Friday, March 29, 2019

Cyber Terrorism Poses Threat to National Security

Cyber Terrorism Poses Threat to National SecurityTerrorism has move from the traditionalistic world to the cyber world. Terrorism has entered a new age whither a combat zone has emerged in profits. The health, wealth and surety of nations such(prenominal) as the United States of America is in jeopardy as atomic infrastructures be chargeed by frightists done meshwork to bring terror to the nation. Cyber act of terrorist act has distinguish terrorists to be more vibrant and less suicidal there is right away no need for travelling long distance with explosives, chemical and biologic weapons that efficiency put their lives in danger. This wonder paper aims to let online reasons stinkpot act of act of terrorism relocating to cyber lay, how terrorists intend to engross cyberspace to bring terror and the advantages that cyberspace has granted them.Traditional shafts of terrorism atomic number 18 often regarded as a one step forward and two steps back order as t raditional rotating shafts argon sometimes suicidal and their reference qualification not be reached. Cyber terrorism is thus a stepping stone for terrorists as they depose destroy, hack into systems, alter information and their fervors flocknot always be expect. Accordingly, this research focuses on how cyber terrorism poses a threat to subject security. Based on this threat several aspects of field security espionage allow be outlined. tuition about economic espionage will be discussed where the economic intelligence is below threat of cyber terrorists. Information state of war will be touched on for example how television and radio transmission contribute be hijacked and the soundty valve of sensitive information be utilise to sabotage stock exchange. Cyber warf be will also be covered to see how cyberspace is used to target the ground forces operations and its facilities.In conclusion, types of cyber terrorism conferences that target internal security will be discussed. Statistics on cyber terrorist threats will be looked at and ways to stay safe from those types of threats.IntroductionCyber terrorism has been defined in many ways but the main objective is to bring terror by the use of cyberspace. Terrorists have found a comfortable and very much safer purlieu to launch their ack-acks. Cyberspace has force a training ground, enlisting and training agency, a meeting place and a marketing tool for terrorists. Cyber terrorism vitrines great discomfort to subject security as terrorist governings, hostile governments, criminal organisations and individual hackers develop new ways to attack minute infrastructures, the military and the government.Cyber terrorism tools has made cyberspace to be the head-quarters for terrorists. Cyber terrorism has become the new weapon of mass destruction for terrorists where their cyber attacks whitethorn go unmarked or at the time of notice, the response time may be limited. Cyber terrorism has give n terrorist reason of attacking national security at any given as cyberspace is more advantageous than traditional methods.National security is said to be the requirement to maintain the option of the nation-state through the use of economic, military and political personnel. The greater the mental object national security has of holding sensitive information and betray secrets, the greater the capacity to feel pain from cyber terrorists. Now the national security needs to value the excerption of the nation state and also its survival from terrorists attacks. Since well national security cannot fight cyber terrorism on its own they atomic number 18 agencies such as the National Security Agencies (NSA), the Central Intelligence Agency (CIA) and the federal official Bureau of Investigation (FBI) which help national security fight cyber terrorism.Cyber terrorism if not challenged head on will cause great drive of damaged terrorists relocated to cyberspace after seeing an opport unity that military power in not that dominant allele in cyberspace. In cyberspace terrorists have privileges of launching an attack at any time with no fear or doubt that it might not succeed or reach the designated bea. Cyber terrorism is a trial and error method if the attack did not succeed u can try again mot like traditional method where as if u failed its either you decline or end up in jail.Cyber terrorism takes many forms. matchless of the more popular is to target national security which is taken to be national security espionage. National security espionage ranges from economic espionage to information warfare and cyber warfare.Cyber terrorism stats show that every year enormous amount of bills is lost due to cyber terrorism, cyber terrorists target critical infrastructures for making money or they fundraise in cyberspace to raise funds for attacks. Cyberspace has given terrorists a free way of launching their attacks we may fare for the worst as everyday terrorists manage to recruit and train its own army of terrorists the various number of available cyber terrorism tools has to the level of terrorism to an ripe(p) level. We may ask ourselves if the world will ever be flying for a full length cyber terrorism attack. Where will the attack burgeon forth and will it be detected in time to respond to the attack?BackgroundCyberspace has become a combat zoneThe move of cyber terrorists from traditional tools to cyberspace has established a much safer and comfortable environment for terrorists to launch their attacks. In the process their relocation has triggered a robust and wicked war, this war if fought between national security and cyber terrorists.The battleground has being instal in cyberspace, Nation states have created cyber-warfare units, this unit will be cognise as USCYBERCOMM which is