Effects Of Cyberattacks On International Peace Research Paper

Length: 4 pages Sources: 2 Subject: Sports - Drugs Type: Research Paper Paper: #74667853 Related Topics: Espionage, Cyber Security, Cybersecurity, Propaganda
Excerpt from Research Paper :

¶ … Cyberattacks to Achieve International Threats

Cyberattacks have become a global phenomenon leading to international conflicts among individuals, organizations and in conjunction to military operations. Target of cyberattacks include banking services, critical organizational infrastructures, government networks, and media outlets. Implication of such attacks may be an attempt to achieve both financial and political objectives. Typically, some attackers have defaced websites of different organizations, damage corporate infrastructures, and shut down network systems. Many cyberattacks are political motivated, and sources of these attacks are difficult to trace because most of the attacks are often state sponsored. Cyberspace attackers employ different tactics to achieve their objectives, which include both financial and military gains.

Objective of this paper is to explore the cyber operations and some of the tools that cyber attackers use to achieve their operations.

Objectives of Cyberattacks and Tools used to achieve the Objectives

Cyberattacks are broadly described as the type of criminal activities where computer systems and computer networks are the targets of criminal activities. The U.S. Department of Justice defines the cyberattacks as the type of crime target at computer systems without the authorization in order to carry a theft and attack the system integrity, data integrity, availability and data confidentiality. (Stallings, 2011). Major objectives of carrying out the cyberattacks are to achieve both financial and strategic gains.

Different tools are used for cyberattacks. Malware or malicious software is one of the tools that cyber criminals use to perpetuate their attacks. Malware is a program that attackers use to exploit the vulnerabilities of the computer systems....


"Nearly two-thirds of critical infrastructure companies report regularly finding malware designed to sabotage their systems." (Maude, 2011 p 17). Examples of non-independent malware include logic bombs, Viruses, and backdoors. However, independent malware includes Bot programs and Worms. A logic bomb is one of the predatory viruses, program threat, and worms. The logic bomb refers as the code embedded in a legitimate program, which explodes when certain condition is met. When a user downloads the application embedded with the logic bomb, it will trigger the logic bomb, which in turn may delete or alter the entire file. For example, Tim Lloyd, an employee of Omega Engineering used the logic bomb on his company's infrastructure that cost the company over $10 million, derailed the corporate strategic growth and consequently led to a layoff of 80 workers. "Ultimately, Lloyd was sentenced to 41 months in prison and ordered to pay $2 million in restitution." (Stallings, 2011, p 787-788).

Cyber criminals also use the backdoor to enter a legitimate website to commit fraud. A backdoor is a program that creates as secret entry point to gain access into the organizational infrastructures. Typically, the backdoor has become a threat using an unscrupulous program to gain access to network infrastructure to carry out unauthorized or illegal activities.

DoS (Denial of Service) is another tool of cyber attackers where attackers flood the networks, and servers with flood of traffic thereby make an organizational computer system inaccessible. The goal of DoS is to debar legitimate users from gaining access to the information resources.

Botnets is a type of computer referred as zombie army where the computer has been programed to forward transmission that contains viruses or spam. Using this tactics, cyber attackers can install Trojan horse, virus or worm into organizational network systems thereby steal sensitive information. An attacker can use Botnets to forward an attachment that contains a Trojan horse to gain access to organizational sensitive information.

Reply to Thread is one the tools that cyber attackers use to gain access to…

Sources Used in Documents:


Stallings, W. (2011). Cryptography and Network Security: Principles and Practice (5th Edition). Pearson Education, Inc.

Maude, F. (2011). The UK Cyber Security Strategy Protecting and promoting the UK in a digital world.UK.

UNODC (2012). The use of the Internet for Terrorist Purposes. United Nations Office on Drugs and Crime.

Cite this Document:

"Effects Of Cyberattacks On International Peace" (2015, November 11) Retrieved January 16, 2022, from

"Effects Of Cyberattacks On International Peace" 11 November 2015. Web.16 January. 2022. <

"Effects Of Cyberattacks On International Peace", 11 November 2015, Accessed.16 January. 2022,

Related Documents
Hacker Mitigation and Culture in the International Systems
Words: 2409 Length: 7 Pages Topic: Sports - Drugs Paper #: 87369052

Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance

Technology and Law Enforcement the Field of
Words: 2051 Length: 7 Pages Topic: Criminal Justice Paper #: 15021086

Technology and Law Enforcement The field of law enforcement has been one of the most challenging fields from the historical time yet it is a department that cannot be wished away as long as the society has to remain sane and civilised. The only option is to persistently and consistently update law enforcement and equip it in order to cary out the respective duties and responsibilities that it should in order

Cyber Terrorism
Words: 4455 Length: 13 Pages Topic: Terrorism Paper #: 88428814

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Pages Topic: Military Paper #: 21422307

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Pages Topic: Education - Computers Paper #: 659336

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Edward Snowden Essay
Words: 2741 Length: Pages Topic: Paper #: 16401841

This essay reviews the relevant literature to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National Security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights