Preview

An Overview Of Cyber Attack

Powerful Essays
Open Document
Open Document
7324 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Overview Of Cyber Attack
An Overview of Cyber Attack and Computer Network Operations Simulation
Ian Chapman,
Mélanie Bernier
Centre for Operational Research and Analysis
Defence Research and Development Canada
Ian.Chapman@drdc-rddc.gc.ca
Melanie.Bernier@drdc-rddc.gc.ca

Sylvain P. Leblanc,
Andrew Partington
Computer Security Laboratory
Royal Military College of Canada
Sylvain.Leblanc@rmc.ca

Keywords: Overview, Survey Paper, Cyber Attacks, Cyber
Warfare, Computer Network Operations

Cyber attacks have the potential to be extremely disruptive to a wired society. To understand some of the ramifications of these events, including their potential impact on the use of networks, the research community has begun the development of a number of applications to simulate cyber warfare. The paper is separated in two main sections. The first part will discuss prominent private sector and academic research, while the second will discuss public sector research in the field of modeling and simulation for cyber warfare. This paper is intended to present the results of our survey of current unclassified research literature, openly published on the topic of simulation for cyber warfare. It is not meant to be all encompassing. The authors have not found other works that attempt to summarize key efforts in this area of study.
The authors believe that simulation will make ever greater contributions to the field of cyber warfare and CNO.
This paper and the Military Modeling Symposium that flow from it should be viewed as an attempt to engage the research community on this important emerging topic.

Abstract
This paper represents a snapshot of the current state of the art in the simulation and modeling of cyber attacks and defensive responses to those. It discusses a number of simulations of cyber warfare, including live, virtual, and constructive simulations. The simulations discussed in this paper were found in the open literature and were conducted in the private sector, academia, and government. Each



References: Attacks and Simulation of their Effects" Proceedings of the 2010 Military Modeling and Simulation Symposium (MMS '11), (2011). 1180-1188). http://www.informs-sim.org/wsc07papers/139.pdf. Sakhardande, R. R. (2008). The use of modeling and simulation to examine network performance under denial of service attacks.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab, you implemented a portion of your organization’s BCP. Based on the BIA, the…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    First and for most this process I found out seems like a whole lot of hassle so I don’t understand why people would do this and just get caught in the end. But I will be listing 5 general phases of a computer attack that one would have to go through to be successful in other words jumping through hoops that are on fire.…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Once you have enough information to understand how the target works and what information of value might be available, you begin the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When I think of a cyber threat I am thinking of planes falling. Some new and deadly dieses like the T-virus. All the money in the USA will be worthless. I believe this will be a land of confusion, if we have a cyber-attack. Do we have a plan for a cyber terrorism?…

    • 422 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cyber Security

    • 368 Words
    • 2 Pages

    I have a multitude of passwords to memorize in an effort to maintain my privacy and security. It is unfortunate that cyber world users must constantly deploy measures to keep their personal information private. Before this class I was certainly aware of the potential dangers that could occur in cyberspace, prevention always has been my goal. I have security protection in place against attacks such as viruses, spam, malware, spyware, and adware and I ensure that the protection is up-to-date as it is essential part of prevention is to remain current. Other security measures an average user may do is to maintain their system is to allow Microsoft Windows to perform automatic updates. These updates can provide additional security measures to the system info structure. Running regular maintenance such as a system defragmentation will keep the system up-to-date and in proper order. The average user should also password protect their personal information. If the wireless network James used had been password protected James would not have had the opportunity to enter the network without first inputting the password.. I would feel violated to know that someone was using my wireless network without my authorization I would be horrified to know that individual was plundering through my private things. Securing a personal computer and a wireless network with a password is extremely important otherwise the system is open and vulnerable toward an attack. Furthermore, James was placing himself at risk by entering an unknown unsecured network. When I review the network settings on my wireless network I am able to view data, websites and activity going through my network. I enjoy this feature because I am able to see what my children are doing when they are online. I teach my boys how to protect themselves while online. In the future I plan to remain aware of any potential treats and I will review any new…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hansen, L. & Nissenbaum, H. (2009). Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, 53, 1155–1175.…

    • 2781 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Cyber war Vs Cyber terrorism

    • 3714 Words
    • 13 Pages

    In this time and era, we have witnessed the emergence of electronic resources as the most important development of the modern day communication system. Technologies such as cellular phones, home computers, the internet and websites have added another dimension to the way we live our lives today. This presentation seeks to address and analyse the negative and positive aspects in view of the introduction of computers and telecommunications techniques as follows: Firstly, it raises awareness with regard to the new age of crimes, termed as cyber crimes. The paper focuses, in particular, on the difference between the two common types of cyber crimes, cyber war and cyber terrorism. Secondly, the paper examines the limitations and impact of having graduates through e-learning. Thirdly and lastly, the paper discusses on whether computer practitioners should be required to have a practicing license as it is with other professionals such as doctors, lawyers and teachers.…

    • 3714 Words
    • 13 Pages
    Good Essays
  • Powerful Essays

    Web Spoofing is Tricking Someone into visiting a Website other than one they intend to visit, by creating a similar website. Web Spoofing is a Phishing Scheme. Nearly every aspect of social, government, and commercial activity is moving into electronic settings. The World Wide Web is the de facto standard medium for these services. Inherent properties of the physical world make it sufficiently difficult to forge a convincing storefront or ATM that successful attacks create long-cited anecdotes. As a consequence, users of physical services stores, banks, newspapers have developed a reasonably effective intuition of when to trust that a particular service offering is exactly what it appears to be. However, moving from “bricks and mortar” to electronic introduces a fundamental new problem: bits are malleable.…

    • 2365 Words
    • 10 Pages
    Powerful Essays