Chat with us, powered by LiveChat Cyber Terrorism Case Study | Wridemy

Cyber Terrorism Case Study

6396The ease of access to the Internet has significantly increased incidents of various types of cyber attacks. Read the case study at the end and answer the following question:

Discuss the main characteristics of Stuxnet and how it can spread.
How was Stuxnet utilized as a cyber warfare weapon?
How can cyber terrorism as represented by Stuxnet, be successfully prevented?
Your report should follow APA style.

Case Study:
When hackers claiming to support the Syrian regime of Bashar Al-Assad attacked and disabled6 the website of Al Jazeera, the Qatar-based satellite news channel, in September 2012, the act was seen as another act of hacktivism,7 purporting to promote a specific political agenda over another. Hacktivism has become a very visible form of expressing dissent. Even though there have been numerous incidents reported by the media, the first case of hacktivism8 was documented in 1989 when a member of the Cult of the Dead Cow9 hacker collective named Omega coined the term in 1996. However, hacktivism is not the only form of cyberprotest and conflict that has everyone from ICT professionals to governments scrambling for solutions. Individuals, enterprises, and governments alike rely in many instances almost completely on network computing technologies, including cloud computing. The international and ever-evolving nature of the Internet along with inadequate law enforcement and the anonymity the global architecture offers creates opportunities for hackers to attack vulnerable nodes for personal, financial, or political gain.
The Internet is also rapidly becoming the political and advocacy platform of choice, bringing with it both positive and negative consequences. Increasingly sophisticated off-the-shelf technologies and easy access to the Internet are significantly increasing incidents of cyberterrorism, netwars,10 and cyberwarfare. The following are a few examples.
According to The Israel Electric Company, Israel is attacked 1,000 times a minute by cyberterrorists targeting the country’s infrastructure—water, electricity, communications, and other services.11
The New York Times, quoting military officials, said there was a seventeenfold increase in cyberattacks targeting the US critical infrastructure between 2009 and 2011.12
The 2010 Data Breach Investigations Report has data recording more than 900 instances of computer hacking and other data breaches in the past seven years, resulting in some 900 million compromised records. In 2012, the same study listed 855 breaches, resulting in 174 million compromised records in 2011 alone, up from 4 million in 2010.13
Another study of 49 breaches in 2011 reported that the average organizational cost of a data breach (including detection, internal response, notification, postnotification cost) was $5.5 million. This number was down from $7.2 million in 2010.14
The Telegraph (London) reported that “India blamed a new ‘cyber-jihad’ by Pakistani militant groups for the exodus of thousands of people from India’s north-eastern minorities from its main southern cities in August after text messages warning them to flee went viral.”15
There have been recorded instances of nations allegedly engaging in cyberwarfare.16 The Center for the Study of Technology and Society has identified five methods by which cyberwarfare can be used as a means of military action. These include defacing or disrupting websites to spread propaganda, to conduct espionage and gain access to critical information, to disrupt enemy military operations, and to attack critical infrastructure.17 In 1999, pro-Serbian hacker groups, including the Black Hand,18 broke into NATO, US, and UK computers during the Kosovo conflict. In 2000, both pro-Israeli and pro-Palestinian groups created panic19 for government and financial networks, and in 2001, the world saw hacking with a patriotic flavor when Chinese and US hackers traded attacks on computers in both countries.
One of the first widely documented cases was the cyberattack on the Republic of Georgia in 2007. On April 26, a series of distributed denial of service (DDoS) attacks targeted government, media, and financial networks and Internet infrastructure. Many other servers were hacked and websites changed to display pro-Russian messages. Many of the initial attacks were said to have originated from Russia and, in some cases, allegedly from Russian government computers. The first wave of attacks against Estonian websites fizzled out after the Estonian foreign minister publicly declared that many of the attacks had originated from Russian government computers.20
The Estonian Internet infrastructure was subjected to more attacks. On April 30, 2007, attackers utilized so-called robot networks (botnets) from numerous sources around the world. About a week later, there were more DDoS attacks, including one on Estonia’s Hansabank, which reported a loss of about $1 million because of the attacks. The attacks continued intermittently for a few weeks before finally dying off in the summer of 2007.
Another incident was the South Ossetia conflict between Russia and Georgia in 2008. This Russian-Georgian conflict is classified as the first cyberspace conflict that was synchronized with traditional combat actions.21 Just as Russian troops were crossing the border, websites for communications, finance, government, and many international organizations in Georgia became inaccessible.22 These actions included various DDoS attacks that disrupted communications and information networks in Georgia. The attackers also defaced Georgian websites, adding pro-Russian images, supposedly for propaganda purposes.23 One of the first networks attacked was a popular hacker forum in Georgia. Consequently, pro-Georgian hackers made successful attacks against Russian networks as well.24
Although both the Estonian and Georgian attacks were widely believed to be the work of state-sponsored Russian hackers, no proof has ever been found conclusively linking Russian authorities to the incidents.25 (Dhillon, 2017-11-17, pp. 240-242)

Dhillon, G. (2017-11-17). Information Security: Text and Cases, 2nd Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781943153244

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA