For
more essays on Cyber Attacks, Cyber Security and related topics visit
http://academicresearchtutor.com
Examining the
Threat from Cyber Attacks
The extent of
the benefits and demerits of use of computer networks is a raveling
technological advancement, which is developing. Computer networking has led to
technological advancements but at the same time, it provides avenues for the
execution of malicious activities (Hathaway
et.al, 2017). All over the world, the dependence of organizations on network
sharing of computers is unquestionable. Organizations ranging from small
companies to large companies and even average users of computers perform
networking actions. In the 21st century, almost everyone has an
electronic device capable of connecting to the internet and by extension to the
world. Home appliances, alarm systems, motor vehicles, security surveillance
systems and smart watches all access the internet, which is a network of
computers. The inception of the World Wide Web eased communication and made it
faster as opposed to before. With the recent increase in technological
advancements, many users of computers are embracing the virtual world of
information sharing. Global transactions rely on the internet as a vital
provider of a connection, which networks people together. The government, local
entities, and the state rely on the internet as a mode of communication.
Unfortunately,
the internet is increasingly used for ulterior motives by hackers who use the
network as a gateway to attack organizations and companies. The hackers are
careful enough not to be detected or identified ((Li & Li, 2017). According
to Roel Schouwenberg who serves as a researcher at a leading computer security
firm called Kaspersky, hackers are now using insidious weapons to attack
crucial infrastructure such as banks, water supplies, power plants, and even
nuclear facilities. In June 2010, an insidious weapon in the form of a worm ran
down Iran’s nuclear plant after it infected the software of other industrial
sites. As opposed to viruses that await an unsuspecting user to install it, a
worm transmits itself once a connection is available (Kadivar, 2014). The worm used in this cyber-attack was called
Stuxnet. According to Collins & McCombie (2012), the worm is described as
highly sophisticated and difficult to identify hence causing a lot of
destruction before being identified.
The usage of
networks for malicious activities such as cyber-attacks invokes concerns about
the cyber security and what implications it may have in the future. Cyber
attacks conducted via networks show a transition from the ages when only bombs
could be used to wage wars (Nye, 2013). Regrettably,
these attacks can be directed to specific organizations to advance external
agendas of a malicious nature. The security unit in the Federal Bureau of
Investigations asserts that cyber-attacks are increasingly becoming more
sophisticated and it fears they might become unstoppable (FBI, 2017). The
imminent threat posed by cyber attacks raises concerns if world conflict and
traditional warfare is changing. Unsubstantiated reports point out that
geopolitical warfare might be morphing as was the case of Stuxnet in which
United States and Israel were implicated for the attack in Iran (Margulies, 2013). According to Kasperskey
security engineers, cyber-attacks can be conducted for financial gain or even
have political motivations (Waxman, 2011). The attacks expose political
ramifications as a result of states sponsoring covert action against another
state.
References
Brantly,
A. F. (2014). Cyber actions by state actors: Motivation and utility. International
Journal of Intelligence and CounterIntelligence, 27(3), 465-484.
doi:10.1080/08850607.2014.900291 (accessed December 9, 2017).
Denning,
D. E. (2012). Stuxnet: What has changed? Future Internet, 4(4),
672-687. doi:10.3390/fi4030672 (accessed December 5, 2017).
Federal
Bureau of Investigation. (FBI) 2017. What
We Investigate-Cyber Crime, https://www.fbi.gov/investigate/cyber.
(accessed December 9, 2017).
Hathaway,
O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel,
J. (2012). The law of cyber-attack. California Law Review, 100(4),
817-885 (accessed December 8, 2017).
Kadivar,
M. (2014). Cyber-attack attributes. Technology Innovation Management
Review, 4(11), 22-27. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1638204721?accountid=8289
(accessed December 4, 2017).
Margulies,
P. (2013). SOVEREIGNTY AND CYBER ATTACKS: TECHNOLOGY'S CHALLENGE TO THE LAW OF
STATE RESPONSIBILITY. Melbourne Journal of International Law, 14(2),
496-519. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1626835110?accountid=8289
(accessed December 4, 2017).
Nye, J. S.
(2013). From bombs to bytes: Can our nuclear history inform our cyber
future?. Bulletin Of The Atomic Scientists, 69(5),
8-14. doi:10.1177/0096340213501338 (accessed December 5, 2017).
Waxman, M. C. (2011). Cyber-attacks and the use of force:
Back to the future of article 2 (4).
Collins, S., & McCombie, S. (2012). Stuxnet: the
emergence of a new cyber weapon and its implications. Journal of
Policing, Intelligence and Counter Terrorism, 7(1), 80-91.
For more essays on Cyber Attacks, Cyber Security and related topics visit
http://academicresearchtutor.com
No comments:
Post a Comment