Tuesday, 12 July 2016

Cyber terrorism in united states, how to mitigate cyber terrorism



UNITED STATES CYBER TERRORISM

According to the U.S. Federal Bureau of Investigation, cyber terrorism is any ‘predetermined, politically motivated attack against information, computer systems, computer programs and data which results in violence against non-combat targets by sub-national groups or clandestine agents (Janczewski & Colarik, 2008)
. Cyber terrorism attack would lead to physical violence or extreme financial attacks. According to the U.S Commission of critical Infrastructure Protection. America’s critical infrastructure vulnerable to cyber terrorism targets include the Banking industry, Military defence systems, Power plants, Air traffic controls centres, and water systems on which we depend every day ’’.As if the cyber terrorism threat is not enough, there is related threats of organised cybercrime, which has seen blame in recent cases of e-commerce extortion and online fraud (Technology, 2012).
Organised crime groups typically have a home base in week states that provides safe heavens from which they conduct their transitional operations. In effect, this provides an added degree of protection against law enforcement and allows them to operate in minimal risks (Czosseck & Geers, 2009). The inherently transitional nature of the internet fits perfectly into this model of activity and the effort to maximize profits within an acceptable degree of risk. In the virtual world, there are no borders, a characteristic that makes it very attractive for criminal activity. When authorities attempt to police this virtual world, however, borders and national jurisdiction loom large- making extensive investigation slow and tedious, at best and impossible, at worst (Janczewski & Colarik, 2008) (Intelligence-Threats, 2005).
Analogue controls in this attacked critical infrastructure have been replaced with digital systems. Digital controls provide facility operators and managers with remote visibility and control over every aspect of their operations, including the flows and pressure in refineries, the generation and transmission of power in electrical grid and temperatures in nuclear cooling towers. Same connectivity the managers use to control and collect data devices allows cyber attackers to get into control system networks to steal sensitive information, disrupt processes and damage to equipment (Technology, 2012).
Cyber-attacks on U.S banks continued recently from suspected hackers believed to be supported by Iranian government, according to U.S officials. U.S and banking officials described them as denial of service strike preventing customers from accessing their information from banking websites. There was a little damage and no accounts were compromised. The banks were still not able to fully stop the attacks even though they were pre-announced by at least one group (Janczewski & Colarik, 2008). American officials said earlier this week that attacks on U.S banks and oil companies in Saudi Arabia and Qatar over past months were believed to be carried out by surrogates supported by the Iranian government. A group called Qassam cyber Fighters claimed responsibility for the recent attacks with announcement online. The group had said that the attacks are in relation for the same anti-Muslim film made in the United States that caused rioting and protests in several Muslim countries (Technology, 2012).


RECCOMENDATION TO MITIGATE CYBER ATTACKS ON USA INFRASTRUCTURE
The United States of America should come up with a congress of security professionals who understand both digital security and control systems technology that would increase the sharing of information related to control system breaches to better arm security to prevent future breaches.
Reduction of the system’s vulnerability in an attack situation that is reducing the number of users, run less software and limit communication between systems. This will close off possible places where the systems can be breached.
By authenticating network users that is like changing passwords. It is recommendable to combine passwords with physical hardware and well implemented biometric systems to ensure computers are accessible only to authorised users.

References

Czosseck, C., & Geers, K. (2009). The virtual battlefield : perspectives on cyber... by Christian Czosseck . Amsterdam: Washington, DC : Ios Press.
Intelligence-Threats, U. S. (2005). Cyber operations and cyber terrorism. Fort Leavenworth, Kansas: US Army Training and Doctrine Command,.
Janczewski, L., & Colarik, A. M. (2008). Cyber warfare and cyber terrorism by Lech Janczewski . Hershey: Hershey : Information Science Reference.
Technology, U. S. (2012). Cyber security : protecting your small business : hearing before the Subcommittee on Healthcare and Technology of the Committee on Small Business, United States House of Representatives, One Hundred Twelfth Congress, first session, hearing held December 1. Washington : U.S: U.S. G.P.O.






No comments:

Post a Comment

Leadership Trends in Common Wealth Bank

Overview of Common Wealth Bank of Australia Commonwealth bank of Australia is one out of four largest integrated financial institutions. T...