Preview

Cyber Attacks

Good Essays
Open Document
Open Document
644 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Attacks
The rising threat of terrorism has led to unprecedented levels of security at Indian airports, railway stations, hotels, ports etc. But the government does not seem to see the bigger threat, which will not come from AK-47s, bombs and rifles. The next big attack will be come from terrorists in the cyber world.

We live in a technologically interconnected world. Most of us cannot imagine even a single day without our cell phones, internet and ATMs. There is hardly any distinction between where our bodies end and technology begins. Would it be surprising then, if terrorists choose to attack India via the internet?

Let me share some facts about how real and damaging that threat can be If a terrorist group were to attack our stock market and financial infrastructure, it would cause widespread panic and losses to millions of people and organizations. Imagine yourself running helplessly from one ATM to another, trying to withdraw money from your account, only to find that the attack has forced banks to suspend online transactions.

Likewise, our telecom infrastructure. If it were flooded with malicious data, business and personal life would grind to a standstill. Terrorists could also target India's top businesses, hacking into their systems, stealing valuable intellectual property, sensitive information and company secrets. Even military networks can be targeted.

These scenarios are not from a Bollywood flick, but tangible threats that loom large. In May 2007, Estonia — a small but technologically sophisticated Baltic country — fell victim to a cyber attack. The unidentified terrorists bombarded the country's network with data traffic, clogging it and rendering major services unusable. People were not able to access financial utilities, communications and data services for several hours and some, for days together. What stops cyber terrorists from launching similar attacks in India?

Very little because, despite being an infotech power, India lags on cyber

You May Also Find These Documents Helpful

  • Powerful Essays

    Jackson, Brian A. and David R. Frelinger. Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About? Washington, DC: RAND Corporation, 2009.…

    • 17193 Words
    • 69 Pages
    Powerful Essays
  • Satisfactory Essays

    AL Week 2 DIS 1 1

    • 379 Words
    • 2 Pages

    I have to say when you look at the past few decades are nation did not have the technology, man power and the resource that we have today. In doing so “The Department of Homeland Security (DHS) has wrestled with a variety of significant challenges, including coordinating across 22 preexisting agencies, reporting to a multitude of congressional committees, and interacting with the U.S. public in a manner that constantly tests the balance between security and privacy”. “Some have questioned and pointed out these challenges of evidence to Homeland Security that maybe they are dysfunctional of a department which is unable to effectively protect the nation”. When looking at this ever since the United States have been working constantly to help make Homeland Security better The Department of Homeland Security shows that there were no major attacks on American soil recently. After 9/11 the nation has grown stronger and the technology improves every day. In doing so “DHS must find ways to increase the nation’s defenses against cyberattacks, establish enhanced systems for secure screening and credentialing, and improve intelligence and information sharing, in all while operating in a constrained fiscal environment”. As we grow as a nation and the technology gets better every year we will have the knowledge so that hopefully we can get an edge on the terrorist. The bottom line is that when you look at this the terrorist is always one step…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Patting Down the TSA

    • 2182 Words
    • 9 Pages

    It is not just an attack by terrorists we should worry about; we have a massive transportation system that can go virtually anywhere. There are hundreds of thousands of people that are…

    • 2182 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    Better technology and training to detect terrorist are important steps to reduce terrorist attacks. To achieve this objective, government must authorize national and local leaders to design programs, training, and funding. Thus, high priority should be given to developing programs to detect and prevent intended attacks before they occur.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In modern terrorism, there are six tactics of terrorism including bombing, hijacking, arson, assault, kidnapping, and hostage taking. However, over the past four decades, the weaponry of terrorism has developed to include coercions from weapons of mass destruction. At the same time, threats from terrorism have expanded into the virtual world (Internet), where attacks made by cyber terrorists has become just as effective and damaging as physical attacks. For example, a terrorist who can hack into a city’s power grid system and shut it down is able to create as much fear and panic as a bomb. While the six tactics of terrorism can create a vast amount of destruction and chaos, terrorists can also use the concept of multiplying force to enhance the impact of their actions even further.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Since the successful attacks by planned by Osama Bin Laden, and carried out by Al Qaeda terrorists, the United States of America has implemented new strategies to thwart efforts by terrorist to achieve another successful attack on US soil. Along with the new Global War on Terrorism, came new laws, different executive orders, and the implementation of the Department of Homeland Security to combat terrorism and to strengthen the nation's national security. According to James Carafano and Jessica Zuckerman, “There is little doubt that the United States is safer than it was on September 10, 2001—at least 40 terror plots against the U.S. have been foiled since 9/11—but the war on terrorism is not yet won” (Carafano and Zuckerman 2011, par.2). After many successes, at least 40 foiled plots said by Carafano and Zuckerman, the United States has monitored and compiled a list of suspected terrorist organizations both foreign and domestic. However, the US has recently began to slow down their efforts in national security interest. Under the leadership of the Obama Administration, there have been many defense cuts, a refusal to secure US borders, and a foreign policy that has caused more instability in the Middle East than ever before. This has given rise to more hatred for the hegemonic United States government by Islamic extremists, and has left the United States susceptible to three major types of terrorist attacks that are likely to occur on American soil.…

    • 4244 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    There are some issues that United States governments (both state and federal) take more seriously than the others. Security matters are always given priority in the United States of America because there are many disgruntled parties who would like to see the sovereignty and unity of this nation go down the drain. The most recent security concern being talked about is cyber security. This is because since the development of the internet the world has become prone to a new kind of danger; cyber terrorism. Information technology has brought many positive things. We can now communicate with each other on a global scale. Business meetings no longer have to be in the same room to be face to face. There is a whole new social existence online. And new developments are happening constantly.…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    “The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Homeland Security

    • 3491 Words
    • 14 Pages

    The security of the United States and living without being under a constant threat should be very important to all citizens and those who visit this country. The research revealed some interesting facts, it is impossible to secure every commercial building, airport, bridge, bypass, and government building. One element of the security is that terrorists will not have the ability to attack every place in the United States. However, everything is a possible target and terrorists want to do as damage as possible and cause the greatest amount of disruption in our way of life as possible.…

    • 3491 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Terrorism is one of the most remembered and feared occurrences in the world. Terrorism changes the lives and hearts of everyone that it affects. This paper explores the different types of terrorism, who commits the acts, how it affects the surrounding world, and what can be done to prevent it. This review of the different types of terrorism focuses primarily on the specific types of terrorism. This paper then tries to relay to the reader the understanding of all types, and the differences between them.…

    • 1251 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Americans are becoming more and more codependent on technology. The vast majority of homes in the United States have at least one home personal computer (PC) that is connected to the internet. Americans have gotten accustom to being able to access the internet from their homes. Banking, social media, video teleconferencing and business ventures are all examples of how the internet is being used. The availability of the internet and computers in homes have simplified lives in the United States, however this allows cyber-terrorist to have direct access to the most personal of information. Much like the attacks that took place on September 11th the average American is completely unaware of the vulnerabilities that lye waiting around every corner of cyberspace. Cyber-terrorism not only affects individuals, it can also affect the entire nation. The United States critical infrastructures are becoming more dependent on computer networks for there operations. If security is not stepped up terrorist may be able to disrupt or shut down critical support systems. Americans and American companies must educate themselves on the vulnerabilities that cyber-terrorism presents and begin to work toward securing our networks in the same manner as we do our borders.…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Homeland Security

    • 997 Words
    • 4 Pages

    When we pause to think about all that has happened in years past, we truly are lucky. The purpose of this paper is to define and give detailed information about Homeland Security in the United States. I hope to inform people as to why we constantly live in fear. I will give detailed information about what the government is doing to solve this problem. Also I will give possible solutions to our current predicament, based on extensive research and knowledge.…

    • 997 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    The United States safety and wellbeing relies on a resilient critical infrastructure, which is the assets, systems and networks that underpin American society. There are three different categories of threats. Natural threats, human- cause and accidental/technical threat. “Natural threats include weather problems in both hot and cold climates and also geological hazards like earthquakes, tsunamis, 18 International Journal of Control and Automation land shifting and volcanic eruption.” (Robles, Choi, Cho, Kim, G Park, Lee) The human caused threats are referred to as terrorism. “This may include cyber-attacks, rioting, product tampering, explosions and bombing.” (Robles, Choi, Cho, Kim, G Park, Lee) Technological threats are completely different;…

    • 887 Words
    • 4 Pages
    Good Essays