Hacking Iranian And Israeli Infrastructure Essay

PAGES
1
WORDS
370
Cite
Related Topics:

Hacktavist Attacks

Hacktivist Attacks Show Ease of Hacking Industrial Control Systems

https://www.securityweek.com/hacktivist-attacks-show-ease-hacking-industrial-control-systems

An ongoing problem since 2016 and reported especially 2020 and September 2022, pro-Palestine hacktivist group named GhostSec and a group named Gonjeshke Darande along with others hacked state infrastructure with moderate cyber sophistication, focusing on unprotected ICS or IoT devices that are exposed to the internet. They typically rely on open ports, publicly available tools, and they typically operate for short periods of time to achieve a specific goal. They have attacked infrastructure in Israel and Iran and elsewhere in order to protest against state aggression committed by Israel, Iran or other state targets. This is important because they cause mainly localized disruption and other effects that can also lead to major consequences jeopardizing public safety. One possible solution is for states to perform cyber assessments: these attacks can be easily mitigated by securing internet access, hardening authentication mechanisms, performing basic ICS security monitoring by a chosen MSSP, and enforcing basic cyber security hygiene.

Legend: Who, What, When, Where, Why, How, So What?!, possible Solution

Who: pro-Palestine hacktivist group named GhostSec; a group named Gonjeshke Darande and others; in short, hacktavists all over

What: hacked state infrastructure: 55 Berghof programmable logic controllers (PLCs)located in Israel; causing disruptions in Iran, includingforcing a steel company to halt productionandparalyzed gas stationsacross the country

When: ongoing, reports noted in2016, 2020-2022

Where: state infrastructure in Israel and Iran, etc.

Why: response to state aggression by pro-Palestine and pro-Israel hactavists

How: moderate cyber sophistication, focusing on unprotected ICS or IoT devices that are exposed to the internet. They typically rely on open ports, publicly available tools, and they typically operate for short periods of time to achieve a specific goal.

So What?!: they cause mainly localized disruption and other effects, as the current status of ICS cyber security stays relatively bad, exploiting frequent device misconfigurations, non-enforced 3rd party access and other basic security weaknesses by these hackers can also lead to major consequences jeopardizing public safety

Possible Solution(s): perform cyber assessments: These attacks can be easily mitigated by securing internet access, hardening authentication mechanisms, performing basic ICS security monitoring by a chosen MSSP, enforcing basic cyber security hygiene

Cite this Document:

"Hacking Iranian And Israeli Infrastructure" (2022, October 05) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/hacking-iranian-israeli-infrastructure-essay-2177802

"Hacking Iranian And Israeli Infrastructure" 05 October 2022. Web.26 April. 2024. <
https://www.paperdue.com/essay/hacking-iranian-israeli-infrastructure-essay-2177802>

"Hacking Iranian And Israeli Infrastructure", 05 October 2022, Accessed.26 April. 2024,
https://www.paperdue.com/essay/hacking-iranian-israeli-infrastructure-essay-2177802

Related Documents

Anonymous is one of the groups that can be seen as participating in this form of hacktivism, as is Wikileaks. Wikileaks is probably the best know hactivist site to the general public because of the sheer volume of political information that it has made public and because of the unapologetic nature of the owner of the site. This is unfortunate in many ways because it has given individuals a false

They would sometimes be using the school curriculum as an excuse to hack pertinent information that are government or privately owned. At some point, these students would be challenging themselves if they will be able to create and send unnecessary information (such as computer viruses) to other computer systems. This will provide extreme joy and satisfaction for these students. However, the issue here lies on how can this be

Hacktivism Securing the Electronic Frontier Consider how cybercrime is defined and how it relates to the issue Internet vulnerabilities. Cybercrime is any illegal or illicit activity which is mediated by internet usage and which is aimed at accessing, stealing or destroying online data. This may include hacking of government websites, phishing scams, disruption of commercial service sites or penetration of privately held databases containing personal information about private citizens. The presentation given by

Such people may not generally take shelter under the canopy of hackers but as a result of the more serious attributes of their motivation. (Hacker Motivation) Most of the people are anxious about the probability of being an objective for exploitation by a hacker. It is quite normal that if a computer has been installed for home use and only connected to the Internet for two hours once a

Hacker Hacking, Web Usage and the Internet Hierarchy Computer hacking is perceived as a crime and is frequently motivated by economic interests such as the stealing of personal and credit information, or by ideological interests such as the disruption of a company's service or the acquisition of classified information from government or corporate sites. However, hacking is also quite frequently used as an instrument for the expression of political, philosophical and practical frustrations.

Hacker Culture and Mitigation in the International Systems The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance