¶ … Cyberattacks to Achieve International Threats
Cyberattacks have become a global phenomenon leading to international conflicts among individuals, organizations and in conjunction to military operations. Target of cyberattacks include banking services, critical organizational infrastructures, government networks, and media outlets. Implication of such attacks may be an attempt to achieve both financial and political objectives. Typically, some attackers have defaced websites of different organizations, damage corporate infrastructures, and shut down network systems. Many cyberattacks are political motivated, and sources of these attacks are difficult to trace because most of the attacks are often state sponsored. Cyberspace attackers employ different tactics to achieve their objectives, which include both financial and military gains.
Objective of this paper is to explore the cyber operations and some of the tools that cyber attackers use to achieve their operations.
Objectives of Cyberattacks and Tools used to achieve the Objectives
Cyberattacks are broadly described as the type of criminal activities where computer systems and computer networks are the targets of criminal activities. The U.S. Department of Justice defines the cyberattacks as the type of crime target at computer systems without the authorization in order to carry a theft and attack the system integrity, data integrity, availability and data confidentiality. (Stallings, 2011). Major objectives of carrying out the cyberattacks are to achieve both financial and strategic gains.
Different tools are used for cyberattacks. Malware or malicious software is one of the tools that cyber criminals use to perpetuate their attacks. Malware is a program that attackers use to exploit the vulnerabilities of the computer systems....
"Nearly two-thirds of critical infrastructure companies report regularly finding malware designed to sabotage their systems." (Maude, 2011 p 17). Examples of non-independent malware include logic bombs, Viruses, and backdoors. However, independent malware includes Bot programs and Worms. A logic bomb is one of the predatory viruses, program threat, and worms. The logic bomb refers as the code embedded in a legitimate program, which explodes when certain condition is met. When a user downloads the application embedded with the logic bomb, it will trigger the logic bomb, which in turn may delete or alter the entire file. For example, Tim Lloyd, an employee of Omega Engineering used the logic bomb on his company's infrastructure that cost the company over $10 million, derailed the corporate strategic growth and consequently led to a layoff of 80 workers. "Ultimately, Lloyd was sentenced to 41 months in prison and ordered to pay $2 million in restitution." (Stallings, 2011, p 787-788).
Cyber criminals also use the backdoor to enter a legitimate website to commit fraud. A backdoor is a program that creates as secret entry point to gain access into the organizational infrastructures. Typically, the backdoor has become a threat using an unscrupulous program to gain access to network infrastructure to carry out unauthorized or illegal activities.
DoS (Denial of Service) is another tool of cyber attackers where attackers flood the networks, and servers with flood of traffic thereby make an organizational computer system inaccessible. The goal of DoS is to debar legitimate users from gaining access to the information resources.
Botnets is a type of computer referred as zombie army where the computer has been programed to forward transmission that contains viruses or spam. Using this tactics, cyber attackers can install Trojan horse, virus or worm into organizational network systems thereby steal sensitive information. An attacker can use Botnets to forward an attachment that contains a Trojan horse to gain access to organizational sensitive information.
Reply to Thread is one the tools that cyber attackers use to gain access to…
Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance
Technology and Law Enforcement The field of law enforcement has been one of the most challenging fields from the historical time yet it is a department that cannot be wished away as long as the society has to remain sane and civilised. The only option is to persistently and consistently update law enforcement and equip it in order to cary out the respective duties and responsibilities that it should in order
Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields
This essay reviews the relevant literature to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National Security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights