Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Essay on cyber warfare
The problem of cyber warfare
Essay on cyber warfare
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Essay on cyber warfare
STUXNET
When we hear the word Stuxnet, we believe this to be one of the first incidents involving the term "Cyber Warfare". As the term Cyber War is still not exactly defined, we know that in the present day, cyber attacks are on the rise and are constantly happening around the world. The cyber domain introduces a new attack vector for military war. The event of Stuxnet brings people into perspective of the logical cyber and computer realms affecting the actual physical world. Although the events of Stuxnet are highly debatable because we don't know the true origins of the Stuxnet programming itself, we can come to the conclusion that cyber attacks using advanced persistent threats from state based organizations are very possible and are happening every day. The theory of Stuxnet is the belief that this worm was created by a highly organized team, which was probably funded by a government, and its target was specific SCADA systems based in IRAN in attempts to stop its nuclear facilities. We should be aware of the possibility of more advanced types of cyber attacks in the near future and Stuxnet is a great example for us to prepare for future cyber conflicts. Throughout this paper, I will be covering about Stuxnet's discovery and evolution, the operation of the Stuxnet worm, events leading up and causing the Stuxnet program being created, and my personal analysis of this event. There are many resources from experts analyzing the Stuxnet event and program at which we can look to as guidance and knowledge about the most important worm in malware history.
STUXNET's Discovery and Evolution
As the timeline for Stuxnet is still being researched, we understand that the main Stuxnet code was discovered around June 2010, by a security com...
... middle of paper ...
...Stuxnet was like a marksman type of program by attacking systems only containing that important file and leaves systems without those programmable logic controllers unharmed. This is completely different to our usual internet malware that attacks all computers it infects, but damage in cost is vastly lower. I personally identify Stuxnet as an the highest level of cyber attacks as this is most likely as nationally funded project with attributes of being an advanced persistent threat until the target is found and destroyed. After Stuxnet, we still should be prepared of variations and evolutions of malware because of Stuxnet's successor, Flame, which carried similar codes that were contained in Stuxnet. I think Stuxnet is the first incident of possible cyber warfare and we should be preparing for the future where more cyber attacks like this could realistically happen.
For this final paper, I would like to discuss the historical failures that came into light when Mr. Clifford Stoll (the author of “Cuckoo’s Egg: Tracking a spy through the Maze of Computer Espionage” book) stumbled upon a $ 0.75 accounting error and the revelations that followed, its potential findings, risks and costs associated and why it is important to address and fix those security holes. Cuckoo’s Egg is an interesting read and the author was successful in presenting to his readers the picture of beginning of Internet days (arpanet, then), network practices then. Despite of the fact that this book describes a real incident that in 1980’s, some of the findings are relevant and torment us even today.
At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike. Terms such as “cyber Pearl Harbor,” “cyber 9/11” and “cyber Vietnam” have been used to describes potential catastrophic cyber attacks and yet, “Though many have posited notions on what a ‘real’ cyber war would be like, we lack the understanding of how such conflicts will be conducted and evolve.” (Rattray & Healey, 2010, p. 77). Yet, the U.S. government continues to focus on such events, as if the plausibility of small-scale cyber attacks were not as pressing.
Mandiant is an information security company which deals with the advanced threat detections and response solutions. It has investigated various computer security breaches, the major security breaches are attributed to advanced threat actors referred to as the “Advanced Persistent Threat” (APT). APT1 is one of the most prolific cyber espionage groups in China, it has stolen the large amount of confidential data from 141 organizations all over the world. This report was released on 18 February 2013, provided evidences of APT1 group identity, time line and details of attack infrastructure, economic espionage, commands, and its modus operandi.
