We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Cases of cyber attacks - Case Study Example

Comments (0)
The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another.Instead of bullets and guns,critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power…
Download full paper

Extract of sample
Cases of cyber attacks

Download file to see previous pages... The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another.Instead of bullets and guns, critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power. In this paper,a comparison of three cases of cyber terrorism would be discussed to enable people understand the nature, power and threat caused by cyber attacks. Likewise, the governments’ initiatives to response to similar threats in the future are also included in this report. The case of the cyber attack in Estonia. In 2007, Estonia experienced a massive DDOS attack which paralyzed most of its government websites. Although Russian authorities denied the attack, the Estonian government highly believed that it was from Russia. The attack happened after a political issue which involved removing Estonia’s transfer of a Soviet war memorial in Talinn to a military cemetery ( A cyber riot, The Economist.com). The cyber attack is considered a DDoS or Distributed Denial Of Service. According to searchsecurity, techtarget.com, DDoS happens when “ a multitude of compromised systems attack a single target, thereby causing a denial of service; hence, the target system is forced to shut down which prevents legitimate users to receive service”. The main targets were banking institutions, schools, government websites and other institutions; however, the first launch targeted government sites. The government’s response was to shutdown all mobile phone networks as well as banking systems which really caused a lot of inconvenience to the public. The event was catastrophic enough to prompt NATO security experts to head to Estonia and investigate on the matter. A youth group known as Nashi meaning “Our” claimed the attack through its spokes person Konstantin Goloskokov which was funded by private business groups ( Shachtman, Wired.com). Estonia has reacted by creating a Cyber Defense League composed of specialists. It also came up with a Cyber Security Strategy in 2008 that would provide as framework for improving its defense against cyber attacks. Ossetia’s cyber-attack on Georgia in 2008 In 2008, Russia was accused by Ossetia for hacking its government and commercial websites. The attack on Georgia was believed to be a part of Russia’s military support in South Ossetia. The target of the attack included government websites according to a report on smh.com.au, the cyber attack included: 1. The Georgian Parliament main website has been defaced. The website content showed images of Adolf Hitler which replaced the picture of then Prime Minister Saakashvili; 2. The servers of Azerbaijani Day was disabled; As a result, some of the government’s website like Ministry of Foreign Affairs created a temporary site on the Google Blogger to safely disseminate information. Even news agency servers were attacked that time which really alarmed other countries. The main culprit of the attack was South Ossetia Hack Crew which came from a group of programmers from Russia. Today.az reported that “Russian intelligence services “were responsible for the attack (today.az,2008). The cyber attack is similar to the DDoS attack that happened in Estonia in 2007. As aforementioned, a DDoS attack would force the target to shut down which denies the legitimate users to access the site. After the attack, different governments such as Ukraine, Poland and Estonia helped Georgia by mirroring the web pages, it was a historic moment in history when Estonia came to the aid of this country (Schachtman, 2008 July). Indeed, Georgia learned a valuable lesson like Estonia which prompted its government to focus on cyber security measures. The National Security Council of Georgia created a Computer Emergency Response Team that can immediately respond to cyber attacks. Similarly, it has been enhancing security measures by continuously monitoring government websit ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Cyber Terrorism Case Study
The emergence and widespread use of the Internet globally has made this medium vulnerable to various threats and acts of violations of both personal and organizational privacy and security. Termed as cyber terrorism, the definition of which was revealed to have spurred difficulties in taxonomies, its meaning is hereby quoted by Gordon as: “Cyber terrorism is the convergence of terrorism and cyberspace.
5 Pages(1250 words)Case Study
Social Engineering Attacks and Counterintelligence
To achieve their objectives, social engineers run con games on other individuals by relying on these people’s weaknesses and natural helpfulness. Social engineering is seen to comprise of a collection of various techniques and tools that are seen to range from psychology, ethical hacking and negotiation.
5 Pages(1250 words)Case Study
Remote Access Attacks
From there we shall identify the vulnerabilities from the perspective that we have been contracted to make the network secure. Another assumption from the topology would be the company is using an out dated network security policy. From the topology the network has been setup poorly with very many access points into the system.
5 Pages(1250 words)Case Study
Marketing Cases Problem Solving
Based on the strategic actions, according to me, A1 steak sauce could investigate the opportunity of beefing up its relationships with a variety of suppliers for their firm. It may try to shape restricted alliances with recognized suppliers to craft a disadvantage for Lawry's.
4 Pages(1000 words)Case Study
Information Warfare & Cyberterrorism
With rising technology levels, cases of cyberterrorism have increased and they have been developed to paralyze even the most complicated digital systems. The situation worsens when the information warfare becomes a rivalry between two nations. Over the years,
3 Pages(750 words)Case Study
Cyber Security and Startups
The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort
1 Pages(250 words)Case Study
Information Needs for the AIS
Typically, for firms to improve their competitive average in the field there has to be an attempt change the manufacturing methods and tools, which would only be possible through technological
5 Pages(1250 words)Case Study
Detecting Jamming Attacks
The disruption is normally caused to the radio signals by the use of a crushed signal at the same frequency level. Jamming attacks can obstruct the normal function of wireless
3 Pages(750 words)Case Study
Cases Summary
In this case summary paper, I am going to conduct a case study for the Walt Disney Company, based in the USA; analyze some of the key problems facing it. The first case is the bankruptcy issue facing the company, which has led to the loss of the public’s trust towards the
2 Pages(500 words)Case Study
Cyber Security in Business Organizations
Before 2013’s thanksgiving, a malware was installed in Target’s systems for payment and security to facilitate the theft of the cards that would be
3 Pages(750 words)Case Study
Let us find you another Case Study on topic Cases of cyber attacks for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us