Cyber Terrorism 214

Embed Size (px)

Citation preview

  • 8/2/2019 Cyber Terrorism 214

    1/3

    Cyber Terrorism

    ByKevin Coleman,Technolytics

    October 10, 2003

    Classified Ads:

    Human Machine Interface Report- Uncover winning methods for bringing high quality, sales-

    driven and easy-to-use HMI technology to market quickly. 11 key industry players reveal their

    strategies and 4 case studies show you how HMI can impact your bottom line.

    Business, government and industry have all become addicted to information.Their reliance on informationcreates opportunities for terrorism.Imagine a day without the Internet.What would the impact be? Justwhat is considered to be cyber terrorism?

    Cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, againstcomputers and/or networks, with the intention to cause harm or further social, ideological,religious, political or similar objectives, or to intimidate any person in furtherance of suchobjectives.

    If your look at the projected eCommerce number for this year, the Internet being down for just one daycould disrupt nearly $6.5 billion worth of transactions. More than just eCommerce transactions flow overthe Internet.eMail, voice communications, some banking machines, credit card authorizations for physicalstores and the list goes on and on.Information is the life blood of commerce, regulatory oversight andeven social status.The importance of the information and the ability to access it, transfer it and act upon ithas increased to the point that it is unfathomable for all but the smallest of businesses to operate withoutcomputers or networks.As the value of the computing infrastructure increases so to does the value ofdisruption.The financial implications are one thing, but the psychological impact of the Internet disruption

    could be even more damaging.

    How likely is this to happen? It is not, if it will happen, but when.The likelihood of a cyber terrorism attackdisrupting the Internet increases every day.The increased reliance on the Internet by business,government and society has made it a prime target for terrorist intent on disrupting our economy and wayof life.

    Click here for larger image.

    Security professionals have expressed their increasing concern over not only the increase in frequency ofattacks against the Internet, but also the increase in the level of sophistication of these attacks.While thecomplexity of the attacks is increasing, the skill level of the intruder that launched the attack isdecreasing.This is a very troubling trend.As the terrorists learn from every attack what works and whatdoesn't, where the vulnerabilities are, how we respond, and the methods we use to detect these attacks,they gain the knowledge that will increase their odds for success.

    http://www.directionsmag.com/author.php?author_id=123http://www.directionsmag.com/author.php?author_id=123http://www.directionsmag.com/author.php?author_id=123http://www.technolytics.com/http://www.technolytics.com/http://www.technolytics.com/http://ads.directionsmag.com/adclick.php?bannerid=3265&zoneid=0&source=&dest=http%3A%2F%2Fwww.telematicsupdate.com%2Fhuman-machine-interface-report%2Findex.html%3Futm_source%3DClassified%252BAd%252B19%252BJuly%26utm_medium%3DDirections%252BMag%26utm_campaign%3DIndex%252Blink&ismap=http://ads.directionsmag.com/adclick.php?bannerid=3265&zoneid=0&source=&dest=http%3A%2F%2Fwww.telematicsupdate.com%2Fhuman-machine-interface-report%2Findex.html%3Futm_source%3DClassified%252BAd%252B19%252BJuly%26utm_medium%3DDirections%252BMag%26utm_campaign%3DIndex%252Blink&ismap=http://www.directionsmag.com/images/articles/cyberterror.gifhttp://www.directionsmag.com/images/articles/cyberterror.gifhttp://www.directionsmag.com/images/articles/cyberterror.gifhttp://www.directionsmag.com/images/articles/cyberterror.gifhttp://ads.directionsmag.com/adclick.php?n=a21df573http://ads.directionsmag.com/adclick.php?bannerid=3265&zoneid=0&source=&dest=http%3A%2F%2Fwww.telematicsupdate.com%2Fhuman-machine-interface-report%2Findex.html%3Futm_source%3DClassified%252BAd%252B19%252BJuly%26utm_medium%3DDirections%252BMag%26utm_campaign%3DIndex%252Blink&ismap=http://www.technolytics.com/http://www.directionsmag.com/author.php?author_id=123
  • 8/2/2019 Cyber Terrorism 214

    2/3

    Could the northeast black out in August have been the first cyber attack? A question that is in the back ofmany people's minds.

    What is the current state of attack?

    Despite significant investment in technology and infrastructure, cyber terrorism represents one of thegreatest challenges in combating terrorism.Every day the Internet and countless other computer systemsare under attack.In the 2002 research study conducted by the Computer Crime Research Center, 90% ofrespondents detected computer security breaches within the last twelve months. In another more recentstudy conducted by CIO Online, 92% of companies have experienced computer attacks and/or breachesin the last 12 months.If that is not shocking enough, security professionals are worried about theincreased sophistication of threats against computer systems.