headed by Keith Alexander. Richard Clark said at the RSA conference chinaware and Russia are stealing petabytes of information he also said that th e government of China and Russia are successfully engaging in daily activities of stealing anything expense stealing and the United State government and private industry are not stopping them. Terrorists prove to harm the survival of the nation, harm the sparing and target critical infrastructures of regions they are targeting. The survival of the national security might be left in shambles if a full scaly cyber attack may be launched against them. Although terrorists have not successfully launched a substantial cyber attack, the threat is there and grows larger and bigger with every small cyber terrorism attack. With this small cyber attacks, cyber terrorists are gaining more experts and experience. A question may come to mind why are terrorists launching these weak attacks? What is the bigger picture that they are trying to painting? Will the answer to this question be that they are trying to find loop holes in systems to be targeted? We will never know until that time comes. National security depends on military power for security but the military is not dominant in cyberspace as it is dominant on surface kill and in the sea. Military have limited resources to take on cyber terrorism. Terrorists seek to attack through cyberspace where their attacks have the potential to reach the destination originally targeted simply because the line of defence is not that powerful. Cyber attacks cannot be anticipated, they are no radars to track incoming attacks in cyberspace.Targeting critical infrastructuresThe move of terrorists to cyberspace has left the world in shivers as the world depends on critical infrastructures for survival and making earns meat. Targeting national security will reduce the aptitude of protecting the nation if the ability of protecting the world is reduced terrorists can strike in ways that we cannot image. People are not safe in their homes as gas pipelines pass under their houses cyber terrorists can cause a major gas pipe line burst of regions they are targeting the terror of September they 11 may be relived with the use of pipelines this time.Advantages of cyber terrorismCyber terrorism is much safer than traditional tools cyber terrorism has made terrorists to be leeward suicidal.Terrorists can cause greater damage at less bump of being caught in the crossfire.Recruitment, teaching and fundraising is simple, they can recruit people make a lot of money in a short space of time.They is no need for terrorists to travel long distance with biological weapons and bombs, attacks can be made remotely from anywhere in the world.Their attacks cannot be anticipated can cause great impact.No check points to go through for terrorists to reach their destination.Cyber terrorism is cheaper than traditional methods.National security espionageNational security espionage can be defined as the use of cyberspace by terrorists to penetrate national security systems to try and steal critical information, trade and government secrets and target critical infrastructures. National security protects the nation through the use of economic, military and political power. Cyber terrorists seek to exploit the fact that national security holds sensitive and dangerous information which can harm the survival of national security and the well being of the nations. National security espionage can take many forms which ranges from economic espionage to information warfare and cyber warfare here is an overview of the three types of national security espionage which are mentioned above sparing espionageEconomic espionage also known as industrial espionage is known as the use of cyberspace by under developed countries, commercial or industrial enterprises to gain information of trade secrets which are not available on open channels. Cyber terrorists target Europe and the United States of America as they posses power in the market areas, they have top companies and they are fully developed.Types of cyber terrorism groups that ca use terror to national securityThey are various types of cyber terrorism groups, but the one which cause great deal of panic is those that target national security being for political purpose, industrial espionage or cyber warfare. any(prenominal) the target may be towards national security, the outcome of the attack will be enormous. Groups likeThe Osama bin Laden Crew This is a group of cyber jihadists which was found in the year 2000 by Abdullah Quraischi.Al-QaedaCyber terrorism tools and techniquesThe biggest tool for terrorists has become the internet. The internet is an immeasurable digital library, anything about any organisation can be found in the internet. Terrorists use various tools in cyberspace to bring harm, they use tools likeDistribution Denial of service of process (DDoS)This is an attempt of denying services, making computer resources not to be available to the mean users.SniffersSniffers are used to get passwords of systems (spying of passwords).Rootkits(Musk intrusion)Rootkits are utilities installed in a victims tool to ensure that a cracked system remains available to the intruder. Rootkits are difficult to trace as the system will work as its being working before.Network Analyzers (SATAN)Spoofing (smurfing)WormsWorms are programs which makes copies of itself and copies to other computers trough out the network.Trojan HorsesIs the software program which feasts on the victims machine and can run secretivelyBackDoorBackdoors allows hackers to enter systems again at a later pegleg without being noticedBotnet (zombie army)Botnets are malicious softwares which runs automatically on computers which are hacked.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.