Tuesday, 20 November 2012

Cyberterrorism & HACKING

Cyberterrorism

What is cyberterrorism?Terrorism that involves computers, networks, and the information they contain. Computer networks have been attacked during recent conflicts in Kosovo, Kashmir, and the Middle East, but the damage has mostly been limited to defaced Web sites or blocked Internet servers. However, with American society increasingly interconnected and ever more dependent on information technology, terrorism experts worry that cyberterrorist attacks could cause as much devastation as more familiar forms of terrorism. Is the United States vulnerable to cyberterrorism?Experts disagree about how large and immediate a threat cyberterrorism poses. In 1997, the Pentagon simulated a cyberattack and found that attackers using ordinary computers and widely available software could disrupt military communications, electrical power, and 911 networks in several American cities. Hacking tools and expertise have become only more widespread since then. Is cyberterrorism the same as hacking?While some people use the term "cyberterrorism" (which was coined in the 1980s) to refer to any major computer-based attack on the U.S. government or economy, many terrorism experts would not consider cyberattacks by glory-seeking individuals, organizations with criminal motives, or hostile governments engaging in information warfare to be cyberterrorism. Like other terrorist acts, cyberterror attacks are typically premeditated, politically motivated, perpetrated by small groups rather than governments, and designed to call attention to a cause, spread fear, or otherwise influence the public and decision-makers.Hackers break in to computer systems for many reasons, often to display their own technical prowers or demonstrate the fallibility of computer security. Some on-line activists say that activities such as defacing Web sites are disruptive but essentially nonviolent, much like civil disobedience.Terrorists try to leverage limited resources to instill fear and shape public opinion, and dramatic attacks on computer networks could provide a means to do this with only small teams and minimal funds. Moreover, "virtual" attacks over the Internet or other networks allow attackers to be far away, making borders, X-ray machines, and other physical barriers irrelevant. Cyberterrorists would not need a complicit or weak government (as al-Qaeda had in Afghanistan) to host them as they train and plot. On-line attackers can also cloak their true identities and locations, choosing to remain anonymous or pretending to be someone else.Terrorists might also try to use cyberattacks to amplify the effect of other attacks. For example, they might try to block emergency communications or cut off electricity or water in the wake of a conventional bombing or a biological, chemical, or radiation attack. Many experts say that this kind of coordinated attack might be the most effective use of cyberterrorism. What kinds of attacks are considered cyberterrorism?Cyberterrorism could involve destroying the actual machinery of the information infrastructure; remotely disrupting the information technology underlying the Internet, government computer networks, or critical civilian systems such as financial networks or mass media; or using computer networks to take over machines that control traffic lights, power plants, or dams in order to wreak havoc. How do cyberattacks work?Attacks on the physical components of the information infrastructure would resemble other conventional attacks: for example, a bomb could be used to destroy a government computer bank, key components of the Internet infrastructure, or telephone switching equipment. Another option would be an electromagnetic weapon emitting a pulse that could destroy or interrupt electronic equipment.Attacks launched in cyberspace could involve diverse methods of exploiting vulnerabilities in computer security: computer viruses, stolen passwords, insider collusion, software with secret "back doors" that intruders can penetrate undetected, and orchestrated torrents of electronic traffic that overwhelm computers - which are known as "denial of service" attacks. Attacks could also involve stealing classified files, altering the content of Web pages, disseminating false information, sabotaging operations, erasing data, or threatening to divulge confidential information or system weaknesses unless a payment or political concession is made. If terrorists managed to disrupt financial markets or media broadcasts, an attack could undermine confidence or sow panic.Attacks could also involve remotely hijacking control systems, with potentially dire consequences: breaching dams, colliding airplanes, shutting down the power grid, and so on.

Hacking

  • The Love Bug virus caused damage, expected to run into billions of dollars, by invading business computers. Can you afford the loss of business, staff time, or the repair costs that such an attack could bring?
  • Hackers scan thousands of computers looking for identities to steal and vulnerable systems to attack. They could break into your Website and deface it and even reroute your customers.
  • As many as 90 percent of all information security breaches originate from inside the company in which they occur. Do you have a dissatisfied employee who could corrupt your customer information or disrupt your billing?

Is your information protected against...
  • Computer viruses?
  • Hackers?
  • Software bugs?
  • Technical failure?
  • Disgruntled employees?
  • Cyber criminals?
  • Human error?

Why is information security good business?Today's customers are becoming very security conscious. In our electronic age, information is the foundation for success. Whether you're a wholesaler, manufacturer, doctor, realtor, or philanthropist You could suffer major losses in profits or credibility if your:
  • financial records were lost.
  • customer records were stolen.
  • business strategies fell into the hands of your competitor.

What can you do?
  • Install and maintain a computer anti-virus program or, if applicable, consult with your information technology supplier to find out the best method for you.
  • Be prepared to do without services you normally depend on that could be disrupted - electricity, telephone, natural gas, gasoline pumps, cash registers, ATM machines, and internet transactions.
  • Be prepared to respond to official instructions if a cyber attack triggers other hazards, for example, general evacuation, evacuation to shelter, or shelter-in-place, because of hazardous materials releases, nuclear power plant incident, dam or flood control system failures.

No comments:

Post a Comment