2012-2013
INTRODUCTION
Cyberterrorism isanewterroristtacticthatmakesuseof information
systemsordigitaltechnology,especiallytheInternet,aseitheraninstrumentor
atarget.AstheInternetbecomesmoreawayoflifewithus,itisbecoming
easierforitsuserstobecometargetsofthecyberterrorists.Thenumberofareas
in which cyberterrorists could strike is frightening, to say the least. The
differencebetweentheconventionalapproachesofterrorismandnewmethods
is primarily that it is possible to affect a large multitude of people with
minimumresourcesontheterrorist'sside,withnodangertohimatall.Wealso
glimpseintothereasonsthatcausedterroriststolooktowardstheWeb,and
why the Internet is such an attractive alternative to them. The growth of
InformationTechnologyhasledtothedevelopmentofthisdangerouswebof
terror, for cyberterrorists could wreak maximum havoc within a small time
span.Varioussituationsthatcanbeviewedasactsofcyberterrorismhavealso
beencovered.Banksarethemostlikelyplaces
toreceivethreats,butitcannotbesaidthatanyestablishmentisbeyondattack.
Tipsbywhichwecanprotectourselvesfromcyberterrorismhavealsobeen
Dept. Of Electrical & Electronics Engg.
G.P.T.C, Muttom
CYBERTERRORISM
Andrey, Frederick, and Phillip (the Week Three team) aim to help
promoteawarenessaboutthedangersofCyberTerrorismandCyberWarfare.
Many individuals may not even be aware that Cyber Terrorism and Cyber
Warfareexistandassuchareunawareofthedamageitcancause.TheWeek
ThreeteamspurposeinanalyzingCyberTerrorismandCyberWarfareisto
educatecitizensonhowtheseattacksimpactanation,techniquesusedinthe
perpetrationoftheseattacks,andsecuritymeasuresthatcanbetakentoguard
againsttheseattacks.
Purpose
ToanalyzeCyberTerrorismandCyberWarfareandunderstandhowit
affectsallofusasanationaswellasrecommendbestpracticestohelpprotect
ourselves. Itisourpurposetoraiseawarenessofthisissuethataffectsmany
livestoday.
Scope
OVERVIEW
AstheInternetbecomesmorepervasiveinallareasofhumanendeavor,
individualsorgroupscanusetheanonymityaffordedbycyberspacetothreaten
citizens,specificgroups(i.e.withmembershipbasedonethnicityorbelief),
communitiesandentirecountries,withouttheinherentthreatofcapture,injury,
ordeathtotheattackerthatbeingphysicallypresentwouldbring.
AstheInternetcontinuestoexpand,andcomputersystemscontinuetobe
assigned more responsibility while becoming more and more complex and
interdependent, sabotage or terrorism via cyberspace may become a more
seriousthreat.
BASICDEFINITION
Cyberterrorismistheleveragingofatarget'scomputersandinformation,
particularly via the Internet, to cause physical, realworld harm or severe
disruptionofinfrastructure.CyberterrorismisdefinedasThepremeditateduse
ofdisruptive
activities,orthethreatthereof,againstcomputersand/ornetworks,withthe
intention to cause harm or further social, ideological, religious, political or
similar objectives. Or to intimidate any person in furtherance of such
objectives. This definition was created by Kevin G. Coleman of the
Technolytics Institute ...subsumed over time to encompass such things as
simplydefacingawebsiteorserver,orattackingnoncriticalsystems,resulting
inthetermbecominglessuseful...
Thereare somethat say cyberterrorismdoes notexistandis reallya
matter of hacking or information warfare. They disagree with labeling it
terrorismbecauseoftheunlikelihoodofthecreationoffear,significantphysical
harm, or death in a population using electronic means, considering current
attackandprotectivetechnologies.
Dept. Of Electrical & Electronics Engg.
G.P.T.C, Muttom
BACKGROUNDINFORMATION
2012-2013
WARFARE
CyberTerrorism
ThereexistmultipleexpertdefinitionsofwhatCyberTerrorismis.The
definitionofCyberTerrorismwewillemployreferstotheactofpolitically
motivatedviolenceagainstinformation,computersystems,computerprograms,
anddatawhichmayresultindamage(Pollitt,n.d.).Weliveintheinformation
agewherecomputershavebecomeanintegralaspectofourdailyexistence.We
useitatschool,work,andathometocommunicatewithfriendsandfamilyor
todowork.Asweknow,computerprogramsarealwaysatriskofcompromise
whichresultsincompaniesfranticallyupdatingtheirsystemsinanattemptto
securetheirprograms.AnexampleactofCyberTerrorismwouldbeifagroup
of foreign militants were to attack government networks with the goal of
spreadingpropaganda.ThisservesasanexampleofCyberTerrorismbecauseit
Dept. Of Electrical & Electronics Engg.
G.P.T.C, Muttom
10
11
METHODSANDTECHNIQUES
CyberAttacksIncreasing
Computerattackshavebeenraisingthecyberwarfarebartoanewlevel.
