SlideShare a Scribd company logo
IS 3868 Nicole Gaehle
Assignment 1
Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism
“Cyberwarfare isquicklybecomingthe methodof warfare andthe tool of militarystrategies.
Additionally,ithasbecome atool forgovernmentstoaidor exploitfortheirownpersonal benefits.For
cyberterroriststhere hasbeenan overwhelminglyabundance of new toolsandtechnologiesavailable
that have allowedcriminalactsto occur virtuallyanywhere inthe world.” (Dawson&Omar,2015) As
technologygrowsimmenselyandrapidlyfastthe worldwide webbecomeslarger. Whenthisoccurs
thisallowsforvulnerabilitiestogrowinthe networkingof the webaswell asthroughnew technologies
that have beenadvancingaswell.These new technologieswouldactuallybecomeatool foranyone to
use includingthe governmenttoaidtheircountryor exploitothercountriestotheirownadvantage.
Whenyouthinkof a tool you maythinkof householdtools.However,thatisnotthe case at thistime.
The toolsconsistof mobile devices,digitalcurrencysoftware,cyberespionage andsecrecy,alongwith
lawsand policiestocombatterrorism.
As we are aware of the toolsthat can be usedwe needtobe aware of what can happen.
“Attackscan be initiatedfromanywhere inthe worldfrombehindacomputerwithamaskedInternet
Protocol (IP) address.Thistype of warfare,cyberwarfare,changesthe landscape of waritself.Thistype
of warfare removesthe needtohave aphysicallycapable militaryandrequiresthe demandforaforce
that has a strongtechnical capacitye.g.computerscience skills.”(Dawson&Omar,2015) We have a
total of 195 countriesinthe world.Thismeansthat we couldhave a Chinese attacker,Japanese
attacker,Americanattacker,Spanishattacked,Britainattacker,Africaattacker,orany othercountry
that youcan thinkof.Whenyoutake intoinconsiderationthatanattacker can be anywhere inthe world
thenyou(as a governmentofficial)wouldwanttoconsidermanyprocessesandstepstotake.
PersonallyIwouldwanttoensure ourgovernment andcountryissafe byadvancingour ownpersonal
securitymeasuresinmultiplestates.Thiscaninclude entitiesinWashingtonD.C.,StLouisMO,San
DiegoCA,DallasTX, or anyother cityand state.It wouldbe asif we as a countrywere underattack by
anothercountryon our ownUS soil.However,thismeansthatwe maybe attackedon ownsoil but the
attackercan be on Britainsoil.“These attackshelpleadtorapiddevelopmentof cyberdefense
organizationsthroughoutEurope whichhasraisedthe profile of cyber-attackstoincludeawarenessto
the potential severityof attacks.”(Dawson&Omar, 2015) WhetheritisJapan attackingPeruor U.S.
attackingJapan,a countrylike Europe (inthiscase) wouldwanttodeveloporganizationsrapidlytobe
able to prepare forany possibilitiesthattheymaybe attackedor wouldneedtoattack someone else.
No matterwhatcountry youconsider,all 195 of themneedtohave a defense organizationtowatchout
for maliciousattacksdone tothemthroughthe cyberworld.Attackscan be done viamobile networks.
Mobile networksare anetworkinwhichusesa data service onthe go usingcellulardevicesor
mobile devicessuchasiPadsandothertablets. “Thusthe importance of securityinmobile networkingis
essential tomaintainingsecurityandprivacyforeverydaycitizens.” (Dawson&Omar,2015) We as
citizensonthe go relyonour mobile carrierstohave such securityintheirdatabasestoensure we can
utilize ourdataas needed.Ifindthatthe securityinmobile networkingisveryimportantbecause how
am I supposedtoknowif a website wouldharmmymobile device. Mymobile device couldbe atablet,
laptop,cell phone,orevenakindle.“Manyindividualsrely ontheirmobiledevicesfortexting,checking
email,makingonline purchases,andevenremote controllingtheirhome alarmsystem.” (Dawson&
Omar, 2015) As a cellulardevice user,Iuse myphone heavilyfortexting,emailing, andevenplaying
