Cyberterrorism: Weapons of Mass Annoyance
11/8/2012
Outline:
I. Introduction a. Define Cyberterrorism II. Types of Cyber Attacks b. Identify and give examples of: i. Trojan horse ii. Virus iii. Worm iv. Phishing v. Denial of Service (DoS) c. Three Levels of Cyber Capability vi. Simple-Unstructured vii. Advanced-Structured viii. Complex-Coordinated III. Potential Threats of Cyberterrorism d. Dams Used for Water Storage of Power Generation e. Reliance on Digital ix. Increased DoS Attacks IV. Conclusion V. Works Cited
Introduction
The term cyberterrorism was created in the mid 90’s by combining cyberspace and terrorism. The term has been widely accepted after being embraced by the United State Intelligence Community. Janczewski and Colarik describe cyberterrorism as “Premeditated, politically motivated attacks by subnational groups, clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combat targets” (Janczewski & Colarik, 2005, p. 43).
Cyberterrorism is a form of terrorism that uses any form of connected source to engage in attacks of information systems, incitement to violence, theft of data, and planning of terrorist attacks (Britz, 2011, p. 197). As an introduction into the topic, the following definition is key to understanding the definition:
“Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coercer a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate
Cited: Baranetsky, V. (2009, November 5). What is Cyberterrorism. Harvard Law Record . Blau, J. (2004, November 29). The Battle Against Cyberterror. Retrieved November 2012, from Network World: http://www.networkworld.com/supp/2004/cybercrime/112904terror.html Britz, M Cole, S., & Glasser, S. (2009). The Internet Helps Promote Terrorism. In L. Gerdes (Ed.), Cyber Crime (pp. 95-103). Farmington Hills, MI, US: Greenhaven Press. Denning, D. (2000, May 23). Cyberterrorism. georgetown.edu. Retrieved October 28, 2012, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html Denning, D Gohring, N. (2009). Vigilantism Motiveates Some to Violate Cyber Laws. In L. Gerdes (Ed.), Cyber Crime (pp. 86-90). Farmington Hills, MI: Greenhaven Press. Goldman, D. (2012, September 28). Major Banks Hit With Biggest Cyberattack in History. CNN Money . Gross, G. (2003, November 5). ComputerWorld. Retrieved October 29, 2012, from computerworld.com: http://www.computerworld.com/s/article/86857/Cyberterrorist_attack_would_be_more_sophisticated_than_past_worms_expert_says_ Janczewski, L., & Colarik, A Kuehl, D. (2012, November). Cyber Threats. Class Lecture . Lewis, J. (2002, December). Assessing the Risks of Cyber Terrorism, Cyber War and Othe Cyber Threats. Center for Strategic & International Studies , p. 12. Washkuch, F. (2009). What Factors Contribute to Cyber Crime? In L. Gerdes (Ed.), Cyber Crime (pp. 79-85). Farmington Hills, MI, US: Greenhaven Press.