Sie sind auf Seite 1von 7

Blog1

Ukraine to probe suspected Russian cyber attack on grid


Pavel Polityuk
According to the article, it discusses about the Cyber-attack on December 23, 2015, that hit the
western part of Ukraine and provides a lesson for Ukrainian Power Providers for the future. The
article talks about two Power companies affected by the outage recovered and officials from the
power companies found that attack on their information systems was responsible for the outages.
Someone made intrusion in the system and brought down a power true the computer. Everything
is control by computer. Nowadays many industries are working under ICS (Industrial control
system), this is an automated process controlled by algorithm that is running on computer. If
somebody or a hacker can make an intrusion in the industrys computer system, this person can
cause lot of damages.
Let us imagine a nuclear center that is hacked, the consequence will be very harmful and
horrible.

Blog2
Sanger, David E; Mazzetti, Mark. New York Times, Late Edition (East Coast) [New York,
N.Y] 17 Feb 2016: A.5.
U.S. Drew Up Cyberattack Plan in case Iran Nuclear Dispute Led to Conflict
This article is about the cyberattack elaborate plan United Stated developed against Iran. The
main idea of this plan is to use computers to disable Irans air defenses, communications systems
and crucial of its power grid. Iran wanted to be in possession of nuclear industry, nations like
United States are against this idea because they think Iran may not use the nuclear program for
the good end but, they might use it for weapon, and this gives United States some worries. The
reason why United States developed Nitro Zeus, which had its roots in, the Bush administration
but took on new life in 2009 and 2010 with Obama administration. The goal of Nitro Zeus is to
penetrate adversary network, this would have required piercing and maintaining a presence in
vast number of Iranian network. It included the countrys air defenses and its transportation and
command control centers.

Blog3
Harichandran, Vikram S, Computers & Security. Mar2016, Vol. 57, p1-13. 13p.
Cyber/Digital Forensics
This article is about the number of successful cyber attacks that continues to increase. This has
effect on financial and personal security worldwide. Cyber/digital Forensics (which means a
process of uncovering and interpreting electronic data for usage in a court law) is insufficient to
convict a criminal residing in another legal jurisdiction. This article show that a better education,
training and certification, revised law and better communication especially between financial
institution and law enforcement should be necessary to make Cyber/digital forensics profitable
for the court law.

Blog4
Homeland Security Presidential Directive--7, Critical
Infrastructure Identification, Prioritization, and Protection.''
December 17, 2003.
In 2008, President Bush issued Homeland Security Presidential Directive 23 (HSPD-23) to
implement the Comprehensive National Cybersecurity Initiative, which mainly focused on the
protection of government network. In HSPD-23 The president mentioned that DHS has a
purpose to be the lead federal agency for the protection of all unclassified federal network and
for coordinating private sector cybersecurity efforts. Although considerable progress that had
been than, the Committee believes that the Department needs additional authorities that to be
more successful in these missions. This includes the Management and Budget relating to federal
information security for their most critical cyber infrastructure.
The NCCC (National Center for Cybersecurity and Communications) would then produce and
share warning analysis. It would collaborate with the private sector to develop and promote best
practices to help improve cybersecurity across the nation.
This would help NCCC to understand better threats and vulnerability the nation faces in
cyberspace. In this situation privacy and civil liberty protections will be respect.

Blog5
International Debates. Dec2011, Vol. 9 Issue 9, p10-13. 4p.
Computer hackers, Cyber Terrorism
This article is about cyber attack where the FBI reports that cyber-attacks attributed to terrorists
have mostly been limited to non sophisticated efforts such as emails and internet sites.
The FBI mentioned that terrorists will continue their investment in cyber-attack, reason why they
increasingly use internet to communicate and to make their plan.
The US information infrastructure and the potential harm that could be caused by a cyber attack
has shown some vulnerability according to Extensive media coverage.
For example, international financial systems network could be victim of cyber attacks and this
can create fiscal panic in the public that could lead to economic damage.
To prevent future cyber-attacks, a number of U.S. Government organizations appear to control
terrorist websites and to check variety of activities they can plan through internet.
Websites will be controlled and information they contain will be analyzed. All of those
precaution can help to prevent and stop Cyber-Terrorism.

Blog6
Hwang, J D. IT Professional1.1, Cybertterrorism
Help for cyberterrorism: Y2K's silver lining
The worldwide nowadays is one of the faster way to exchange information all over the world.
It helped a lot with the evolution of the technology. We are using it for good purpose. But the
question is: do everybody use it with the good intention it supposed to be?
This article is about the problems we are face concerning the
worldwide. We are now witnessing the global mobilization to
conquer the Y2K problem. To stop the Y2K problem. IT
departments all over the World have the idea to analyze in
depth terrorists computer. Software, hardware and
applications have been created to ensure continuity of
operations even if Y2K bugs persist and cause error. We all
need to consider that the terrorism through computer is a serious threat and we have to struggle
to stop it, because it can disrupt critical infrastructure.

