Jump to content

User:POLS/sandbox

From Wikipedia, the free encyclopedia

Cyberterrorism:

1          Overview

a.         In the overview, it mentions a Eugene Kaspersky and what he thinks about cyberterrorism without really mentioning him before talking about him.  I would change that so it would say how he is an expert in the field of cybersecurity before mentioning the rest of what he said.  

Eugene Kaspersky is an expert in the field of cybersecurity and is the CEO of Kaspersky’s lab where he helped create antivirus modules and a database that is one of the most complete and comprehensive collections in cybersecurity for protecting systems from malicious programs.

Source: 1. https://usa.kaspersky.com/about/team/eugene-kaspersky

             2.  https://www.forbes.com/profile/eugene-kaspersky/

b.         Also in the overview, it mentions the term interconnected world which I would like to provide a definition or at least a link so people can see more on the word itself because some people reading the article may not understand this term.

1.1       Broad definition

a.  In the broad definition part of the article it gives a lot of definitions I think it would be helpful to the reader if it provided an example for each definition and I would change that.

1.2       Types of cyberterror capability

               a. I would give an example of each that has happened in the real world to give a better sense of each type of cyberterror capability.

1.3       Concerns

             a. I would like to give an example of a denial of service attack even though it provides a link to another page I think it would provide a better view of what they are talking about.

1.4       History

              a. In this section there is not a lot of this section for which I will improve and I am going to put in the first example of cyberterrorism.

Changes:

History: In the late 1990’s the internet was starting to become very large and was starting to become a part of people’s everyday lives. This gave some people the opportunity to use the internet and computer systems for criminal acts or to create worms or viruses to attack computer networks and systems.

The first real act of terror that was inflicted on the internet was called the Morris worm which was spread throughout the US and found weaknesses in the system and replicated itself regularly which caused computers to become so slow that it brought to the point of being very unstable. It turned out that the attacker Robert Tapan Morris didn’t want to cause harm he just wanted to see how large the internet really was. But this act just gave way to others who wanted to see what they could do with the internet and with technology growing rapidly this would lead to much more sophisticated software’s and technology and more sophisticated viruses and malwares to attack them.

2          International response

a. This section needs to be updated and I am going to find more on what the US is doing to protect against cyberterrorism especially since technology keeps changing rapidly.

b. New ways that have been invented to protect against cyberterrorism.

2.1       U.S. military/protections against cyberterrorism

2.2       Estonia and NATO

2.3       China

            a. I am looking for more information on this section and will try to improve this section.

2.4       Pakistan

3          Examples

            1st Sentence Change: Examples of cyberterrorism can range in variety due to the fact that cyberterrorism can occur from anyone and anywhere in the world. With the means and skills to achieve a certain goal or objective. The targets of cyberterrorism also range in variety but one base factor is that it has to be electronically based such as things like transportation systems, electrical grids, or personal information that is based on computer networks, all of which can cause serious damage to infrastructures and people’s well-being.

Subheadings:

1996 Attack on Massachusetts ISP

1997 Electronic Disturbance Theater

1998 Attack on the Institute for Global Communications (IGC)

1998 Attack on Sri Lankan Embassies

1999 Attack on NATO computers

2000: Aum Shinrikyo

2008: Pakistani Cyber Army

2013: New York Times Discovery

2013: New York, Twitter, and The Huffington Post Lose Control            

3.1       Sabotage

        a. This section needs to be updated as well the last date they reference is 2008 so I am going to find new information and better examples to use in this section.

New and Updated Example:

The Jasmine Revolution occurred in January 2011 in Tunisia which was a cyber-attack on the entire online population of Tunisia by AMMAR, Tunisian government run internet service provider (ISP). They hacked the user names and passwords of the entire online population which resulted in the overthrow of the corrupt Tunisian government.

Source: https://www.forbes.com/sites/jeffreycarr/2011/02/04/real-cyber-warfare-carrs-top-five-picks/#1e2703d42ef5

Cyber Sabotage Definition:

Cyber Sabotage isn’t just limited to political agendas it has also been linked to many other non- political acts of sabotage. It has become a popular choice among disgruntled employees, and other criminals with the skills and means to attack any server or network they want and steal information or data and threaten to distribute it or hold it hostage until they are given what they want in return they will not release the data or will return the network back to its working order.

3.2       Website defacement and denial of service

             a. There is not a lot in this section and the most recent they have is 2007 as an example and I will try to find a more recent example and add it to this section.

Denial of Service Definition:

Denial of Service Attack refers to an attack that overwhelms a system with data. Most commonly it floods a website with request to view its pages which causes the web server to crash or to become inoperable as it struggles to respond to the flood of requests being made which it cannot handle. As a result, users cannot access the web site.

Source: https://www.wired.com/2016/01/hacker-lexicon-what-are-dos-and-ddos-attacks/

Another Recent Example:

A more recent example of a Denial of Service Attack was on May 3rd, 2016 on the Central Bank of Greece. The attack shut down the Central Bank of Greece’s website for just a few minutes as what turned out to be an act of protest.

Source: http://money.cnn.com/2016/05/04/technology/anonymous-greek-central-bank/

New Example:

In December of 2016 there was an Denial Of Service Attack on the BBC website that may have been the largest ever in history. A group calling itself New World Hacking attacked the BBC website and said that the attack reached Gbps (or billions of bits per second and is a measure of bandwidth on a digital data transmission medium)  which if that is correct would be the largest Denial of Service Attack ever recorded. During the attack on the BBC website it compromised many records and other information which could damage the BBC website and whatever information that was being kept on the BBC’s network and databases.

Source: http://www.csoonline.com/article/3020292/cyber-attacks-espionage/ddos-attack-on-bbc-may-have-been-biggest-in-history.html

4          In fiction

5          See also

6          References

7          Further reading

8          External links

8.1       General

8.2       News