Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Denial of Service Attack Case Study
Denial of Service Attack Case Study
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Denial of Service Attack Case Study
Question The 21st century has seen warfare adopt many new faces, among those the use of the Internet as a weapon. Explore an e-warfare incident and discuss its success or failure. In your answer detail how you as a network manager could protect your organisation against e-warfare. Abstract In the following essay I will define ‘E-warfare’ and outline types of attacks which are associated with it. I will identify an incident which has taken place and discuss whether the incident was successful or failed. I will then attempt to give a detailed explanation of how if I was an appointed network manager, that I would protect an organization against e-warfare. I use examples when necessary to provide a realistic appreciation of the use of attributes that support my recommendations When one thinks of warfare, the traditional meaning of armed conflict comes to mind. Dictionary.com (2008) defines warfare as armed conflict between two massed enemies, armies, or the like. But as technology develops the face of war has changed, it can now be accomplished electronically, which is known as electronic warfare or ‘E-warfare’. E-warfare is the use of computers and the internet to conduct warfare in cyberspace. There are various types of attacks which can be conducted electronically, which include hacking, denial-of-service or distributed denial-of-service and web vandalism. Recently an event occurred in which an electronic attack took place which had a devastating impact on the country of Estonia, taking down government and other organizations websites. The attack which took place was a distributed denial-of-service (DDoS) attack. With these attacks occurring, prevention methods need to be put in place in order to reduce the impact. As so... ... middle of paper ... ... ‘Gadi Evron Interview’, 2007, SearchSecurity.com, 26 July, accessed 30/3/08, http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci1265720,00.html Huegen, C 2000, The Latest in Denial of Service Attacks: “Smurfing” Description and Information to Minimize Effects, weblog, 8 Feb, accessed 1/4/2008, http://www.pentics.net/denial-of-service/white-papers/smurf.cgi Myres, S 2007, “Cyberattack on Estonia stirs fear of 'virtual war'”, Herald Tribune, 18 May, accessed 28/4/2008, http://www.iht.com/articles/2007/05/18/news/estonia.php “The Cyber Raiders Hitting Estonia”, BBC News, 17 May, accessed 28/3/2008, http://news.bbc.co.uk/2/hi/europe/6665195.stm The Economist 2007, accessed 01/04/2008, http://www.economist.com/world/international/displaystory.cfm?story_id=E1_JNNRSVS Quinn, M 2006, Ethics for the Information Age, Pearson Education, USA
In the presidency of Thomas Jefferson, continuing through Madison’s term, the United States initiated a policy to retaliate against the seizure of ships by the British and French. These three dominant nations entered a period between 1806-1810, known as Commercial Warfare. The Commercial War was a response by Americans to maintain their right of neutral commerce. The Acts by the United States, the Decrees by the powerful Napoleon I, and the Parliamentary orders, throughout the period of Commercial Warfare directly led to the start of the War of 1812, and helped build the commercial future of the United States.
At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike. Terms such as “cyber Pearl Harbor,” “cyber 9/11” and “cyber Vietnam” have been used to describes potential catastrophic cyber attacks and yet, “Though many have posited notions on what a ‘real’ cyber war would be like, we lack the understanding of how such conflicts will be conducted and evolve.” (Rattray & Healey, 2010, p. 77). Yet, the U.S. government continues to focus on such events, as if the plausibility of small-scale cyber attacks were not as pressing.
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
The greatest challenge for Combatant Commanders when planning cyber operations is unintentional effects. Cyberspace is unlike the other domains and does not have the same physical limitations. The network is not limited by range or distance so cyber-attacks can easily extend beyond the intended target resulting in unintentional consequences. Planners must deconflict cyber operations with other operations. Offensive and defensive cyber applications
As a patriot of this great nation, what has been presented is of extreme if not grave concern. The challenges of cyberculture to our nation’s security have been revealed . To what extent our security has been breached is a matter of speculation but be informed that these breaches must be met with complete counter active success - failure to do so is not an option.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
The U.S Army Cyber Branch was created in September 2014, as one of the first official steps in establishing a seventeen-series career field specialty, dedicated to managing the careers and professional development of officers. Army Secretary John McHugh and Chief of Staff General Raymond Odierno approved the creation of the Cyber Branch in September 2014. The U.S. Army Cyber Commander capitalizes on existing U.S. Army cyber resources and improves operational readiness by organizing all cyber resources under a single command. The Network Enterprise Technology Command, the 9th Signal Command and the 1st Information Operations Command (Land) are subordinate units to the Army Cyber Command. Command
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
Masnick, Mike. "Should We Want A 'Cyberwar'? It's A Lot Less Bloody Than A Real War." Techdirt. N.p., 20 June 2012. Web. 21 Nov. 2013. (Source G)
Society has become ever-increasingly dependent upon technology, more specifically, computers to conduct personal and business transactions and communications. Consequently, criminals have targeted these systems to conduct information and cyber warfare, which can include politically motivated attacks and to profit through ill-gotten means. In an article written by Koblentz and Mazanec (2013), cyber warfare is the act of disabling an enemy’s ability to use or obtain information, degrading its ability to make decisions, and to command its military forces. Additionally, information warfare is composed of cyber warfare and related to the protection, disruption, destruction, denial, or manipulation of information in order to gain a benefit through the technologies (Taddeo, 2012). Accordingly, as technology becomes readily available to various entities, the ability to conduct or perform warfare through technological means is multiplying.
Technology changes every day, sometimes the events in our life shape what new technology we use. You would have to be living in a hole not know that we are in conflict with Iraq, and this event has changed digital warfare.
It is asserted in another article Terrorist Use of the Internet: Information Operations in Cyberspace by Catherine A. Theohary and John Rollins. Both of them claimed that terrorists are using cyber space to dismantle different information operations through induction of fraudulent financial procedures, hacking and disinformation. They have argued that terrorist may use cyber space for the social and economic assistance. Moreover they have reviewed different American internet security agencies like DOD, FBI and NSA, and have devised that already many preliminary steps have been taken to combat cyber terrorism but they have stressed on the need of further planning of restricting the cyber warfare (Rollins and Theohary, 2011).
capacity and performance. However, as networks enable more and more applications and are available to more and more users, they become ever more vulnerable to a wider range of security threats. To combat those threats and ensure that e-business transactions are not compromised, security technology must play a major role in today's networks.
The Web. 5 Oct. 2015. Olender, Michael. A. “Keeping Pace with Cyber Power, Defense, and Warfare.” Journal of International and Global Studies 6.2 (2015): 55+.
Information Warfare is not only becoming more rampantly used among people, but they are using different types as well. There are three different classifications of Information Warfare. The first one deals with personal information warfare. This is inclusive with all the information that is available about an individual. Class two deals with corporate information warfare, which involves how information effects companies, businesses, and all economic interests. Of all the classes the third one has the broadest margin. The third class is global information warfare. This purpose of this class is to deal with all a...