Free Essay

Cyberattack

In: Computers and Technology

Submitted By ead82
Words 1220
Pages 5
Internet, by far is the best innovation man has ever created. In the initial days, communication was made by verbal or non verbal cues, even if people stayed far away from each other. Later came letters, which could be sent to the near and dears. With the world progressing so rapidly, people became closer than they ever were before, and came along a great invention made by Graham Bell, the telephone. With telephone in the back of the mind, communication stream further widened to include Internet.
Internet has become the best tool for communication. People communicate via email, chat, voice and video chat (the recent addition to the ever increasing resources provided by internet). It provides a wealth of knowledge. Information on any kind of subject is made available in a few seconds over the internet, ranging from shopping to government, business to entertainment, and so on.
It has become easier

to establish relationships with people from different backgrounds, culture and location. People can sit at home, and learn about another country, their religion, language, way of living, etc without ever visiting the place. Internet proves to be the most helpful tool for all fields. Students use the internet almost always, to study and conduct research for their courses. Doctors and medical students use the web to publish their research papers, findings, different technologies, and cures for various diseases.

Cyber attack is a crime that most people do not report When we talk about national security, we talk about the security of over one billion people and sovereignty of a country that is culturally rich, politically stable, socially compact and economically emerging. The worst victim of terrorism and naxalism India and its national security has been threatened recently by cyber crime.

They concept of cyber crime is not radically different from the concept of conventional crime. Cyber crime is the latest and perhaps the most complicated problem in the crime world of the country. In the context of national security, cyber crime may involve hacktivism (on-line activity intended to influence polity), traditional espionage or information warfare and related activities.

Another way to define cyber crime is simply as criminal activity involving the information technology infrastructure, including illegal access, illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting etc.) misuse of device, forgery (ID theft) and electronic fraud. The rising level of cyber crime is an indication of an enormous threat to national security. Lawmakers and law enforcement agencies have to give immediate attention to the matter.

Cyber crime is a rampant evil with its roots firmly planted on the growing dependence on computers in the contemporary scenario. In today's age when everything from small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications Various kinds of cyber crimes are prevailing in the world today. Hacking, bombing, diddling, spoofing, botnet attacks, salami attacks and viruses are capable of breaching the security in the information systems of vital installations. There have been several instances in the recent past to support the prevalence of these attacks on a large scale. In fact, the first recorded cyber crime dates back to 1820. Joseph Marie Jacquard, a textile manufacture in France produced the loom which involved a seniors of steps. This caused fear among Jacquard's employees that their traditional employment and live hood were being threatened. They committed acts of sabotage to discourse Jacquard from further use of the new technology.

Cyber terrorism is a threat to national security which may be defined as " the premeditated use of disruptive activities or the threat thereof, in cyber space, with the intention of further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objects". A cyber terrorist is a person who uses the computer system as a means or ends to achieve the following objectives - (1) putting the public or any section of public in fear, or (2) affecting adversely the harmony between different religious, racial, language or regional groups or castes or communities; or (3) coercing or overawing the government established by law; or (4) endangering the sovereignty and integrity of the nation.

Cyber crime is a global phenomenon and therefore the initiative to fight it should come from the same level. Today cyber and organized crime has become the order of the day round the globe and the need to put an end to this criminal act cannot be kept aside. Research has shown that people lose millions of with this set of people because they are enemies of progress of the nation. All efforts to put this to end have proved unsuccessful because even the people fighting the crime are criminals. A typical example of this is a lawmaker, a member of the Nigeria's National Assembly Hon. Moris Ibekwe (late) who was in the maximum security prisons in Nigeria for an alleged involvement in a free fraud. If a member of a legislature can be involved in such un ungodly act, what would unemployed youth do?

The capacity of human is unfathomable. It is not possible to eliminate cyber crime from the cyber space but, it is quite possible to check them for national security. History is witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties and further making the application of the laws more stringent to check crime. There is a need to bring changes in the Information Technology Act to make it more effective. To combat cyber crime it should also be kept in mind that the provision of the cyber law are not made so stringent that it may retard the growth of the industry and prove to be counter productive.

Of late, anti-Gandhi forums or hate India posting along with war for people who hate India campaigns on Google's Social Network Site, Orkut, have been perplexing authorities. Fan clubs of underworld dons like Dawood Ibrahim and Chota Shakeel and other wanted dons are also doing the rounds on Orkut. One such community even asks people i they would like to join the D. Company. If a criminal ends up having a number of fans all across the globe, it is crazy. This throws light on the mindset of the people. As for the anti-India, anti-Pakistan campaigns, we must realize that in the long run these antagonistic feelings can pose an irreversible threat to our own existence and people behind these acts of notoriety should be penalized as they are somewhere fuelling a sense of hostility in the already estranged relations between the two counties.

These cyber crimes pose a threat to the national security of all countries, even technologically developed countries like USA also. Technology savvy terrorists are using 512-bit encryption, which is next to impossible to decrypt. The recent example may be cited of Osama Bin Laded, the LTTE attack on America's army deployment system during Iraq war. The organized hackers have certain objective. The reason may be to fulfill their policies bias, fundamentalism etc.…...

Similar Documents

Premium Essay

Catastrophic Cyberattack on the Health System

...Catastrophic Cyberattack on the Health System Over the couple decades the United States has taken on using more of the information technology systems. By doing this helps with sharing information quickly and efficiently. One of the changes that have come into this cyber system is the United States health care system. When it comes to a person’s health care having the information quickly can make a difference in a life. At the same time there are potential risks when sharing this kind of information over an internet connection. Cyber-terrorism meaning is “an assault on electronic communication networks” (Dictionary.com. n.d. para. 1). If this happens to our health care system, the persons responsible could access information that is private. This happened to one hospital located in Bakersfield, California. The hospital was him with a virus attack that crippled the computer system. So the doctors and nurses at this hospital had to go back to using paper records for the patients. Attacks like this can be costly. It can cause delays in surgeries, important test results and cause the care to patients to be interrupted (UCDavis Health System, 2010). With the health care systems moving into a digital world seems like a great idea. Back in 1999-2001 the health records of a service member and their family was done on paper. Every time a service member would move to a different base they had to go get those records and carry them to their next duty station. When I......

Words: 1047 - Pages: 5

Free Essay

Frrfrf

... from the comfort of your own home or office, exfiltrate information electronically from somebody else’s computer around the world without the expense and risk of trying to grow a spy.” On November 15, 2007, the bipartisan, congressionally chartered U.S.–China Economic and Security Review Commission (USCC) put a finer point on it: “Chinese espionage activities in the United States are so extensive that they comprise the single greatest risk to the security of American technolo- gies.” Cyberpenetration is by far China’s most effective espionage tool, and it is one that China’s spy agencies use against America’s allies almost as much as against U.S. targets. Targeting America. The U.S. military has been the primary target of Chinese cyberattacks, followed closely by the Departments of State, Commerce, and Homeland Security. Academic, industrial, defense, and financial databases are also vulnerable. Regrettably, American officials tend to be very sensitive to China’s feelings and refrain from public allegations that the attacks are launched by Chinese agents, even though, as one U.S. cybersecurity expert points out, “the Chinese are in half of your agencies’ systems” already. In fact, Chinese cyberwarfare units have already penetrated the Pentagon’s unclassified NIPRNet (Unclassified but Sensitive Internet Protocol Router Network) and have designed software to disable it in wartime. One general officer admitted that “China has downloaded 10 to 20 terabytes of data from the......

Words: 8993 - Pages: 36

Free Essay

Cyber Warfare

...Russia, Britain and Israel began developing basic cyberattack capabilities at least a decade ago and are still figuring out how to integrate them into their military operations. Experts say cyberweapons will be used before or during conflicts involving conventional weapons to infect an adversary’s network and disrupt a target, including shutting down military communications. The most prominent example is the Stuxnet virus deployed in 2010 by the United States and Israel to set back Iran’s nuclear program. Other cyberattacks occurred in 2007 against Syria and 1998 against Serbia. Crucial questions remain unanswered, including what laws of war would apply to decisions to launch an attack. The United States still hasn’t figured out what impact cyberweapons could have on actual battlefield operations or when an aggressive cyber response is required. Nor has Washington settled on who would authorize an attack; experts see roles for both the president and military commanders. There is also the unresolved issue of how to minimize collateral damage — like making sure malware does not cripple a civilian hospital. Another big concern is China, which is blamed for stealing American military secrets. Washington has not had much success persuading Beijing to rein in its hackers. There is a serious risk of miscalculation if, for example, there is a confrontation in the South China Sea. China could misinterpret a move, unleash a cyberattack and trigger a real cyberwar. What’s clearly......

Words: 492 - Pages: 2

Free Essay

Russian Patriotic Hacking

...During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating regardless of......

