Beruflich Dokumente
Kultur Dokumente
Blog2
Sanger, David E; Mazzetti, Mark. New York Times, Late Edition (East Coast) [New York,
N.Y] 17 Feb 2016: A.5.
U.S. Drew Up Cyberattack Plan in case Iran Nuclear Dispute Led to Conflict
This article is about the cyberattack elaborate plan United Stated developed against Iran. The
main idea of this plan is to use computers to disable Irans air defenses, communications systems
and crucial of its power grid. Iran wanted to be in possession of nuclear industry, nations like
United States are against this idea because they think Iran may not use the nuclear program for
the good end but, they might use it for weapon, and this gives United States some worries. The
reason why United States developed Nitro Zeus, which had its roots in, the Bush administration
but took on new life in 2009 and 2010 with Obama administration. The goal of Nitro Zeus is to
penetrate adversary network, this would have required piercing and maintaining a presence in
vast number of Iranian network. It included the countrys air defenses and its transportation and
command control centers.
Blog3
Harichandran, Vikram S, Computers & Security. Mar2016, Vol. 57, p1-13. 13p.
Cyber/Digital Forensics
This article is about the number of successful cyber attacks that continues to increase. This has
effect on financial and personal security worldwide. Cyber/digital Forensics (which means a
process of uncovering and interpreting electronic data for usage in a court law) is insufficient to
convict a criminal residing in another legal jurisdiction. This article show that a better education,
training and certification, revised law and better communication especially between financial
institution and law enforcement should be necessary to make Cyber/digital forensics profitable
for the court law.
Blog4
Homeland Security Presidential Directive--7, Critical
Infrastructure Identification, Prioritization, and Protection.''
December 17, 2003.
In 2008, President Bush issued Homeland Security Presidential Directive 23 (HSPD-23) to
implement the Comprehensive National Cybersecurity Initiative, which mainly focused on the
protection of government network. In HSPD-23 The president mentioned that DHS has a
purpose to be the lead federal agency for the protection of all unclassified federal network and
for coordinating private sector cybersecurity efforts. Although considerable progress that had
been than, the Committee believes that the Department needs additional authorities that to be
more successful in these missions. This includes the Management and Budget relating to federal
information security for their most critical cyber infrastructure.
The NCCC (National Center for Cybersecurity and Communications) would then produce and
share warning analysis. It would collaborate with the private sector to develop and promote best
practices to help improve cybersecurity across the nation.
This would help NCCC to understand better threats and vulnerability the nation faces in
cyberspace. In this situation privacy and civil liberty protections will be respect.
Blog5
International Debates. Dec2011, Vol. 9 Issue 9, p10-13. 4p.
Computer hackers, Cyber Terrorism
This article is about cyber attack where the FBI reports that cyber-attacks attributed to terrorists
have mostly been limited to non sophisticated efforts such as emails and internet sites.
The FBI mentioned that terrorists will continue their investment in cyber-attack, reason why they
increasingly use internet to communicate and to make their plan.
The US information infrastructure and the potential harm that could be caused by a cyber attack
has shown some vulnerability according to Extensive media coverage.
For example, international financial systems network could be victim of cyber attacks and this
can create fiscal panic in the public that could lead to economic damage.
To prevent future cyber-attacks, a number of U.S. Government organizations appear to control
terrorist websites and to check variety of activities they can plan through internet.
Websites will be controlled and information they contain will be analyzed. All of those
precaution can help to prevent and stop Cyber-Terrorism.
Blog6
Hwang, J D. IT Professional1.1, Cybertterrorism
Help for cyberterrorism: Y2K's silver lining
The worldwide nowadays is one of the faster way to exchange information all over the world.
It helped a lot with the evolution of the technology. We are using it for good purpose. But the
question is: do everybody use it with the good intention it supposed to be?
This article is about the problems we are face concerning the
worldwide. We are now witnessing the global mobilization to
conquer the Y2K problem. To stop the Y2K problem. IT
departments all over the World have the idea to analyze in
depth terrorists computer. Software, hardware and
applications have been created to ensure continuity of
operations even if Y2K bugs persist and cause error. We all
need to consider that the terrorism through computer is a serious threat and we have to struggle
to stop it, because it can disrupt critical infrastructure.
Blog7
Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, 13 November 2013
A Relational jurisdiction for Cyber terrorism
The progress and development in computer technology has provided new opportunities to the
humanity. This progress helps us to resolve problem very fast and to accomplish some tasks
more easily. At the same time some people are using the internet for criminal activities and that
poses legal challenges for legal systems as well as for law enforcement.
The article is showing that cyber terrorism is occurring now in multiple States and the procedure
to stop this terrorism is not easy task. Therefore, nations are coming up with self-regulatory
mechanisms to combat against the misuse of new technologies. However international
agreements and appropriate legislation need to support such mechanisms.
Many steps have been taken to combat cyber terrorism in legal or technical way but is not
sufficient to prevent cyber terrorism.
To reduce this cyber terrorism different states have adopted type of different jurisdiction.
This jurisdiction will the applied according to each state or countries.
Blog8
Verton, Dan. Computerworld36.52 (Dec 23, 2002)
Bush's Cybersecurity plan falls short, report says
This Article is about President Bushs cybersecurity plan falls short in which congressional
appointed panel delivered a report to president Bush calling the federal governments incessant
focus on public/private partnerships to improve cybersecurity an inadequate solution.
Leap of faith, the report also faulted the administrations plan because it relies on private-sector
willingness to take certain security measures and bear their costs and chooses not to use
government power to legislate, regulate or otherwise require certain actions. According to the
report, the government has not to take any action toward companies on cybersecurity issues.
Glimore said: Pure public/private partnerships and market forces are not acting at this point to
Blog9
This article examines cyberterrorism and its potential to create a postmodern state of chaos.
In general, chaos means a state of extreme confusion and disorder.
Chaos theory in this analysis is described as a foundation for better understanding cyberterrorism
and explains how chaos theory and game theory are closely coupled.
This comparison serves as the basis for making the point that cyberterrorism is not threedimensional, it is not analog, and it exposes actors of cyberspace to new concepts of time and
space.
This paper brings a philosophical outlook to the association postmodernism and the evolving
face of terrorism while most of the literature on the subject is technical and political.
This article begins with a careful description of cyberterrorism, which refers to attacks conducted
against computers, networks, and systems.
There is a difference between cyberterrorism and simple hacking.
Blog10
Senators Decry DOJ Stance on Surveillance ; Carlson, Caron,16 Sept. 2002
Judiciary panel members rap interpretation of new wiretap powers, secrecy.
Blog11
Computers & Security, Dr Chris Pounder Volume 22, Issue 3, April 2003, Pages 207211
Governments act to improve Security