    Here are some interesting statistics.

    In the first half of 2002, there were more than 180,000 Internet based attacks on business. Attacks against the Internet increase at an annual rate above 60%. The average business will experience 32 break-in attempts this week. Reported systems vulnerabilities and security incidents are doubling each year. The reported number of vulnerabilities and security incidents represent an estimated 10% of the

    actual total.

    Most studies to date have shown that critical information infrastructures are potentially vulnerable to acyber terrorist attack.The increasing complexity of information systems creates new vulnerabilities andchallenges for IT management.Even if the technology is armor plated, insiders acting alone or in concertwith other terrorists may be able to exploit their access capabilities to wreak considerable harm.

    What would the impact be?

    The intention of a cyber terrorism attack could range from economic disruption through the interruption offinancial networks and systems or used in support of a physical attack to cause further confusion andpossible delays in proper response.Although cyber attacks have caused billions of dollars in damage andaffected the lives of millions, we have yet witness the implications of a truly catastrophic cyber terrorism

    attack.What would some of the implications be?

    Direct Cost Implications Loss of sales during the disruption Staff time, network delays, intermittent access for business users Increased insurance costs due to litigation Loss of intellectual property - research, pricing, etc. Costs of forensics for recovery and litigation Loss of critical communications in time of emergency

    Indirect Cost Implications Loss of confidence and credibility in our financial systems Tarnished relationships& public image globally Strained business partner relationships - domestic and internationally Loss of future customer revenues for an individual or group of companies Loss of trust in the government and computer industry

    New legislation is requiring system breaches to be reported (SB1386 California). Other proposedlegislation would allow damages to be sought by victims of attacks that are launched from hacked websystems.California's SB 1386 is a sweeping measure that mandates public disclosure of computer-security breaches in which confidential information of any California resident may have beencompromised.The bill further goes on to define personal information as an individual's first name or initial

  • 8/2/2019 Cyber Terrorism 214

    3/3

    and last name in combination with a SSN, a driver's license number, or any account numbers, credit cardnumbers, debit card numbers, and associated passwords or codes.Think of the liability an organizationwould incur if their systems were compromised and thousands of individuals personal information wereexposed and even exploited for financial gain - (funding terrorism).

    With the "LoveBug" virus costing nearly $10 billion, it is hard to fathom the financial implications of a muchmore serious and comprehensive attack.Each and every day corporations in the U.S.and abroad spendmillions combating the threats of cyber attacks and cyber terrorism.Corporate efforts reach tens (if nothundreds) of billions of dollars annually and with the increased frequency of attacks, the cost willsignificantly increase in the coming years.As we face more and more complex attacks from professionalcyber warriors, corporations will increasing seek help from the governments around the world to thwartthese efforts and stem the financial bleeding.

    When will it happen?

    As discussed earlier as the value of our information infrastructure further increases and the capabilities ofthe cyber terrorists' increase, the likelihood of a significant incident increases.As figure 1 depicted, my betwould be the fourth quarter of 2004.Factoring in the increased value of the Internet before, during, andafter a Presidential election along with the psychological impact that type of an event would have, coupledwith the ever increasing capabilities of the attackers - that would be "PRIME TIME" for such an

    incident.Would such an attack have a significant direct impact on the election - NO.But if a terrorist wereplanning to send a message, I can think of no better time.

    Thwarting Cyber Terrorism

    Corporate America must be forced to wage an all-out war against cyber terrorism. Securing theinformation infrastructures will require a substantial effort on everyone's part.Close collaboration betweengovernment and the private sector is critical. Even more critical is the close collaboration within thecomputer, networking and software industries.These industries must work closely and continue efforts toenhance technology security capabilities.Security is designed in, not added on.Until the weakest links inthe network are protected we all are vulnerable and may be impacted.The government sector mustinstitute tougher penalties for cyber crimes and increased funding for law enforcement efforts to fight it.Easier said than done.This must be accomplished with a high degree of collaboration globally.Getting

    countries to agree on anything these days seems to be an almost unachievable task.Is cyber terrorismthe shape of future conflict? Is a digital underground developing right now? Will our scientists, softwareengineers, and technical resources be able to stay one step ahead of these faceless terrorists? Only timewill tell!

    Computer and information security, data protection, and privacy are all growing problems. No singletechnology or product will eliminate threats and risk.I do not believe we have even begun to think of thesocial and economic implications of a considerable cyber terrorism attack against ourinfrastructure.Securing our computers, information, and communications networks secure our economyand our country.A global strategy and policy for combating this type of terrorism is need now.