scripted in ruby on rail that interfaces with current internet intrusion detection systems such as Suricate and Scagan. Intrusion detection technique has been used by several users as a way of securing their systems and data from foreign intruders. The intrusion detection systems works on a principle of giving an alert when there is an intrusion into that particular network or computer (Marchette, 2007). After giving a signal or an alert, the user or the system takes an action to counter the intruder and prevent him or her from accessing the data in the user’s network or computer. This is done by disconnecting the system, incoming threat diversion, or triggering file back up. The system may also automatically change the security setting to avoid the attack. The logs from an intrusion detection system are recorded and can be used to trace the origin of the attack coming to the system. Use of firewalls has also been employed. These are sets of programs used in a gateway server to provide security to resources of a private network (Cheswick, Bellovin & Rubin, 2005). The firewalls analyses the incoming data and it then makes the decision on whether to accept it on not. The firewalls are configured to allow only data that is coming from a domain which is identified and known. Data from unknown locations and domains are denied entry and this therefore protects the network or computer from attacks that might come from cybercriminals. The other security measure that is used to protect data or a system is encryption. This strategy involves converting all the data from the plain text to a format that cannot be read by someone who has accessed it illegally. This format is called cipher text format (Lehtinen, Russell, & Gangemi, 2006). Basically, this technique does not prevent intrusion and attack but it prevent the intruder from understanding the data accessed illegally through converting it into cipher text. Encryption can be used to protect both data at rest or data that is in transit. Data at rest is stored data, maybe in a laptop or a USB Flash Drive. Encrypting the stored data protects it from being understood by a foreign party should the laptop or storage device get lost. Data on transit is one that is moving from one network to another largely via the internet. This data is very vulnerable to attacks and interceptions. Encrypting the data therefore protects it from being understood when accessed unlawfully (Brenner, 2012). Hardening of the operating system is another way of protecting data in a computer or a system. This involves removing all the unnecessary programs in the computer and leaving only important ones (Tipton & Krause, 2006). This is because most cyber criminals use these programs to launch an attack into a computer or system. Conclusion Cyber terrorism is a vice that affects all the sectors of the economy and should therefore be fought in all fronts. The choice of the method employed to fight cybercrimes vary from company to company. Some network owners at times use more than one technique to fully ensure that the security of their networks is not compromised. References Brenner, S. (2012).Cyber Crime: Criminal Threats from Cyberspace. New York: Balk Publishers Cheswick, W., Bellovin, S. & Rubin, A. (2005).Firewalls and Internet Security: Repelling the Wily Hacker. Boston: Pearson Education, Inc Executive Order no. 13636, (February 12, 2013).Improving Critical Infrastructure Cyber security, DCPD-201300091.http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013- 03915.pdf Krasavin, S. (2004).What is Cyber Terrorism? London: Computer Research Centre Lehtinen R., Russell, D. & Gangemi, G. (2006).Computer Security Basics. Sebastopol: O’Reilly Media, Inc Marchette, D. (2007).Computer Intrusion Detection and Network Monitoring: A statistical Viewpoint. New York: Springer-Verlage New York, Inc Symantec, R. (2006, February).Internet Security Report .The New York Times. Retrieved from http://www.nytimes.com Tipton, H. & Krause, M. (2006).Information Security Management Handbook. Boca Raton: Auerbach Publications Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research Papper Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Research Papper Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1642525-research-papper
(Research Papper Paper Example | Topics and Well Written Essays - 1000 Words)
Research Papper Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1642525-research-papper.
“Research Papper Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1642525-research-papper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Sectors Targeted by Cyber Terrorism

Cyber Terrorism

(Gordon and Ford, 4) An attack that causes harm to people or property and leads to mass fear can be considered as cyber terrorism.... However, attacks that lead to the disruption of trivial services or activities cannot be labeled as cyber terrorism.... Forms of cyber terrorism: In the 20th century, the internet has emerged as the favorite weapon of mass destruction as well as a convenient means of communication for terrorists.... A host of important websites including the Banking sector, the Business sector and the Government sector were targeted by these cyber attacks....
10 Pages (2500 words) Research Paper

Cyber Terrorism as a Combination of Cyberspace and Terrorism

This paper ''cyber terrorism as a Combination of Cyberspace and Terrorism'' aims to provide an explanation of what cyber terrorism is and how it is propagated in information technology world and the impacts it has on the businesses and organisations that use the internet.... cyber terrorism is a combination of cyberspace and terrorism.... cyber terrorism can be used to help plan other terrorist activities, soften a target prior to a physical attack and generate more fear and confusion concurrent with other terrorist acts....
10 Pages (2500 words) Literature review

Components of Cyber-Terrorism

This essay "Cyber-terrorism" is about the mingling of cyberspace with terrorism.... However, the increasing influence of cyberspace has extended into the area of terrorism.... According to the Computer Emergency Response Team (CERT) Coordination Center, there were about 2,500 vulnerabilities detected in the nation's cyber system in 2001, and this number rose to 6,000 in 2005.... This exponential increase in cyber vulnerabilities of systems coupled with increasing cyberterrorism is leaving a critical part of the nation's security exposed to terrorist pursuits....
8 Pages (2000 words) Essay

Discuss some of the treats that Cyberterrorism pose. How can cyberattacks be prevented

Unfortunately, this rapid and immense growth of computer technology has engendered a This new class of threats has been termed as cyber – threats, and in the present scenario, there is no section of society that can afford it.... The modus operandi of cyber – threats entails the employment of computer technology to perpetrate fraud, heinous crimes and other harmful acts against society.... With this arsenal, even smalltime cyber terrorists can communicate with other members in their group and their opponents....
11 Pages (2750 words) Essay

Cyber Terrorism Attacks

"cyber terrorism Attacks" paper establishes narrow and broad descriptions of cyber terrorism.... Further, cyber war is the inclusion of cyber terrorism since it involves the activities of terrorist organizations prying rival governments' information and destroying it to bar them from achieving profound goals in anti-terrorism activities.... he following discussion establishes narrow and broad descriptions of cyber terrorism.... Scholars concerned with the emergence of cyber terrorism in the global society assert that the vice is relative to actual terrorism since it includes the destruction of properties and information....
10 Pages (2500 words) Essay

Targets for Cyberterrorism

According to the research findings, it can, therefore, be said that Internet and terrorism may be viewed as not being distinct from each other.... However, according to Krasavin, cyberterrorism is considered as being on equal footing with other forms of 'terrorism', as it is a mixture of terrorist activities and an area of specialization.... Cyberterrorism, as defined by Collins, is the fusion of cybernetics and terrorism.... The lack of a definition for hacktivism and cyberterrorism is the cause for such ambivalence; as such even the word 'cyber' is being debated among scholars, as to what its true meaning is....
42 Pages (10500 words) Research Paper

Cyber Crime: Investigating Cyber Terrorism

"Cyber Crime: Investigating cyber terrorism" paper looks at cyber terrorism in detail.... cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities.... The following are some of the criminal activities regarded as Cyber Crimes: Online Fraud, Spam, Cyber Bullying, Piracy, and cyber terrorism.... cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities (Matusitz, 2005)....
10 Pages (2500 words) Coursework

Analyzing the Most Important Threat to the Public Sector and Its Implication on National Security

As the country continues to fight acts of terrorism, its citizens are becoming a target of retaliatory attacks from various terrorism organization1.... The paper "Analyzing the Most Important Threat to the Public Sector and Its Implication on National Security" discusses that the United States is at war and its critical infrastructure, the majority of which belong to the private sector faces the danger of destruction as a result of a cyber-attack....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us