StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Terrorism - Case Study Example

Summary
This case study "Cyber Terrorism" discusses pertinent issues relative to the cyber terrorism attacks exchanged by India and Pakistan due to geopolitical conflict over Kashmir. It should be noted that cybersecurity must be a continued governmental priority…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Cyber Terrorism
Read Text Preview

Extract of sample "Cyber Terrorism"

Cyber Terrorism Case Study Cyber Terrorism Case Study Introduction With the continuing fast pace of technologicaldevelopment that have spanned during the current century, one is intrigued by the way criminal activities have used technological media to perpetuated havoc. The emergence and widespread use of the Internet globally has made this medium vulnerable to various threats and acts of violations of both personal and organizational privacy and security. Termed as cyber terrorism, the definition of which was revealed to have spurred difficulties in taxonomies, its meaning is hereby quoted by Gordon as: “Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination or severe economic loss would be examples” (Denning, 2000, p.1). Two other definitions of the term were created by the U.S. Federal Emergency Management Agency (FEMA) and Coleman whose definitions are as follows: “unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives” (Wilson, 2008); and “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives” (Coleman, 2003). All definitions have emphasized the purpose of furthering social, political, or ideological interests or objectives in these terrorist attacks. In this regard, the current case study aims to proffer pertinent issues relative to specific case on cyber terrorism through the Pakistan – India conflict over Kashmir that defaced a considerable number of Indian and Pakistani websites over a period of three years (between 1999 and 2001). Statement of the Purpose The purpose of the current case study is to present details on cyber-attack that had persisted between Pakistan and India over their territorial conflict on Kashmir. According to Vatis (2001), “this conflict illustrates the vulnerability of critical infrastructure systems to cyber attacks and the increasing willingness of groups to target sensitive systems during political conflicts” (p. 5). The case study, therefore, enhances awareness on conflicting parties’ increased vulnerabilities to cyber terrorist attacks and, thus, should focus on installing increased protection and security measures to prevent destructive disruptions. Description of the Subject The case covered the conflict between India and Pakistan over a territory: Kashmir. Historical events have traced the geopolitical dispute after the British occupation in 1947. Armed conflicts were used through the years before 1998 to resolve problems, after that the dispute eventually resorted to electronic warfare ranging from hacking incidents to web defacements that disrupted websites in both private and public sectors of India and Pakistan. Chronology of the Case Study The India – Pakistan conflict over Kashmir could be traced from the end of the British occupation in 1947, when, according to a summarized discourse: “two countries stood where there once was one. Pakistan separated with the intention of being the nation for the Muslims of India. Kashmir, the roots of the boundary dispute between the two nations, was an autonomous state under British rule and remained so post-partition, when initially given a choice between Pakistan and India. Eventually though, in October of 1947, the ruling prince of Kashmir made a decision in favor of India. This decision was viewed as fraudulent, unfair, and completely unrecognized by the Pakistani government” (Summary: India-Pakistan Conflict over Kashmir, n.d., par. 1). From armed conflicts, in 1998, as revealed by Billo and Chang (2004), “the Indian authorities announced a shift in military doctrine in 1998 to embrace electronic warfare and information operations” (p. 8). Therefore, Pakistan and India have resorted to different hacking and web defacement attacks that immobilized both private and public sectors within their domain (Billo & Chang, 2004). From an initial identified number of 45 websites in India being defaced in 1999, the number have escalated to 275 in 2001 without India’s immediate installation of security measure to prevent the attack which caused significant disruptions. Results The article written by Vatis (2001) visually illustrated the number of attacks from 1999 to 2001 through the figure below. As shown, the India – Pakistan territorial conflict have led to innumerous web site defacements in India starting from 45 sites in 1999 to 275 in 2001. This proves that, when left unabated, the number of disruptions could significantly immobilize various private and public organizations. Source: Vatis, 2001, p. 5 On the other hand, on the part of Pakistan, Billo and Chang (2004) cited the report from The Hindu written by Anand (2003) as disclosing that “Earlier this year, newspaper reports had indicated that an unnamed virus launched by a secretive Indian hacker group had rendered 200 Pakistani websites inaccessible for several days and erased the hard disks of scores of computer [sic] in the Pakistani Government as well as the private sector in that country” (Anand, 2003; cited in Billo and Chang, 2004, p. 41). The case results indicate that cyber terrorism attacks, if left unattended and without proper installation of security protocols, could continue to disrupt various sectors of the economy through defacing websites and immobilizing continue operations of affected organizations. Lessons Learned The India – Pakistan conflict over a territorial concern is an appropriate example of how the dispute escalated to electronic warfare due to the availability of opportunities and vulnerabilities posed by the technological developments of the World Wide Web. As initially revealed, one of the purposes of cyber terrorism is to cause severe losses; in this case, due to the dispute over Kashmir. Without arriving at any conclusive agreement over the territory, and with more sophistication being developed to intrude various websites, there would be continued risks and threats that need to be addressed and mitigated. To address the dilemma, both countries must ultimately forge a treaty to end their dispute. Otherwise, both private and public organizations in both countries must enforce more stringent security applications with regular updating, monitoring and installation of “high fidelity intrusion detection systems (IDS) and firewalls” (Vatis, 2001, p. 19). Regular risk assessment and identification of potential critical infrastructures must be part of an incident management system that must be developed and intensified by all private and public organizations in these identified countries. Likewise, their experience should provide lessons for other countries to apply the same depth in focus and in installing the required security measures to prevent cyber-attacks. Conclusion The current case study effectively presented pertinent issues relative to the cyber terrorism attacks exchanged by India and Pakistan due to geopolitical conflict over Kashmir. Through identifying the purpose, description, a chronology of events, the results and lessons learned, one recognizes that vigilance and focus on cyber security must be a continued governmental priority. References Anand, G. (2003). “Indo-Pak hacker war comes here too.” The Hindu. Billo, C., & Chang, W. (2004). Cyber warfare: An analysis of the means and motivations of selected nation states. Institute for Security Technolgy Studies. Retrieved March 15, 2012 from http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf Coleman, K. (2003). Cyber terrorism. Retrieved March 15, 2012, from http://www.directionsmag.com/articles/cyber-terrorism/123840 Denning, D. (2000). Cyberterrorism. Retrieved March 15, 2012, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html Gordon, S. (n.d.). Cyberterrorism? Symantec Security Response. Retrieved March 15, 2012, from http://www.symantec.com/avcenter/reference/cyberterrorism.pdf "Summary: India-Pakistan Conflict over Kashmir." (n.d.). Retrieved March 15, 2012, from http://userpages.umbc.edu/~nmiller/POLI388/SUMMARIES/SOMA.htm Vatis, M. (2001). Cyber attacks during the war on terrorism: A predictive analysis. Institute for Security Technology Studies. Retrieved March 15, 2012, from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA395300 Wilson, C. (2008). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. Retrieved March 15, 2012, from http://www.fas.org/sgp/crs/terror/RL32114.pdf Read More