IS 3868 Nicole Gaehle
games.I sometimesuse mycell phoneformakingpurchasesbutheavilyrelyonmymobile personal
computer(laptop) tomake purchases.Manycollege level studentsandcorporate executivescarrya cell
phone anda laptopforeverydayuse. Yes,Iam a college studentbutif Iwas a corporate executive it
wouldbe worse thanwhat itis already.Isaythis because if Iwas bothI wouldhave twolaptopsanda
couple of cell phonesonme at all times.“Understandingthe HumanComputerInteraction (HCI) and
behavioral issueswithmobile devicesisastart inunderstandinghumanpitfallsinsecurity.” (Dawson&
Omar, 2015) What the authors are sayinghere isthat everyone needstounderstandthatwe are all
humanand a simple mistake canoccur.Eventhougha single humaninteractswithacomputertohelp
manage cyber-attacksona mobile networkdoesn’tmeanthateverythinghasbeentouchedon.So
technicallyspeakingavulnerabilitycouldbe there thatthe personisnotaware of until a malicious
attack happensonthe mobile network.Otherthanthe mobile networkattackscan alsohappenon
digital currency.
Digital currencyiswhere a transactionisdone ultimatelybywebbetweentwophysical
accounts.“Digital currency has become anew commerce that isgrowlyquicklyandgainingthe attention
of large financial institutions.”(Dawson&Omar,2015) As financial institutionsgrow,consumers
demandtobe able totransfermoneyfromone bank accountto anotherin sucha quickmethod.This
methodhasbecome a part of digital currency.The infrastructure hastobe setto such highdemandsto
meetsucha newcommerce thatison the rise.“The technical infrastructureof thisdecentralizeddigital
currencyreliesonseveral cryptographictechnologies.” (Dawson&Omar,2015) Financial institutions
alreadyhave tohave a highstandardsetfor the infrastructure due tothe multiple consumersthatutilize
themto banktheirmoneyandprotect itfromthieves.However,the thievesthe consumersthinkthey
are protectingfromare the onesthat come in to someone’shouse/carphysicallyorgetintotheir
personal mail.Inregardstothis,the financial institutionshave tobuildtheirinfrastructure withmore
detailsandlevelsof securitytobe able tomake the consumerhappy.Onthe otherhand,the consumers
don’trealize thateventhoughtheirmoneyisinasafe place and theycan easilyhitthe transferbutton
online doesn’tmeanthattheycan keepawayfromcurrencybeingtakenfromthem.“Furthercyber
criminalscouldstore stolendigital fundsonany device thatcanbe usedasstorage.This couldpose a
threatas laundered,stolen,orself-generatedfundscanbe takenanywhere onastorage device suchas
a micro Secure Digital (SD) thatcan holdup to 64 gigabytes(GB).”(Dawson&Omar,2015) Cyber-attacks
can happento those individualsusingacell phone orcomputertotransferfundsfromone account to
another.The attack on such devicescangainvital informationforbothaccounts(whichbank,routing
number,andaccount number) andstore those onsome kindof card to be utilizedsomewhere else.
Most thinkthiscouldbe calledidentitytheft(whichcouldbe the case) butitreallyisnot.It’sjusta
simple bugtothe attacker to be able to gainsuch information.Thismaybe consideredcyberwarfare
howeverthiscouldalsobe underCyberEspionage andSecrecy.
“Cyberespionage orcyberspyingisyetanothermethodof cyberwarfare.Thismethodallows
for the abilitytoobtainsecretswithoutthe permissionof the dataowner.The rise incyberespionage is
yetanotherreasongovernment’smustimprove cybersecurityinfrastructure.” (Dawson&Omar,2015)
Many of us maythinkthat all of our data is safe onour computersor any of our devices.Thatmaybe
true in sucha waybut not fully.Cyberespionage isawaythat allowsattackersto gainaccessinto our
data withoutourpermission.Soif ProfessorMaurice Dawsonwantedinformationonme he could
simplyuse asoftware thatwouldbe able to obtainmyinformationwithoutmyknowledge.Technically