Eachyeartherearemoreandmorecyberattacksrecordedthroughtheworld
(Germain,TheWindsofCyberWar,2008).In2007,theU.S.Departmentof
Homeland Security published statistics showing 37,000 reported attempted
breachesofgovernmentandprivatecomputersystems.Theprioryearsreport
showed24,000attempts;asignificant158%increasein2007(Germain,The
ArtofCyberWarfare,Part1:TheDigitalBattlefield,2008).
12
13
14
2012-2013
InagovernmentpapertitledDefiningandDeterringCyberWar,the
purposeofCyberSecurityisdescribedas[to]increaseastatesresistanceto
attacksandreducetheconsequencesofattacks.(Beidleman,2009)Whilethis
paper was written in regards to governments, the concept holds true for
businessesaswell.CyberSecuritycanbeseenastwoparts:resistanceand
mitigationofdamage.
ResistancetoCyberTerrorismisprimarilyimplementedthroughsecurity
technologies.Themostprevalentsecuritytechnologyforlargeorganizationsis
thefirewall.Thefirewallisliterallythefirstlineofdefensewhenitcomestoa
computernetwork.Thefirewallsitsbetweentheinternalnetworkofacompany
andtheoutsideworld.Itanalyzesallincomingandoutgoingtransmissionsand
provides multiple security services. Incoming packets are all screened for
maliciousdatabeforebeingrebroadcastintothenetwork.Outgoingpacketsare
alsoallscreened.Mostfirewallscomewithfeaturesthatallowforstatistical
analysisofanetworksbaseline.Fluxuationsinthebaselinebeyondacertain
range may indicate an issue and prompt the firewall to notify a systems
administratorforfurtherinvestigation.
Dept. Of Electrical & Electronics Engg.
G.P.T.C, Muttom
15
16
Usebothupperandlowercaseletters.
Placenumbersandpunctuationmarksrandomlyinyourpassword.
Makeyourpasswordlongandcomplex,soitishardtocrack.Between8
to20characterslongisrecommended.
Useoneormoreofthesespecialcharacters:!@#$%*()+=,<>::
17
18
CONCLUSION
AfterathoroughanalysisonwhyCyberTerrorismandCyberWarfare
occur,thedeterminationwasthattheseeventsforthereasonofbringingfearto
thepublic.Eventhoughtheseactscanbepoliticallymotivated,thegoalisstill
thesame.Therearemanydifferentmethodsforsuchattacks,likeusingbotnets
ordenialofservicetobringdownpopulartargets;institutionsandpowergrids.
Evenwiththesemethodsofattack,theuseofnetworksecurityproducts,suchas
firewallsandantivirus,cangreatlyreducetheriskofbeingavictimofcyber
attacks.
19
REFERENCES
Behar, R. (2008, October 10). World Bank Under Cyber Siege in
'Unprecedented Crisis'. Retrieved May 7, 2010, from
http://www.foxnews.com/story/0,2933,435681,00.html
Beidleman, S. (2009). Defining and deterring cyber war. Strategy Research
Project,Retrieved from
http://www.dtic.mil/srch/doc?
collection=t3&id=ADA500795
Carney,J.(2010,January29).BankofAmerica'sWebsiteHasBeenDownAll
Morning. Retrieved May 10, 2010, from
http://www.businessinsider.com/bankofamericaswebsitehasbeen
downallmorning20101
Cyber Attack Techniques. (2009, May 28). Retrieved April 28, 2010, from
http://www.cybersecuritymarket.com/2009/05/28/cyberattack
techniques/
Germain,J.M.(2008,April29).TheArtofCyberWarfare,Part1:TheDigital
Battlefield. Retrieved April 20, 2010, from
http://www.ecommercetimes.com/story/62779.html
Germain,J.M.(2008,September16).TheWindsofCyberWar.RetrievedApril
10, 2010, from http://www.technewsworld.com/story/TheWindsof
CyberWar64494.html
LaMonica,M.(2009,April8).Report:SpieshackedintoU.S.electricitygrid.
Retrieved May 3, 2010, from http://news.cnet.com/830111128_3
1021489854.html
Lewis,J.(2002).AssessingtheRisksofCyberTerrorism,CyberWarandOther
Cyber Threats:.
Retrieved April 30, 2010, from
http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf
20
21
ABSTRACT
CyberTerrorismandCyberWarfareareconsideredaprioritythreatfor
nations includingtheUnitedStates,China, andtheUnitedKingdom.These
attackscanhavedevastatingconsequencesonthewelfareanationandofits
citizens. A research team consisting of Andrey Lavochin, Frederick Le and
PhillipTrancollaboratedtoanalyzethethreatofCyberTerrorismandCyber
Warfare.Theteamsgoalwastoidentifythethreatsandtechniquesusedin
suchtacticsaswellasidentifypotentialsolutions.Theresearchteamconcluded
thatthereisnotabeallendallremedytoCyberTerrorismandCyberWarfare
butthatthereareproactivemeasuresthatmaybetakentoreducethefrequency
ofattacksandmitigatethedamagetheycause.
22
23
24