Words: 8586 - Pages: 35

Free Essay

Cyber Warfare

...cyber terrorism and the attack against Google considered cyber warfare. The circumstances of the attack, politics, and the parties involved often determine what category an attack falls in. This paper will focus on cyber-attacks that the United States Government deems to be cyber terrorism or cyber warfare. We will explore the past, present, and future of these attacks and our nation’s current known defensive and offensive cyber-attack capabilities. Cyber Terrorism Distinctions between crime and terrorism may be blurry when attempting to describe a computer network attack (CNA). It can be difficult to determine if non-state actors who initiate a CNA are secretly sponsored by a nation state because it can be hard to determine where a cyberattack originated because attackers may direct suspicion toward an innocent third party. Interactions between terrorist and criminals who use computer technology may further blur the distinction between cyberterrorsim and cybercrime. It will remain difficult to determine the responsible party for most of the annoying, yet increasingly sophisticated CNA’s that infect the internet. Some observers feel that the term “Cyberterrorism” is inappropriate, because it doesn’t produce terror like a bomb, chemical, biological, radiological, or nuclear explosive would. They view it more as an annoyance. Others feel that the effect of a widespread computer network attack would be unpredictable and might cause enough economic disruption, fear, and......

Words: 2021 - Pages: 9

Free Essay

Google in China

...Google stops China censorship, Beijing condemns move (Update 3) 22 March 2010 cyberattacks it said originated from China. China reacted quickly to Google's move saying it was "totally wrong" for it to stop censorship and to blame Beijing for the cyberattacks that Google said targeted email accounts of Chinese human rights activists. "Google has violated its written promise it made when entering the Chinese market by stopping filtering its searching service," said the official in charge of the Internet bureau of the State Council Information Office. "We're uncompromisingly opposed to the politicization of commercial issues, and express our discontent and indignation to Google for its unreasonable accusations and conduct," the Chinese official said. The White House said it was "disappointed" Google could not reach a deal with Beijing and reiterated that US President Barack Obama is "committed to Internet freedom and... opposed to censorship." "The US-China relationship is mature enough to sustain differences," added National Security Council spokesman Mike Hammer. Drummond, Google's top lawyer, said "figuring out how to make good on our promise to stop censoring search on Google.cn has been hard. "We very much hope that the Chinese government respects our decision, though we are well aware that it could at any time block access to our services." Google co-founder Sergey Brin told The New York Times that shifting the Chinese service to Hong Kong was not given a clear-cut stamp......

Words: 1384 - Pages: 6

Premium Essay

Cyberattacks

...Cyberattacks As society begins to move out of an age of pen and paper and begins to move towards a virtual age where data is stored in digital data center, the security of the valuable information is at a much greater risk. This new collection of massive amounts of data, whether it be government secrets, credit card information, social security numbers, or social media accounts could possible be another target for hackers. With all these types of information online, Hackers or Cyberterrorists can affect certain things by initiating a cyber attack. But what is a Cyberattack? It is an “attack on computer based systems to sabotage, destroy or to spy on others, through such means as viruses, hacking, denial-of-service attacks.” [Jannson] For example, one method is DDoS, which would make the victim’s machine inaccessible to them. If these Cyberattacks are politically motivated, then the conflict is named Cyberwarfare. It is well known that confidential or personal data of any type in the wrong hands could have catastrophic effects on whoever the victim shall be, whether it be a single person, family, company, corporation or even the government. But what happens in an instance where the government is being targeted by Cyberterrorists or Hacktivists, (a.k.a social activists that hack) are their actions considered Acts of War? There are multiple sides to this argument, both having very strong points and back up the support their main argument. A popular argument is that......

Words: 1841 - Pages: 8

Premium Essay

Sony Data Breach

...especially for big corporations such as Sony. This data breach all started on November 24th, 2014 when Sony realized they were becoming a victim of a high profile studio wide cyberattack. A cyberattack is when a company has unauthorized people or computers accessing protected files and information. For a big corporation like Sony you can imagine this caused a big uproar and got the public’s attention. The cyberattack was traced back to a group that called itself #GOP or the Guardians of Peace. This group of hackers is supposedly from North Korea which does not makes this situation any better. There were a number of things Sony was worried about be accessed, such as unreleased movies, employee information, customer information, and other sensitive material. The first step of this hacking process involved GOP illegally acquiring a valid digital certificate from Sony. After gaining access to the company from this certificate, GOP was then able to release a malicious software called Destover, which sneaks into the systems and takes over, giving access to the data. After that Sony’s next move was to immediately blacklist that copy of the digital certificate, so if it were to be used again it would be flagged as malware and not allowed passed the other security measures. While Sony has currently curbed the cyberattacks there is no way for them to get back the hundreds of terabytes of data already stolen. What happened next was devastating for Sony Pictures. There were a number......

