UNITED STATES CYBER
TERRORISM
According
to the U.S. Federal Bureau of Investigation, cyber terrorism is any
‘predetermined, politically motivated attack against information, computer
systems, computer programs and data which results in violence against non-combat
targets by sub-national groups or clandestine agents (Janczewski &
Colarik, 2008)
.
Cyber terrorism attack would lead to physical violence or extreme financial attacks.
According to the U.S Commission of critical Infrastructure Protection.
America’s critical infrastructure vulnerable to cyber terrorism targets include
the Banking industry, Military defence systems, Power plants, Air traffic
controls centres, and water systems on which we depend every day ’’.As if the cyber
terrorism threat is not enough, there is related threats of organised cybercrime,
which has seen blame in recent cases of e-commerce extortion and online fraud
Organised
crime groups typically have a home base in week states that provides safe
heavens from which they conduct their transitional operations. In effect, this
provides an added degree of protection against law enforcement and allows them
to operate in minimal risks (Czosseck & Geers, 2009) . The inherently
transitional nature of the internet fits perfectly into this model of activity
and the effort to maximize profits within an acceptable degree of risk. In the
virtual world, there are no borders, a characteristic that makes it very
attractive for criminal activity. When authorities attempt to police this
virtual world, however, borders and national jurisdiction loom large- making
extensive investigation slow and tedious, at best and impossible, at worst (Janczewski & Colarik, 2008) (Intelligence-Threats,
2005) .
Analogue
controls in this attacked critical infrastructure have been replaced with
digital systems. Digital controls provide facility operators and managers with
remote visibility and control over every aspect of their operations, including
the flows and pressure in refineries, the generation and transmission of power
in electrical grid and temperatures in nuclear cooling towers. Same
connectivity the managers use to control and collect data devices allows cyber
attackers to get into control system networks to steal sensitive information,
disrupt processes and damage to equipment (Technology, 2012) .
Cyber-attacks
on U.S banks continued recently from suspected hackers believed to be supported
by Iranian government, according to U.S officials. U.S and banking officials
described them as denial of service strike preventing customers from accessing
their information from banking websites. There was a little damage and no
accounts were compromised. The banks were still not able to fully stop the
attacks even though they were pre-announced by at least one group (Janczewski & Colarik, 2008) . American officials
said earlier this week that attacks on U.S banks and oil companies in Saudi
Arabia and Qatar over past months were believed to be carried out by surrogates
supported by the Iranian government. A group called Qassam cyber Fighters
claimed responsibility for the recent attacks with announcement online. The
group had said that the attacks are in relation for the same anti-Muslim film
made in the United States that caused rioting and protests in several Muslim
countries (Technology, 2012) .
RECCOMENDATION TO MITIGATE CYBER ATTACKS
ON USA INFRASTRUCTURE
The
United States of America should come up with a congress of security
professionals who understand both digital security and control systems
technology that would increase the sharing of information related to control
system breaches to better arm security to prevent future breaches.
Reduction of the
system’s vulnerability in an attack situation that is reducing the number of users,
run less software and limit communication between systems. This will close off
possible places where the systems can be breached.
By authenticating
network users that is like changing passwords. It is recommendable to combine
passwords with physical hardware and well implemented biometric systems to
ensure computers are accessible only to authorised users.
References
Czosseck, C., & Geers, K.
(2009). The virtual battlefield : perspectives on cyber... by Christian
Czosseck . Amsterdam: Washington, DC : Ios Press.
Intelligence-Threats, U. S. (2005). Cyber
operations and cyber terrorism. Fort Leavenworth, Kansas: US Army
Training and Doctrine Command,.
Janczewski, L., & Colarik, A. M.
(2008). Cyber warfare and cyber terrorism by Lech Janczewski .
Hershey: Hershey : Information Science Reference.
Technology, U. S. (2012). Cyber
security : protecting your small business : hearing before the Subcommittee
on Healthcare and Technology of the Committee on Small Business, United
States House of Representatives, One Hundred Twelfth Congress, first session,
hearing held December 1. Washington : U.S: U.S. G.P.O.
No comments:
Post a Comment