anythingIor someone else thatwouldputinformationonanydevice canbe gainedaccessto evenif we
IS 3868 Nicole Gaehle
are notthere to protectit. There couldbe a passwordon topof a password ontop of anotherpassword
to be able to protectour veryimportantvital informationthatwe donot wantanyone to know about.
However,anindividual canspyonyou throughyour computerbyputtinga bugon it that isinvisible to
the computersfirewall tobe able togainsuch information.Ourfirewall isthere toprotectusagainst
such attacks butthe firewall canonlycatch somany packetsbefore one getsloose intoyourcomputer
software tobe able to obtainsuch importantinformation.Whensecurityof informationisatriskthen
there are such lawsand policiestocombatterrorism.
Laws and Policiestocombatterrorismhasa large role to playforthe governmentsof the
countries.“The eventsof 9/11 not onlychangedpolicieswiththe U.S.butalsopolicieswithother
countriesinhowtheytreatand combat terrorism.The UnitedNations(U.N.) alteredArticle 51of the
U.N. charter.Thisarticle allowsmembersof the U.N.totake necessarymeasurestoprotectthemselves
againstan armedattack to ensure international peace andsecurity.However,thisarticle raises
importantissuesunderinternational law regardingthe use of force.” (Dawson&Omar, 2015) Such
eventsterrifymanyindividualsthroughoutthe nationsof the world.Insuchthe situationthatdidoccur
on 9/11 manyU.S. citizensfeltterrifiedof othernationalities.Thisalsogoesthe reverseway.Our
countrieshadthe rightto change lawsandpoliciestoabide tothe requestof U.S. citizens’demands.
Many differenttypesof attackscanhappen.Thiscouldbe by a physical attack,mental attack,or even
cyber-attack.We all have the right to protectourselvesinwhichevermannerwe wantbutwe alsohave
to abide bywhat ourgovernmentwouldalsobackuson.“The ProtectingCyberspace asaNational Asset
Act of 2010 wasan act that alsoamendsTitle 11 of the HomelandSecurityActof 2002. Thisact
enhancedsecurityandresiliencyof the cyberandcommunicationinfrastructure withinthe U.S.Thisact
isimportantas the Presidentdeclaredthatanycyberaggressionswouldbe consideredanactof war.
Thisis alsoimportantas Estonia’sentire digital infrastructure wastakendownbyhackerswho
supportedthe formerSovietRule. Thistype of attackcouldbe damagingto the infrastructure inthe U.S.
causinglossof powerfor daysor more whichcouldresultindeath.” (Dawson&Omar,2015) Acts such
as thisis putintoplayfor multiple reasons.One reasoncouldbe the governmentrealizedthere are
some seriousissuesoccurringonthe cyberworldfortheirnationandneedstoenhance it.Alsocouldbe
because one tomany attacks happenedtothe nationthathas causedchaos. Suchsecurityisput into
place to protectour nation(orone’snation) tobe able to make the citizensof the nationfeel safe even
thoughit maynot be the safestitcouldget.There isalwaysnotenoughsecuritytobe able to assistis
not havinga majoreventoccur e.g.the entire nation’sgridgoingintoblackoutfor daysonend.
In conclusion,manytoolssuchasmobile devices,digital currencysoftware,cyberespionageand
secrecy,alongwithlawsandpoliciestocombatterrorismare usedundersecuritymeasures.Thesetools
have vulnerabilitiesintheirsecuritybutalsohelpprovide practice onwhatcan happenona day to day
basis.The biggesttool wouldbe underthe lawsandpoliciestocombatterrorismwhichisthe Protecting
Cyberspace asa National AssetActof 2010 was an act whichamendsTitle 11 of the HomelandSecurity
Act of 2002. Havingsecurityinour nationor any nationthroughoutthe worldisimportant.
IS 3868 Nicole Gaehle
Bibliography
Dawson,M., & Omar, M. (2015). NewThreats and Countermeasurein Digital Crime and CyberTerrorism.
Hershey:InformationScience Reference (animprintof IGIGlobal).