Words: 3014 - Pages: 13

Free Essay

Preventative Measures

...Preventative Measures There are a lot of things you can do today to keep yourself safe from harm from cyberattacks. While these options won’t completely eliminate all the risk associated with online security, they are a good starting ground to make it harder for the criminals to access your info. To begin, create strong passwords that are unique for each website so that you do not leave all accounts vulnerable by creating the same password for all. Shopping online also brings up a lot of vulnerabilities since hackers could obtain your financial information through the online stores if they have significant flaws in their online security. Having just one credit card for online purchases greatly reduces the risk of losing your financial data. Phishing scams use fraudulent emails and fake websites that masquerade as legitimate businesses, to lure unsuspecting users into revealing private login information. It is very important to make certain that the websites you visit are legitimate. New technology improvements in anti-virus software allow for better protection which is why it is necessary for everyone to stay up to date on the newest anti-virus software. Other security patches offered by your web browser also add a layer of protection. With the increase of mobile devices such as laptops and tablets, there are a number of risks using your device in public spots with unsecured wireless connections. It also makes it easier for people passing by to view your screen. A private......

Words: 325 - Pages: 2

Free Essay

Compare Services

...Michael Torres Hacker group research Deep Panda This hacking group appears to be sponsored by the Chinese government. It has been tied to several successful attacks in the last year. The security firm Crowd Strike named them Deep Panda. The hacker’s latest work may have been the massive Anthem data breach, which exposed the personal information of more than 80 million insurance policyholders. The cyberattack puts Anthem customers at risk for identity theft throughout their lives, and exposed many to subsequent phishing attacks from fraudsters around the world. Deep Panda has been tied to cyberattacks on U.S. foreign policy think tanks and individuals who are experts on the Middle East and Australian media outlets. A 2014 investigation by Crowd Strike also blamed the group for sending malware to organizations across the U.S. defense, healthcare and technology sectors. Deep Panda is considered one of the most sophisticated hacking groups operating today. Just last month, the Federal Bureau of Investigation warned the cybersecurity community that the group represents a threat. “This group uses a wide variety of tools including generic hacking utilities in order to gain access, establish persistent network access, and move laterally though the victim network,” an FBI official stated in a memo. Flying Kitten This Iran-based hacker group has been in Crowd Strike's sites since mid-January, and is best known for targeting a number of US-based defense contractors and......

Words: 338 - Pages: 2

Free Essay

Csec 620 Individual Assignment 2

...decision did not sit well the Russian speaking minority and it caused a riot. In addition to rioting cyberattacks were launched against the country of Estonia (Herzog, 2011). Who were responsible for the attack? No one is certain for sure whether the Russian government officially sanctioned the cyber-attacks, but what is undisputed is that Russians were responsible. Russian language websites, online forums and some blogs were busy with discussion about the removal of the war memorial and the cyber-attacks (Evron, 2008). Some analysts concluded that the attackers acted on their own to protest against the government of Estonia. As it turned out some of these “hacktivists” were experience hackers who had their own botnets out on contract for the cause, some were capable of writing their own destructive scripts, and some were “script kids”. Script kiddies are the least experienced of the hackers. They are novice hackers who carried out their attacks by following instructions found on several Russian hacker websites. With so many individuals involved from the Russian diaspora, and the disparate nature of each individuals, it was extremely difficult to track them. However, in January of 2008, the government of Estonia traced and successfully prosecuted one of the perpetrators ("International Affairs Review”). Strategic Shifts in Response to Attacks Prior to the 2007 cyberattacks, the majority of Estonian banks were foreign owned, predominantly by Sweden. This ownership......

