STUDENT’S Cyber can make all of these things

STUDENT’SNAME: i)                   KAMALFAHMI BIN ZAINAL ABIDIN MATRIX NUMBER:B16CS0003 SUBJECT:ADVANCED ENGLISH EDUCATION (ULAB 2122)LECTURERNAME: DR.HEMA ROSHENY BT MUSTAFA              DATE: Dec 8, 2017 BACKGROUNDISSUESCyberterrorismdefined as politically motivated acts of deliberate large-scale disruption ofcomputer networks is on the rampage.

Today computer viruses and Trojansdesigned to do everything from stealing data, to watching user internet intheir webcam, and to theft of billions of dollars. Some cybercriminal todaygoes as far as targeting power, utilities and infrastructure. Computers controlour military equipment, everything from missile to satellites and to nucleardefence network. Cyber can make all of these things impossible. Cyber isconsidered a new domain of terrorist. It is not necessarily a bad thing.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

  On the one hand, it means have whole newfront on which need to defend network, but in the other hand it means have awhole new way to attack. A whole new way to stop evil people from doing evilthings. Example, suppose a terrorist wants to blow up a building, and wants todo this again and again in the future. So he does not want to be in thatbuilding when it explodes. He is going to use a cell phone as a remotedetonator. Now, it used to be the only way to stop this terrorist was with ahail of bullets and a car chase, but that is not necessarily true anymore.

Awell-crafted cyber-attack could break into his phone, disable the over voltageprotections on his battery, drastically overload the circuit and explode. Nomore phone, no more detonator and maybe no more terrorist. So how does thiswork? It all comes back to those ones and zeros. Binary information makes yourphone work, and used correctly, it can make your phone explode. Thus, therecent studies have revealed that the emergence of cybercrime and terrorism andits impact on society.

TECHNOLOGYPERSPECTIVE 1Ifterrorist are going to engage in adverse actions against the countryfundamentally it has to involve people terrace. According to (Phillip, 2016)cyber may be the storage of important data and files. Right now these terrorscan be planners, they can be funny, they can be foot soldiers, they havedifferent possible roles but at the end of the day yet, there is be adverseactions against the country by do terrorism tactics it has to involve peopleterrorist. These terrorist will maketransactions in support of their plans, plots, and activities and when takethose financial, communication and transport communication one can image whatthe many possible transactions that people can engage in support of theirplans, plots and activities. The fact that studied by Phillip (2016) agreein cyber world could cause violation of privacy.

Those transaction will leave asignature in the information space and the hypothesis is if take thosetransactions over space and time by a group of people who are plottingnefarious things against the country that will form a unique signature in theinformation space. Now those transactionsthat signature lives in database that are in the public that are in that arecollected by government and intelligence community agencies and that also livein private databases.TECHNOLOGYPERSPECTIVE 2September 11, 2001,terrorist strikes set the tone for terrorist in the 21st century.Cyber terrorist emphasizes their attack through virtual terrorist from anywhere(Philipp, 2003). The 21st century has also seen the rise of another kind of terroristthat lets nations and loners do battle without guns or bombs. The biggestthreat we face may be a rogue actor with a laptop and a desire to wreak havoc.Cyberterrorist is probably the greatest challenge that we have as far as ournation’s national security is the concern.

We have an advantage over anotherform of competition with possible allies except one, and that is cyberterrorist.This is going to be the new battlefield an unseen invisible battlefield whereteams of hacker from various nations will due. For example, in 2010 a computervirus named ‘Stuxnet’ demolished a secret Iran nuclear weapons plant. Hacker atSymantec Corporation unravelled its mysteries. What made Stuxnet differentlywas it did not just stick to the cyber world, it actually reached and caused asort of real-world kinetic damage.

So Stuxnet just began spreading all aroundthe world onto Windows machines everywhere supported by.SOCIALPERSPECTIVE 1Itis now clear this cyber threat is one of the most serious economic and nationalsecurity challenges face as a nation. Cyberterrorist provide a generalawareness of cyber law (Gordon, 2007). President Obama is putting money wherehis mouth is allocating more than 350 million dollars of federal governmentspending this year to securing infrastructure and substantial but undisclosedamounts more to national intelligence budget and he is appointed acybersecurity coordinator at the White House But in the halls of congress thereis an audible anxiety that neither the government nor the private sector ismoving fast enough the government has not gotten its act together the privatesector which is 90% of it has his problems in getting its act together.

