Premium Essay

Cyber Threats

In: Computers and Technology

Submitted By rdlarew
Words 641
Pages 3
Cyber Threats
Roger Larew
SEC 402 Informational Warfare
February 16, 2011

Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents
Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm. According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber terrorism is often referred to as electronic terrorism or information war.
Based on recent reports and the information presented to congress, America has a long way to go before security threats are adequately addressed.
Almost half of 2,131 U.S. companies polled had no formal security policies in place, and most relied primarily on user passwords and multiple logons for protection. Only 49% of U.S. companies had plans to raise user awareness of policies and procedures in the next 12 month. Unbelievably only half of 150 companies surveyed by InformationWeek Research one week after the terrorist attacks said that they plan to reassess the security of their facilities in light of those events. We need more people to be doing more creative thinking about computer security, than those who are trying to attack us.
In December, 2000 the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction (aka The Gilmore Commission) released their…...

Similar Documents

Premium Essay

Cyber Threats

...TOP FIVE CYBER SECURITY THREATS FOR 2012 11 August 2012 ABSTRACT The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising importance of cyber security at the work place. These security threats are becoming more common every day. Workplaces and personal lives are being attacked by using smaller more mobile devices. Therefore these cyber threats will be talked about in Therefore, these cyber threats will be assessed, to give you an idea of what they can do to your company or life, and the proper response on how to mitigate them.   TOP FIVE CYBER SECURITY THREATS FOR 2012 With cyber security becoming an issue in todays corporate society the corporate world is looking into all of the threats to mitigate the leaking of sensitive information to the public. This has come to light with hactivists conducting large-scale exploits to infiltrate law enforcement agencies and major companies and steal sensitive data that could embarrass or damage certain organizations (Wansley, 2012). In this paper the top five cyber security threats for 2012 will be assessed and talked about to help control, mitigate,...

Words: 931 - Pages: 4

Free Essay

Is Cyber Crime a Serious and Growing Threat?

...Is Cyber crime a serious and growing threat? 1. INTRODUCTION Cyber crime cannot be clearly defined but all the definitions that are attributed to it basically boil down to the following: “an unlawful act wherein the computer is either a tool or a target or both" (Dubey 2004). On the other hand, ‘threat’, in this context, can be construed as “something likely to cause damage or danger” (Online dictionary 2014). Generally speaking, any unlawful act is expected to cause harm and cyber crime is no exception to this general rule. It has been noted that since the public release of the World Wide Web in 1991, the Internet has known an explosive expansion and continuous upgrading. Unfortunately, cyber crime has also gained in preponderance and sophistication in direct correlation with this Internet revolution. Given its stealth characteristics coupled with its alleged multifaceted implications in terms of both financial loss and security issues, cyber crime has already got the legitimate recognition of a growing and serious threat by the various stakeholders concerned. The only contentious issue is perhaps the monetary quantification ascribed to the resulting damages which is often greeted with much skepticism. 2. CATEGORIES OF CYBER CRIME Indeed, cyber crime does not lend itself to a narrow definition and is generally classified into four categories; that is, crimes committed against the individual, property, organisation and society (Mali 2009). This classification also......

Words: 2796 - Pages: 12

Free Essay

How Should Singapore and Other Smart Cities Deal with the Increasing Risk of Cyber Threats?

...How should Singapore and other smart cities deal with the increasing risk of cyber threats? Fifty years after its establishment, Singapore is a smart city-state success story at the forefront of a third industrial revolution. Today, the Internet of Things (IoT) increasingly interconnects Singapore’s cyber and physical systems, sensors and smart technology into the digital fabric that links society and critical infrastructures such as transportation, health, finance and defense. Infrastructure investment is expected to grow by 50% to about $30 billion by the end of the decade. But as Singapore and other smart cities become increasingly connected to cyberspace, so too does their risk of cyber threats. For the next 50 years to be as prosperous as the last, Singapore and other smart cities and nations need to develop a cyber-smart workforce, technology, policies and new risk management solutions. Cyber Smart City: Opportunity and Challenge The Cyber Smart City Opportunity of new IoT-inspired products, services and markets could boost the gross domestic product (GDP) of the world’s 20 largest economies by $14.2 trillion in 2030, according to a recent study by Accenture. This trend can be seen in Singapore’s smart buildings, where converged information and operational technologies infrastructures, control systems and sensors integrate multiple electronic systems to support building management and business functions. Smart building technology is increasing energy......

Words: 417 - Pages: 2

Premium Essay

Brief for the New Cso, Which Will Provide Her with the Basics of Cyber Security, Acquaints Her with the Current Threats Facing Your Organization's Data Infrastructure, and the Legal Issues Related to Protecting the Enterprise.