More Related Content

What's hot

Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
Ludmila Morozova-Buss
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
Ludmila Morozova-Buss
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofit
Roger Hagedorn
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
PECB
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert
 
IoT is Something to Figure Out
IoT is Something to Figure OutIoT is Something to Figure Out
IoT is Something to Figure Out
Peter Hoddie
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
Zsolt Nemeth
 
Abso lutely!
Abso lutely!Abso lutely!
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Daniel Dufourt
 
Privacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information ProfessionalsPrivacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information Professionals
Centre for Advanced Management Education
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
Sarah Jarvis
 
Disruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikDisruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh Malik
Yogesh Malik
 
Michael curry security
Michael curry securityMichael curry security
Michael curry security
MassTLC
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
Avirot Mitamura
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
Комсс Файквэе
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
Associate Professor in VSB Coimbatore
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
Roel Palmaers
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
Vishal Shah
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
NTT Innovation Institute Inc.
 

What's hot (19)

Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021Raise The Cybersecurity Curtain. Predictions 2021
Raise The Cybersecurity Curtain. Predictions 2021
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Cultivating security in the small nonprofit
Cultivating security in the small nonprofitCultivating security in the small nonprofit
Cultivating security in the small nonprofit
 
Artificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO ComplianceArtificial Intelligence (AI) – Two Paths to ISO Compliance
Artificial Intelligence (AI) – Two Paths to ISO Compliance
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
IoT is Something to Figure Out
IoT is Something to Figure OutIoT is Something to Figure Out
IoT is Something to Figure Out
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Privacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information ProfessionalsPrivacy, Emerging Technology, and Information Professionals
Privacy, Emerging Technology, and Information Professionals
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Disruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh MalikDisruptive Technologies Articles -by Yogesh Malik
Disruptive Technologies Articles -by Yogesh Malik
 
Michael curry security
Michael curry securityMichael curry security
Michael curry security
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
B Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En UsB Distributed Workforce Management In The Cloud Wp.En Us
B Distributed Workforce Management In The Cloud Wp.En Us
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 

Similar to Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism

Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
healdkathaleen
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
Internet
InternetInternet
Internet
hetal001
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
Dean Bonehill ♠Technology for Business♠
 
expert tips
expert tipsexpert tips
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
George Braga
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!
Frode Hommedal
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
Christopher Wang
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
hdbundo
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
Robert Smith
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
CapRockTelephone
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
santhoshyadav23
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
at MicroFocus Italy ❖✔
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
Netop
 
Security
SecuritySecurity
Security
Bob Cherry
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
IBM Security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
DiegoMtzS
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 

Similar to Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism (20)

Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 
expert tips
expert tipsexpert tips
expert tips
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
How is ai important to the future of cyber security
How is ai important to the future of cyber security How is ai important to the future of cyber security
How is ai important to the future of cyber security
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Security
SecuritySecurity
Security
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 

More from Nicole Gaehle, MSIST

Lab: Basic Reconnaissance
Lab: Basic ReconnaissanceLab: Basic Reconnaissance
Lab: Basic Reconnaissance
Nicole Gaehle, MSIST
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
Nicole Gaehle, MSIST
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS Standard
Nicole Gaehle, MSIST
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services Paper
Nicole Gaehle, MSIST
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak Entity
Nicole Gaehle, MSIST
 
Database: PC and Employee
Database: PC and EmployeeDatabase: PC and Employee
Database: PC and Employee
Nicole Gaehle, MSIST
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
Nicole Gaehle, MSIST
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
Nicole Gaehle, MSIST
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
Nicole Gaehle, MSIST
 
Understanding TCP and HTTP
Understanding TCP and HTTP Understanding TCP and HTTP
Understanding TCP and HTTP
Nicole Gaehle, MSIST
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)
Nicole Gaehle, MSIST
 
Understanding Layering and Ethernet
Understanding Layering and EthernetUnderstanding Layering and Ethernet
Understanding Layering and Ethernet
Nicole Gaehle, MSIST
 
Virtualization and Linux
Virtualization and LinuxVirtualization and Linux
Virtualization and Linux
Nicole Gaehle, MSIST
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Nicole Gaehle, MSIST
 
Cryptography
CryptographyCryptography
Cryptography
Nicole Gaehle, MSIST
 
Networking Task
Networking Task Networking Task
Networking Task
Nicole Gaehle, MSIST
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
Nicole Gaehle, MSIST
 
Reverse Engineering Project
Reverse Engineering ProjectReverse Engineering Project
Reverse Engineering Project
Nicole Gaehle, MSIST
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentation
Nicole Gaehle, MSIST
 

More from Nicole Gaehle, MSIST (19)

Lab: Basic Reconnaissance
Lab: Basic ReconnaissanceLab: Basic Reconnaissance
Lab: Basic Reconnaissance
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
 
Familiarizing with a major ISMS Standard
Familiarizing with a major ISMS StandardFamiliarizing with a major ISMS Standard
Familiarizing with a major ISMS Standard
 
Analysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services PaperAnalysis: Office of Transfer Services Paper
Analysis: Office of Transfer Services Paper
 
Entity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak EntityEntity Relationship Diagram: Weak Entity
Entity Relationship Diagram: Weak Entity
 
Database: PC and Employee
Database: PC and EmployeeDatabase: PC and Employee
Database: PC and Employee
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
Entity Relationship Diagram
Entity Relationship DiagramEntity Relationship Diagram
Entity Relationship Diagram
 
DIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements DocumentDIACAP IA CONTROLS Requirements Document
DIACAP IA CONTROLS Requirements Document
 
Understanding TCP and HTTP
Understanding TCP and HTTP Understanding TCP and HTTP
Understanding TCP and HTTP
 
Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)Understanding Internet Protocol (IPv4)
Understanding Internet Protocol (IPv4)
 
Understanding Layering and Ethernet
Understanding Layering and EthernetUnderstanding Layering and Ethernet
Understanding Layering and Ethernet
 
Virtualization and Linux
Virtualization and LinuxVirtualization and Linux
Virtualization and Linux
 
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
Analysis: Guidelines for Securing WLANS and Networks of ‘Things’
 
Cryptography
CryptographyCryptography
Cryptography
 
Networking Task
Networking Task Networking Task
Networking Task
 
Vm Penetration Test
Vm Penetration TestVm Penetration Test
Vm Penetration Test
 
Reverse Engineering Project
Reverse Engineering ProjectReverse Engineering Project
Reverse Engineering Project
 
Team h hoppers group final presentation
Team h   hoppers group final presentationTeam h   hoppers group final presentation
Team h hoppers group final presentation
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 

Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism

  • 1. IS 3868 Nicole Gaehle Assignment 1 Analysis: New Threats & Countermeasure in Crime and Cyber Terrorism “Cyberwarfare isquicklybecomingthe methodof warfare andthe tool of militarystrategies. Additionally,ithasbecome atool forgovernmentstoaidor exploitfortheirownpersonal benefits.For cyberterroriststhere hasbeenan overwhelminglyabundance of new toolsandtechnologiesavailable that have allowedcriminalactsto occur virtuallyanywhere inthe world.” (Dawson&Omar,2015) As technologygrowsimmenselyandrapidlyfastthe worldwide webbecomeslarger. Whenthisoccurs thisallowsforvulnerabilitiestogrowinthe networkingof the webaswell asthroughnew technologies that have beenadvancingaswell.These new technologieswouldactuallybecomeatool foranyone to use includingthe governmenttoaidtheircountryor exploitothercountriestotheirownadvantage. Whenyouthinkof a tool you maythinkof householdtools.However,thatisnotthe case at thistime. The toolsconsistof mobile devices,digitalcurrencysoftware,cyberespionage andsecrecy,alongwith lawsand policiestocombatterrorism. As we are aware of the toolsthat can be usedwe needtobe aware of what can happen. “Attackscan be initiatedfromanywhere inthe worldfrombehindacomputerwithamaskedInternet Protocol (IP) address.Thistype of warfare,cyberwarfare,changesthe landscape of waritself.Thistype of warfare removesthe needtohave aphysicallycapable militaryandrequiresthe demandforaforce that has a strongtechnical capacitye.g.computerscience skills.”(Dawson&Omar,2015) We have a total of 195 countriesinthe world.Thismeansthat we couldhave a Chinese attacker,Japanese attacker,Americanattacker,Spanishattacked,Britainattacker,Africaattacker,orany othercountry that youcan thinkof.Whenyoutake intoinconsiderationthatanattacker can be anywhere inthe world thenyou(as a governmentofficial)wouldwanttoconsidermanyprocessesandstepstotake. PersonallyIwouldwanttoensure ourgovernment andcountryissafe byadvancingour ownpersonal securitymeasuresinmultiplestates.Thiscaninclude entitiesinWashingtonD.C.,StLouisMO,San DiegoCA,DallasTX, or anyother cityand state.It wouldbe asif we as a countrywere underattack by anothercountryon our ownUS soil.However,thismeansthatwe maybe attackedon ownsoil but the attackercan be on Britainsoil.“These attackshelpleadtorapiddevelopmentof cyberdefense organizationsthroughoutEurope whichhasraisedthe profile of cyber-attackstoincludeawarenessto the potential severityof attacks.”