Blog7
Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, 13 November 2013
A Relational jurisdiction for Cyber terrorism
The progress and development in computer technology has provided new opportunities to the
humanity. This progress helps us to resolve problem very fast and to accomplish some tasks
more easily. At the same time some people are using the internet for criminal activities and that
poses legal challenges for legal systems as well as for law enforcement.
The article is showing that cyber terrorism is occurring now in multiple States and the procedure
to stop this terrorism is not easy task. Therefore, nations are coming up with self-regulatory
mechanisms to combat against the misuse of new technologies. However international
agreements and appropriate legislation need to support such mechanisms.
Many steps have been taken to combat cyber terrorism in legal or technical way but is not
sufficient to prevent cyber terrorism.
To reduce this cyber terrorism different states have adopted type of different jurisdiction.
This jurisdiction will the applied according to each state or countries.

Blog8
Verton, Dan. Computerworld36.52 (Dec 23, 2002)
Bush's Cybersecurity plan falls short, report says
This Article is about President Bushs cybersecurity plan falls short in which congressional
appointed panel delivered a report to president Bush calling the federal governments incessant
focus on public/private partnerships to improve cybersecurity an inadequate solution.
Leap of faith, the report also faulted the administrations plan because it relies on private-sector
willingness to take certain security measures and bear their costs and chooses not to use
government power to legislate, regulate or otherwise require certain actions. According to the
report, the government has not to take any action toward companies on cybersecurity issues.
Glimore said: Pure public/private partnerships and market forces are not acting at this point to

protect the cyber community.


The government is also criticized by the panel for separating
cybersecurity from the physical aspects of critical infrastructure
protection and for failing to hold agency heads responsible for
internal cybersecurity lapses.
The report also claimed that: There are little or no
consequences for federal government agencies and official who
do not take prudent steps to improve cybersecurity.
To finish, according to Clarke, there are legitimate concerns that impose regulating corporate
approaches to cybersecurity, including the ability to create homogeneous security architecture
thats easier to attack.

Blog9

Information Security Journal: A Global Perspective.,Matusitz, Jonathan Jul2008, Vol. 17 Issue 4,


p179-187. 9p.
Cyberterrorism Postmodern State of Chaos

This article examines cyberterrorism and its potential to create a postmodern state of chaos.
In general, chaos means a state of extreme confusion and disorder.
Chaos theory in this analysis is described as a foundation for better understanding cyberterrorism
and explains how chaos theory and game theory are closely coupled.
This comparison serves as the basis for making the point that cyberterrorism is not threedimensional, it is not analog, and it exposes actors of cyberspace to new concepts of time and
space.
This paper brings a philosophical outlook to the association postmodernism and the evolving
face of terrorism while most of the literature on the subject is technical and political.
This article begins with a careful description of cyberterrorism, which refers to attacks conducted
against computers, networks, and systems.
There is a difference between cyberterrorism and simple hacking.

Blog10
Senators Decry DOJ Stance on Surveillance ; Carlson, Caron,16 Sept. 2002
Judiciary panel members rap interpretation of new wiretap powers, secrecy.

This article is about Senators charged with overseeing the


Department of Justice lambasted the agency for overstepping
expanded wiretap powers that were granted in the wake of
Sep 11, 2001, terrorist attacks. Expanded wiretap powers
affect not only the balance between individual rights and
government authority but also the potential burden imposed
on network operators.
The expanded powers pertain to the Foreign Intelligence
Surveillance Act, or FISA, which exempts foreign intelligence gathering from the probable-cause
requirements and privacy protections that govern wiretaps conducted for criminal prosecutions.
Previously, the FBI and other agencies could use the more lenient FISA standard for
investigations when the purpose was foreign intelligence gathering, but the USA Patriot Act gave
the government greater latitude to use the standard.
Calling the governments interpretation Ridiculous, Sen. Arlen Specter, R-Pa, said the FBI and
Justice Department are subverting the purpose of the foreign intelligence surveillance laws.
Sen. Richard Durbin, D-III, noted that the FISA court determined that the government misled it
dozens of times and that the FBI improperly shared intelligence with prosecutors.
According to Durbin he said: We were asked to show faith in this government and invest it with
new authorities.
Democrats and Republicans alike deplored the extensive secrecy surrounding the interpretation
and implementation of the surveillance laws.

Blog11

Computers & Security, Dr Chris Pounder Volume 22, Issue 3, April 2003, Pages 207211
Governments act to improve Security

This article reviews the final version of The National


Strategy to Secure Cyberspace. The article is showing
that US should maintain continuity of IT infrastructure
and systems which could be disrupted by terrorist
activity.
Usually IT security is not something which attracts the
governments attention because an organization which
did not keeps its information assets secure would
quickly go out of the business and lose the trust of its
customers. Since the September 11th terrorists attack, governments saw little reason to legislate
in the field of security because market forces and self-interest would mean that IT security
objectives should be realized.
The destruction of the World Trade Center push government to realize that terrorists attacks in
cyber world will be also very catastrophic. For example, in financial center of a city.
Therefore, US government take action to protect its IT infrastructure environment, because
internet is accessible by anyone. Terrorists might want to use the internet to harm the USs
critical infrastructure.
The public utilities like: gas, electricity and water are some area that need protection.
In summary, the overview of this article show that in Cyberspace, there are lot of infrastructure
that could be attacked and they need to be protected.

Das könnte Ihnen auch gefallen