...The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Paul K. Kerr Analyst in Nonproliferation John Rollins Specialist in Terrorism and National Security Catherine A. Theohary Analyst in National Security Policy and Information Operations December 9, 2010 Congressional Research Service 7-5700 R41524 CRS Report for Congress Prepared for Members and Committees of Congress The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability Summary In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. Although early reports focused on the impact on facilities in Iran, researchers discovered that the program had spread throughout multiple countries worldwide. From the perspective of many national security and technology observers, the emergence of the Stuxnet worm is the type of risk that threatens to cause harm to many activities deemed critical to the basic functioning of modern society. The Stuxnet worm covertly attempts to identify and exploit equipment that controls a nation’s critical infrastructure. A......

Words: 5499 - Pages: 22

Premium Essay

China Saper Threat

...Weak USA Cyber Policy vs China’s Security Threat to the USA? Abstract A cyber spy network based mainly in China hacked into classified documents from government and private organizations. One of the biggest questions still remains unanswered. Should the U.S. Congress conduct an in depth assessment of Chinese cyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage. In this paper I will review china’s cyber threat and possible USA solutions to protect against the threat. Could Weak USA Cyber Policy be the cause of China’s Security Threat? U.S. corporations and cyber security specialists have reported an daily attack of computer network intrusions originating from China. Of the seven cases that were adjudicated under the Economic Espionage Act in 2010, six involved a link to China. U.S. corporations and cyber security specialists have reported a huge increase of computer network intrusions originating from China. Some of these reports have alleged a Chinese corporate or government sponsor of the activity, but the U.S. intelligence community has not been able to confirm these reports. In a study released in February, McAfee attributed an intrusion attempt they labeled Night Dragon to a Chinese Internet Protocol (IP) address and indicated the intruders stole data from the computer systems of petrochemical companies (Minnick, W. 11 Dec, 2011).” So could the problem be U.S. Cyber policy? I believe congressional......

Words: 793 - Pages: 4

Free Essay

Cyber Terrorism: the American Response

...Cyber Terrorism: The American Response Mutale Chisanga School of Computer Science 03-60-305 Professor Kristina Verner March 6, 2016 Cyber terrorism: The American Response United States (U.S.) critical infrastructure faces a growing cyber terrorism threats due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed prior to adoption. The increasing automation of U.S. critical infrastructures provides more cyber access points for adversaries to exploit. Industrial control systems, which operate the physical processes of the U.S. pipelines, railroads, and other critical infrastructures, are at elevated risk of cyber exploitation. The growth of malicious techniques that could degrade, disrupt, or destroy critical infrastructure is a huge concern for the U.S. government. It is also likely the cyber threats will surpass the terrorism threat to U.S. in the years to come (MLI, 2012). Even though only advanced threat actors are currently capable of employing these high level malicious techniques, these capabilities will eventually be within reach of all threat actors. Discussion The potential economic consequences of cyber terrorism attacks are severe. The severity of cyber terrorism are not felt equally across the board. A small company may not be able to survive even one significant cyber-attack. On the other hand, large companies may take a long time...

Words: 1741 - Pages: 7

Premium Essay


...Cyber Security Student: Maurice Jones Class ISSC461: IT Security: Countermeasures Instructor: Professor Christopher Weppler Date: 2 August 2013 Introduction “In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home (President Barack Obama, 2012).” Technology has changed the total lifestyle of people around the world. Here in the United Stated, society’s daily lives revolve around social interaction, economic stability, job security and information dominance. Information Dominance is “the degree of information superiority that allows the possessor to use information systems and capabilities to achieve an operational advantage in a conflict or to control the situation in operations other than war while denying those capabilities to the adversary (US Cyber Command, 2012).” Corporations as well as many of the world’s governments have risen and fallen due to their degree of Information Dominance and Information Security. Cyber-attacks have increased exponentially within the last 10 years. Battlefield lines that were once drawn in the sand no longer exist. Cyber-attacks can occur from any location in the world and at any time. A Cyber-terrorist has the ability to use current communication infrastructure to launch an attack that could cripple a nation. In 2012, Defense Secretary, Leon Panetta spoke at the Business Executives for National Security (BENS) summit....

Words: 3217 - Pages: 13

Premium Essay

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat”......

Words: 2041 - Pages: 9

Premium Essay


...Cyber threats Randi Titzer BCC/403 April 10, 2016 Bobby “Robin” Kemp Cyber Threats A cyber threat is a possibility that a malicious attempt has been made to damage or disrupt a computer network or system. Cyber threats happen all over the world to all people. It doesn’t matter your race, religion, national origin, ethnicity, gender or sexual orientation. Cyber threats can be in various forms, such as what we will be discussing later on in the readings. We will discuss hacking of financial institutions, security issues, downloads/applications, etc. Each of these have serious consequences and can cause harm to the businesses and members of these businesses and/or owners of these accounts. Identify cyber-related threats that emerged from existing global technology There are several types of cyber threats that have emerged from existing global technology. Some of these threats that I will discuss have not only had past effects on society as a whole, but they will also have some severe future effects on society too. The first threat that we are going to discuss is the security issues occurring with mobile devices, computers, etc. One example of this is the issue with the FBI and Apple. The FBI couldn’t get into an Apple iPhone of a supposed terrorist because the phone was encrypted. Apple would not help the FBI gain access to the iPhone and this......