(Dawson&Omar, 2015) WhetheritisJapan attackingPeruor U.S. attackingJapan,a countrylike Europe (inthiscase) wouldwanttodeveloporganizationsrapidlytobe able to prepare forany possibilitiesthattheymaybe attackedor wouldneedtoattack someone else. No matterwhatcountry youconsider,all 195 of themneedtohave a defense organizationtowatchout for maliciousattacksdone tothemthroughthe cyberworld.Attackscan be done viamobile networks. Mobile networksare anetworkinwhichusesa data service onthe go usingcellulardevicesor mobile devicessuchasiPadsandothertablets. “Thusthe importance of securityinmobile networkingis essential tomaintainingsecurityandprivacyforeverydaycitizens.” (Dawson&Omar,2015) We as citizensonthe go relyonour mobile carrierstohave such securityintheirdatabasestoensure we can utilize ourdataas needed.Ifindthatthe securityinmobile networkingisveryimportantbecause how am I supposedtoknowif a website wouldharmmymobile device. Mymobile device couldbe atablet, laptop,cell phone,orevenakindle.“Manyindividualsrely ontheirmobiledevicesfortexting,checking email,makingonline purchases,andevenremote controllingtheirhome alarmsystem.” (Dawson& Omar, 2015) As a cellulardevice user,Iuse myphone heavilyfortexting,emailing, andevenplaying
  • 2. IS 3868 Nicole Gaehle games.I sometimesuse mycell phoneformakingpurchasesbutheavilyrelyonmymobile personal computer(laptop) tomake purchases.Manycollege level studentsandcorporate executivescarrya cell phone anda laptopforeverydayuse. Yes,Iam a college studentbutif Iwas a corporate executive it wouldbe worse thanwhat itis already.Isaythis because if Iwas bothI wouldhave twolaptopsanda couple of cell phonesonme at all times.“Understandingthe HumanComputerInteraction (HCI) and behavioral issueswithmobile devicesisastart inunderstandinghumanpitfallsinsecurity.” (Dawson& Omar, 2015) What the authors are sayinghere isthat everyone needstounderstandthatwe are all humanand a simple mistake canoccur.Eventhougha single humaninteractswithacomputertohelp manage cyber-attacksona mobile networkdoesn’tmeanthateverythinghasbeentouchedon.So technicallyspeakingavulnerabilitycouldbe there thatthe personisnotaware of until a malicious attack happensonthe mobile network.Otherthanthe mobile networkattackscan alsohappenon digital currency. Digital currencyiswhere a transactionisdone ultimatelybywebbetweentwophysical accounts.“Digital currency has become anew commerce that isgrowlyquicklyandgainingthe attention of large financial institutions.”(Dawson&Omar,2015) As financial institutionsgrow,consumers demandtobe able totransfermoneyfromone bank accountto anotherin sucha quickmethod.This methodhasbecome a part of digital currency.The infrastructure hastobe setto such highdemandsto meetsucha newcommerce thatison the rise.“The technical infrastructureof thisdecentralizeddigital currencyreliesonseveral cryptographictechnologies.” (Dawson&Omar,2015) Financial institutions alreadyhave tohave a highstandardsetfor the infrastructure due tothe multiple consumersthatutilize themto banktheirmoneyandprotect itfromthieves.However,the thievesthe consumersthinkthey are protectingfromare the onesthat come in to someone’shouse/carphysicallyorgetintotheir personal mail.Inregardstothis,the financial institutionshave tobuildtheirinfrastructure withmore detailsandlevelsof securitytobe able tomake the consumerhappy.Onthe otherhand,the consumers don’trealize thateventhoughtheirmoneyisinasafe place and theycan easilyhitthe transferbutton online doesn’tmeanthattheycan keepawayfromcurrencybeingtakenfromthem.“Furthercyber criminalscouldstore stolendigital fundsonany device thatcanbe usedasstorage.This couldpose a threatas laundered,stolen,orself-generatedfundscanbe takenanywhere onastorage device suchas a micro Secure Digital (SD) thatcan holdup to 64 gigabytes(GB).”(Dawson&Omar,2015) Cyber-attacks can happento those individualsusingacell phone orcomputertotransferfundsfromone account to another.The attack on such devicescangainvital informationforbothaccounts(whichbank,routing number,andaccount number) andstore those onsome kindof card to be utilizedsomewhere else. Most thinkthiscouldbe calledidentitytheft(whichcouldbe the case) butitreallyisnot.It’sjusta simple bugtothe attacker to be able to gainsuch information.Thismaybe consideredcyberwarfare howeverthiscouldalsobe underCyberEspionage andSecrecy. “Cyberespionage orcyberspyingisyetanothermethodof cyberwarfare.Thismethodallows for the abilitytoobtainsecretswithoutthe permissionof the dataowner.The rise incyberespionage is yetanotherreasongovernment’smustimprove cybersecurityinfrastructure.” (Dawson&Omar,2015) Many of us maythinkthat all of our data is safe onour computersor any of our devices.Thatmaybe true in sucha waybut not fully.Cyberespionage isawaythat allowsattackersto gainaccessinto our data withoutourpermission.Soif ProfessorMaurice Dawsonwantedinformationonme he could simplyuse asoftware thatwouldbe able to obtainmyinformationwithoutmyknowledge.Technically anythingIor someone else thatwouldputinformationonanydevice canbe gainedaccessto evenif we