CHECK THESE SAMPLES OF Cyber Terrorism

Fraud And Cyber Terrorism

Cyber Terrorism threat Cyber Terrorism is the act of illegally accessing computers and information chiefly via the internet to create physical harm or severe disturbance of infrastructure.... Cyber Terrorism could scholarly be defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives....
3 Pages (750 words) Research Paper

Components of Cyber-Terrorism

Cyber Operations and Cyber Terrorism.... The essay "Components of Cyber-terrorism" focuses on the critical analysis of the major issues in the components of cyber-terrorism.... Project 2 Cyber-terrorism Grear Dale III CJ354 CDROM Cyber-terrorism Cyberspace and Its Importance: The major components which together constitute a nation's infrastructure are the sectors of food, agriculture, telecommunications, public utilities, banking and finance, defence, emergency services, transportation, trade and postal services....
8 Pages (2000 words) Essay

Cyber Terrorism Attacks

"Cyber Terrorism Attacks" paper establishes narrow and broad descriptions of Cyber Terrorism.... Cyber Terrorism Introduction Computers have influenced the modern society in diverse ways.... Ideally, Cyber Terrorism indicates the ill practices of cybercrimes whereby the terrorists engage physically in activities that aim at vandalizing computers and the information contained therein.... Further, cyber war is an inclusion to Cyber Terrorism since it involves the activities of terrorism organizations prying rival governments' information and destroying it to bar them from achieving profound goals in anti-terrorism activities....
10 Pages (2500 words) Essay

The Dangers of Cyber-Terrorism

In the paper 'The Dangers of Cyber-Terrorism' the author discusses Cyber Terrorism, which entails two major aspects: cyberspace and terrorism, allowing it to be considered as the usage of information technology by terrorist organizations.... The risk of Cyber Terrorism is extremely genuine and incredibly hazardous.... The system of the entire world is dependent significantly on computer units and actions Cyber Terrorism against these types of systems may be disastrous....
5 Pages (1250 words) Research Paper

Cyber Terrorism and Warfare

The paper "Cyber Terrorism and Warfare" highlights that Cyber Terrorism and warfare remains hypothetical now.... The third component of Cyber Terrorism is political motivation and rival nations or groups of people seeking political advantages carry out most Cyber Terrorism and warfare operations.... Cyber Terrorism and Warfare Cyber Terrorism and Warfare Cyber Terrorism and warfare involve use of a computer network to tamper with infrastructure, such as transportation and government operations (Andress & Winterfeld, 2014)....
1 Pages (250 words) Research Paper

Cyber Crime: Investigating Cyber Terrorism

"Cyber Crime: Investigating Cyber Terrorism" paper looks at Cyber Terrorism in detail.... Cyber Terrorism refers to the use of Information Technology-based attacks in terrorist activities.... Cyber Crime: Investigating Cyber Terrorism By Cyber Crime: Investigating Cyber Terrorism Cyber Crime refers to any crime that involves computer systems and computer networks.... The following are some of the criminal activities regarded as Cyber Crimes: Online Fraud, Spam, Cyber Bullying, Piracy, and Cyber Terrorism....
10 Pages (2500 words) Coursework

History of Cyber-Terrorism

istory of Cyber Terrorism is not very old.... Weimann (2004) further highlights that the National Academy of Sciences, in 1990, highlighted the gravity of Cyber Terrorism and clearly mentioned the term “electronic Pearl Harbor.... ased on this historical development on the issue of Cyber Terrorism, it can be extracted that with the emergence of the Internet there were only studies, theories, observations and possibilities of cyber threats but there was no concrete and solid evidence or study reflecting the occurrence of Cyber Terrorism across the United States of America....
10 Pages (2500 words) Research Paper

Information Warfare: Cyber Terrorism

"Information Warfare: Cyber Terrorism" paper deals with cyber-terrorism as well as its alter ego, namely Information warfare, which has a major impact on the military security information system.... In addition, this work discusses various forms of Cyber Terrorism.... Cyber Terrorism ... his work deals with Cyber Terrorism as well as its alter ego, namely Information warfare, which have a major impact on the military security information system....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us