Words: 729 - Pages: 3

Premium Essay

It Security

...causing no one to get on or shuts them down. Then there are SQL injection attacks which are used in security vulnerable web apps, it’s a code that pulls information from the database and sends it back to the hacker, these are just a few of the many threats posed today by hackers ("Top Cyber Security Risks- Origin and Destination", 2009). Cyber security threats are on the climb as cyber criminals persist to increase innovative ways to use breached computers for their own personal agenda. Establishments all have different types of information they need to protect, the government has information that might jeopardize national security whereas a bank has personal information pertaining to its customers. All parties should understand the likely growth of the threat environment and develop an appropriate security strategies and procedures to address these evolving threats. All networks and organizations have weaknesses in there infrastructure, whether it is internal or external all risks cannot be mitigated. Studies show security of information and data has always been important, today it is cyber security and by understanding what we are securing against , we can strategize and prepare for the threats of cyber terrorism, cyber crime and cyber warfare. The birth of the internet, came from a project from the Defense Advancement Research Projects Agency Network, it was known as the ARPANET. Established in 1969 ARPANET served as a test-bed for new networking technologies,......

Words: 1949 - Pages: 8

Premium Essay

Cyber Security Act

...Government of India Electronics Niketan, Lodhi Road New Delhi – 110003 Discussion draft on National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Your comments/feedback on this document are most welcome. Please send your valuable comments/feedback by 15 May 2011 to Dr Gulshan Rai, Director General, CERT-In, at the at the above address or on email id ‘’ Discussion draft Department Of Information Technology National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Contents 1.0 Security of Cyber Space – Strategic perspective 1.1 IT as an engine for economic growth and prosperity 1.2 Security of cyber space - Need for action 1.3 Target audience 1.4 Securing cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law enforcement 3.6 Security information sharing and......

Words: 7888 - Pages: 32

Free Essay

The Uk Cyber Security Strategy - Written Ministerial Statement

...WRITTEN MINISTERIAL STATEMENT CABINET OFFICE 25 November 2011 Minister for the Cabinet Office and Paymaster General: The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World ______________________________________________________________________ Francis Maude I have today published the new Cyber Security Strategy for the United Kingdom. I have placed a copy in the Library. The growth of the internet has transformed our everyday lives. But with greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends. This Government has moved swiftly to tackle the growing danger posed by cyber attacks. Our National Security Strategy published last year classed cyber security as one of our top priorities alongside international terrorism, international military crises and natural disasters. To support the implementation of our objectives we have committed new funding of £650m over four years for a transformative National Cyber Security Programme (NCSP) to strengthen the UK’s cyber capabilities. The new Cyber Security Strategy we have published today sets out how the UK will tackle cyber threats to promote economic growth and to protect our nation’s security and our way of life. One of our key aims is to make the UK one of the most secure places in......

Words: 930 - Pages: 4

Premium Essay

Compare and Contrast

...University of Maryland University College CSIA 360 Introduction Why is it important that every nation has a cyber security strategies? The past decade multiple company national or international have faced cyber security threats. Either sensitive government information or individual’s information has been compromised. Cyber security issues have developed into a significant national level where now it requires government consideration. In this analysis we will compare Europe and the Commonwealth on how they approach the national and international cyber security strategies. Overview of national cyber security What is national cybersecurity? Well first cyber security is a body technologies, processes and practices designed to protect networks, computers, programs and data from being attacked, damaged and or unauthorized access (target, n.d.). Now in the bigger end nations are now in the need for cyber security. National cyber security is to protect publicly held information that can be personal or private, national security and more. There has been several attacks on public services that have compromised personal or private information. As technology rapidly changes, new vulnerabilities are being created. National cyber security also outlines visions and articulates priorities, principles and approaches to understanding and managing risks at the national level. Some cyber security strategies by country may focus more on protecting critical infrastructure risks, while......

Words: 2800 - Pages: 12

Premium Essay

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. ......

Words: 3494 - Pages: 14

Premium Essay


...importance of cyber security in the face of evolving cyber threats and the ever-increasing attacks on government and businesses alike. We live in a globally connected world and globally distributed cyber threats. Not restricted by geographical boundaries these threats target all technologies, service providers, and consumers. The threats are at an all-time high, in terms of sophistication and volume, and continue to trend upwards. WHAT IS CYBERSECURITY? Twenty years ago businesses did not think twice about cyber security. In a world of mainframes and dumb terminals with no connectivity to anything outside, viruses, malware, and hacking was unheard of, however, with the introduction of the Internet things have now changed. The term cyber security is getting more and more mixed usage lately, so much so that it is almost as ambiguous as the term "cloud". Cyber security, referred to as information technology security, is the focus on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Cyber security also encompasses ten different security domains. The following domains provide a foundation for security practices and principles: • Access Control - to maintain information confidentiality, integrity, and availability, it is important to control access to information. Access controls prevent unauthorized users from retrieving, using, or altering information. They are determined by an organization's risks,......

Words: 1611 - Pages: 7