The term “cyber terrorism” refers to the use of the Internet as a medium in which an attack can be launched such as hacking into electrical grids, security systems, and vital information networks. Over the past four decades, cyber terrorists have been using the Internet as an advanced communication tool in which to quickly spread and organize their members and resources. For instance, by using the instantaneous spread of information provided by the Internet, several terrorist’s groups have been able to quickly share information, coordinate attacks, spread propaganda, raise funds, and find new recruits for their cause. Instantaneous and unpredictable, the technological advantages these terrorists have obtained from using the Internet includes
26 Oct. 1962. GWU.edu. -. National Security Archives, 2002. Web. The Web.
Paisley. "The Impact of a Cyber War." Defense Tech RSS. N.p., 16 Jan. 2008. Web. 21 Nov. 2013. (Source H)
Society has become ever-increasingly dependent upon technology, more specifically, computers to conduct personal and business transactions and communications. Consequently, criminals have targeted these systems to conduct information and cyber warfare, which can include politically motivated attacks and to profit through ill-gotten means. In an article written by Koblentz and Mazanec (2013), cyber warfare is the act of disabling an enemy’s ability to use or obtain information, degrade its ability to make decisions, and to command its military forces. Additionally, information warfare is composed of cyber warfare and related to the protection, disruption, destruction, denial, or manipulation of information in order to gain a benefit through the technologies (Taddeo, 2012). Accordingly, as technology becomes readily available to various entities, the ability to conduct or perform warfare through technological means is multiplying.
When you think of the word virus's nuclear weapons does not usually come to mind, but, in 2009, engineers working for the U.S. government built the first virus to disrupt nuclear development in Iran. Stuxnet was developed in January 2009 in the form of a thumb drive to attack Iran's uranium plants. The Stuxnet virus is by far the most influential virus and changed the view cyber-attacks in the future.
In this globalized arena, with the proliferating computer users as well as computer networks, risks associated like Malware attacks are also multiplying. As the proverb
A cyber crime called 'Bot Networks', wherein spamsters and other perpetrators of cyber crimes remotely take control of computers without the users realizing it, is increasing at an alarming rate. Computers get linked to Bot Networks when users unknowingly download malicious codes such as Trojan horse sent as e-mail attachments. Such affected computers, known as zombies, can work together whenever the malicious code within them get activated, and those who are behind the Bot Networks attacks get the computing powers of thousands of systems at their disposal.
Ottis, R., Lorents, P., 2010. Cyberspace: Definition and Implications. Tallinn: Cooperative Cyber Defence Centre of Excellence, CCD CoE.
Consider what it would be like if computers that regulate subway systems, trains, planes, ships did not work properly. There could be multiple accidents with vehicles not following their course or not working because the computer systems that regulate them are not working. It could be disastrous.A cyber attack on our communication and transportation infrastructures could freeze our nation’s ability to do these things safely at the biggest levels. If these systems are attacked, the ability to use technology to talk and travel safely may not be possible. “...Because the nation’s grid has about 600 separate owners, and their computers are heavily interconnected with links that can carry both good data and malicious code, 100 percent protection against cyber attack is unlikely” (Wald). It is easy to take for granted the ability to get ahold of family and friends that live far away, or travel safely to work every day, but cyber attacks on computer systems that regulate telephone lines, computer data bases, subways, trains, and airplanes could be devastating to a huge number of people.
...ama, B. (2009, May). Remarks by the President on Securing Our Nation’s Cyber Infrastructure (President). Conducted at the East Room of the White House, Washington, DC. Retrieved from http://www.whitehouse.gov/the_press_office/Remarks-by-the-President-on-Securing-Our-Nations-Cyber-Infrastructure
Thomas, Teka. "Cyber defense: Who 's in charge?" National Defense July 2015: 21+. War and Terrorism Collection. Web. 28 Oct.
The Defense Department made an admission of the first major cyber attack upon its systems in August 2010. It was revealed that the attack actually took place in 2008 and was accomplished byplacing a malicious code into the flash drive of a U.S. military laptop. “The code spread undetected on both classified and unclassified systems, establishing what amounted to a digital breachhead.” (2) This quote , attributed to then Deputy Defense Secretary William J. Lynn III , is just part of the shocking revelations that were disclosed in his speech made on July 14, 2011. Lynn said that...