Cyberterroristconnecting society to the worldwide (Phillip, 2011). The primary threat comesfrom other nation-states and from intelligence services of a few countries. TheChinese are good they have a lot people and a lot of money. There are a fewother countries that do this as well. The second thereat would be cybercrime.There is a few countries that are sanctuaries for cybercrime and unfortunatelyit would be Russian and China again. In part because cyber criminals can beproxies and can be mercenaries.

So the government does not want to do it.Government ask the cybercriminal to help them out. Google alleges that Chinabroke into the email accounts of several of it is user. In January, 2010 Googlethe world’s largest internet Search Company announced this networks had beenbreached by attacks that originated in China. With toes to China and may causea serious ripple effect the China use some fairly basic techniques to exploitvulnerabilities in the network of Google and 30 other companies. This was notjust Google to get in and in Google case do two things steal intellectualproperty how Google search engines worked and look for information on Tibet andhuman right activist and things like Gmail. Gmail accounts were compromisedpresumably of human rights activists and workers and possibly some source code.What cybercriminal did is they exploiteda vulnerability in Internet Explorer that allowed them to get inside thecompany but cybercriminal were not financially oriented, they probably morelooking to find future opportunities for exploitation and potentially morepolitically motivated.

CRITIQUESBOTH PERSPECTIVESNeverunderestimate the risk and potential of future scenario. Governments have somepretty serious challenges when talk about cyber. Thing about the cold roll coldwar and the idea of government versus government it was very that sort of JamesBond spies very skilled professionals doing operation on each other. When lookat the cyber terrorist are talking about attackers who have the ability to forindividual who have a political agenda to operate on those to attack thegovernment and we still have the state sponsored threat. Chances are high thatsuch incident will be directed against other IT systems, especially ifconnected to real-world machinery.

So, government are put in a difficultposition because how do they dedicate their resources do they dedicate to thepotentially very well-trained very dangerous nation states or do they focustheir efforts on more individual radicals even that can easily get hold ofcyber and used them against critical infrastructure or use them for justpropaganda. WRITER’SSTANCEThecyber war a conflict thought without foot soldiers, guns or missiles. Insteadattacks are launched by computer hacker. In Malaysia, there is a growingconcern that pose a massive threat to national security and a conviction thatthe world military superpower needs to be prepared for the fight ahead.

Theworst case scenario is an attack on networks that kicked out of criticalinfrastructure something took on power grid, strip down order that composes forone of our defence systems. Something like that would paralyze the countryrequires loss of life causing enormous economic damage and would be verydifficult to restore in a short period of time. It is a new form of terrorist,it is a new form of how disrupt infrastructure. There are attacks on networksevery single day that come from multiple sources around the world. Countries orindividuals that engage in cyberattack should face consequences andinternational condemnation. China responded with outrange calling the veiledaccusation groundless. In some ways the China could not have picked a worsecompany to hit because Google was the favourite child of this administration.Big mistake they should gone after somebody else.

So, the governmentresponsible it is the kind of question that plagued cybersecurity expert theycall it attribution problem and it makes responding to attacks inherentlydifficult. Since hacker can commandeer computers to attack others remotely itis hard to determine where they are based and tougher still to determine whothey are working for. CONSLUSIONDoesit matter whether there is a difference between cybercrime, cyberterrorism andcyberterrorist? The problem is to deal with all of these things? It hard toagree on exactly what definitions and how to differentiate cybercrime fromcrime in general or cyber terrorism from the great world of terrorism or cyber terrorist.It began in World War II when the British built a primitive computer to tryintercept successfully German communication and because of this government ableto make significant inroads into German tactics strategy and war plan.Information is really hard to constrain.

Example of a wonderful automatedattack is there was a slammer worm that was very powerful in 2003 it took overlarge portions of the internet and slowed things down. It was an automated warmit just propagated from computer to computer and eventually it got into anuclear plant without intending to so it got into nuclear plants in Ohio andactually disabled safety systems and monitoring systems using at the time now.Cybercrime is a scary concept for many reason. It can do possible seriousdamage to various aspect of our lives. It is difficult to catch, track andprosecute. The information ago has brought us many good things, but along withthose good things came some bad things too.

From cybercrime it can be cyberterrorist.All we can do as citizen is protect ourselves by protecting our information,who we give it to and how much we give it out.  

x

Hi!
I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out