  • 3. IS 3868 Nicole Gaehle are notthere to protectit. There couldbe a passwordon topof a password ontop of anotherpassword to be able to protectour veryimportantvital informationthatwe donot wantanyone to know about. However,anindividual canspyonyou throughyour computerbyputtinga bugon it that isinvisible to the computersfirewall tobe able togainsuch information.Ourfirewall isthere toprotectusagainst such attacks butthe firewall canonlycatch somany packetsbefore one getsloose intoyourcomputer software tobe able to obtainsuch importantinformation.Whensecurityof informationisatriskthen there are such lawsand policiestocombatterrorism. Laws and Policiestocombatterrorismhasa large role to playforthe governmentsof the countries.“The eventsof 9/11 not onlychangedpolicieswiththe U.S.butalsopolicieswithother countriesinhowtheytreatand combat terrorism.The UnitedNations(U.N.) alteredArticle 51of the U.N. charter.Thisarticle allowsmembersof the U.N.totake necessarymeasurestoprotectthemselves againstan armedattack to ensure international peace andsecurity.However,thisarticle raises importantissuesunderinternational law regardingthe use of force.” (Dawson&Omar, 2015) Such eventsterrifymanyindividualsthroughoutthe nationsof the world.Insuchthe situationthatdidoccur on 9/11 manyU.S. citizensfeltterrifiedof othernationalities.Thisalsogoesthe reverseway.Our countrieshadthe rightto change lawsandpoliciestoabide tothe requestof U.S. citizens’demands. Many differenttypesof attackscanhappen.Thiscouldbe by a physical attack,mental attack,or even cyber-attack.We all have the right to protectourselvesinwhichevermannerwe wantbutwe alsohave to abide bywhat ourgovernmentwouldalsobackuson.“The ProtectingCyberspace asaNational Asset Act of 2010 wasan act that alsoamendsTitle 11 of the HomelandSecurityActof 2002. Thisact enhancedsecurityandresiliencyof the cyberandcommunicationinfrastructure withinthe U.S.Thisact isimportantas the Presidentdeclaredthatanycyberaggressionswouldbe consideredanactof war. Thisis alsoimportantas Estonia’sentire digital infrastructure wastakendownbyhackerswho supportedthe formerSovietRule. Thistype of attackcouldbe damagingto the infrastructure inthe U.S. causinglossof powerfor daysor more whichcouldresultindeath.” (Dawson&Omar,2015) Acts such as thisis putintoplayfor multiple reasons.One reasoncouldbe the governmentrealizedthere are some seriousissuesoccurringonthe cyberworldfortheirnationandneedstoenhance it.Alsocouldbe because one tomany attacks happenedtothe nationthathas causedchaos. Suchsecurityisput into place to protectour nation(orone’snation) tobe able to make the citizensof the nationfeel safe even thoughit maynot be the safestitcouldget.There isalwaysnotenoughsecuritytobe able to assistis not havinga majoreventoccur e.g.the entire nation’sgridgoingintoblackoutfor daysonend. In conclusion,manytoolssuchasmobile devices,digital currencysoftware,cyberespionageand secrecy,alongwithlawsandpoliciestocombatterrorismare usedundersecuritymeasures.Thesetools have vulnerabilitiesintheirsecuritybutalsohelpprovide practice onwhatcan happenona day to day basis.The biggesttool wouldbe underthe lawsandpoliciestocombatterrorismwhichisthe Protecting Cyberspace asa National AssetActof 2010 was an act whichamendsTitle 11 of the HomelandSecurity Act of 2002. Havingsecurityinour nationor any nationthroughoutthe worldisimportant.
  • 4. IS 3868 Nicole Gaehle Bibliography Dawson,M., & Omar, M. (2015). NewThreats and Countermeasurein Digital Crime and CyberTerrorism. Hershey:InformationScience Reference (animprintof IGIGlobal).