Words: 2634 - Pages: 11

Free Essay

Home Depot Data Breach

...Home Depot Data Breach Background on the 2014 Home Depot Data Breach Home depot was the target of a cyberattack on their information system infrastructure that lasted from April of 2014 to September of 2014. As a result of the attack and following data breach, 56 million credit-card accounts and 53 million email addresses were stolen. (“Home Depot Hackers Exposed 53 Million Email Addresses”) The cyberattack involved several steps. First, the attackers gained third party credentials allowing them into the system. Next they exploited an unknown weakness in the system that allowed for the attackers to elevate their own access privileges. Finally, they installed malware on Home Depot’s self-checkout systems in the U.S. and Canada, allowing for the data to be stolen. Because this was a multistage attack, there were several stages of failures. While this shows that there were multiple lines of defense, the fact that there were multiple failures as well is a large issue. It demonstrations that even with multiple lines of defense Home Depot was still not adequately protected. The first failure was that the attackers acquired credentials from a third party vendor. This may not have been Home Depot’s fault directly, but there are still governance processes they could’ve employed to prevent it. Once the attackers were in the system they exploited yet another vulnerability that allowed themselves to elevate their access rights. The third vulnerability that was exploited was the lack......

Words: 2954 - Pages: 12

Premium Essay

Cyber Attacks What Should America Do to Stop Them

...Cyberattacks: What Should America Do To Stop Them? Eric Gilliam Colorado Technical University Cyberattacks: What Should America Do To Stop Them? In the past few years, Cyberattacks have increased more than any cyber expert could have expected. Hackers and nation state sponsored attacks have risen about forty eight percent in 2014. America needs to do something now, before it gets worse. If we do not find a way to put a stop to these Cyberattacks hacker could essentially destroy our financial infrastructure. If this was to happen there would be no plastic to use for payment. Cyberattacks are here to stay. We need the help from ethical hackers to police the Cyberattacks world. When you watch the news, you hear about Cyberattacks on a daily basis. What you probably did not realize is “Cyberattacks cost business about 2.7 Million dollars per business” (White, 2014) per business. Cyberattacks are increasing and it is something we all need to look at. When this article came out, there were about 117,339 Cyberattacks every day. Now Cybercriminals are targeting mid-range businesses because larger businesses have increased their security. Cyberattacks can take down anything hackers want to destroy. “The UK National Security Strategy says that there is real risk. Attacks in cyberspace can have a potentially devastating real-world effect. Government, military, industrial and economic targets, including critical services” (Ncube, 2016), for example, hospitals or......

Words: 516 - Pages: 3

Premium Essay

Cyber Incident

...“Anonymous” Attack Cyber Incident On April 24, 2014, the Boston Children’s Hospital reported they had been under a cyberattack from an unknown source for the previous four days. This paper will focus on the details of the cyber security incident, the impact of the attack, the consequences, and a brief explanation of the mitigation steps the hospital has taken post incident. The Boston Children’s Hospital was a victim of a cyberattack between the dates of April 20 and April 25, 2014. The cyberattack on the hospital focused on bringing down the hospital’s internal website – used by hospital personnel to check appointments, test results, and other patient information (Wen, 2014). The hackers used a distributed denial of service approach attack, which consisted of a bombardment of traffic to the hospitals web page, causing it to crash and become unusable to all hospital staff. The hospital has insisted that no patient data or information has been compromised due to these cyberattacks (Farrell, 2014). Law enforcement was notified of the attacks, but it is unconfirmed whether investigations were started. It is suspected the attackers were a part of the well-known hacker network “Anonymous”. Even though no evidence exists to prove this group is behind the attack on the Children’s Hospital, the incident has all the markings of a typical Anonymous cyberattack. The group typically targets Internet pages of large organizations and cripples them by with a barrage of traffic......

Words: 979 - Pages: 4

Premium Essay

Case Study 1: the Critical Need for Information Security Rubrick

...Leblanc, S. P., & Partington, A. (2011). An overview of cyber-attack and computer network operations simulation. Proceedings from MMS ’11: Military Modeling & Simulation Symposium. Boston, MA. Maughan, D. (2010, February). The need for a national cybersecurity research and development agenda. Communications of the ACM, 53(2), 29-31. Write a four to five (4-5) page paper in which you: 1. Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization. 2. Analyze and determine which sector, public or private, has greater insight on the potential of cyberattacks. Justify your answer by citing at least three (3) examples. 3. Suggest at least four (4) best practices that should be implemented when developing a cybersecurity strategy within a security enterprise. Then, evaluate the required roles and functions of Information Technology (IT) personnel that would be required to sustain these best practices. 4. Describe the role of planning when developing a cybersecurity strategy and what key deliverables would ensure an effective implementation and transition. 5. Suggest how public-private partnerships can strengthen cybersecurity efforts and effectiveness in a: a. Corporate environment b. Regional level c. National level 6. Use at least three (3)......

Words: 1615 - Pages: 7