critique discussion below in 100-200 words
Question Description
Cyber terrorism is the modern-day terrorism attacks. This type ofterrorism comes in many different forms such as malicious attempts todisrupt or damage a computer system, network, and access files. It couldalso include attempting to infiltrate and steal data (SecureWorks,2017). There are different areas of cyber terrorism that go as targetedand untargeted. Different attacks that the firm should be aware ofinclude:
- Phishing – Through malicious links usually sent by emails.
- Watering Hole – Where there is a fake webpage that attacks visitors that go onto it.
- Ransomware – This infects a system by encrypting files and locking user access to these systems.
- Scanning – This is where they can test for vulnerabilities.
- Spear-Phishing- This is where a phishing attack is directed towards a specific person.
- DistributedDenial of Service – This deploys a mass amount of packet requestsusually from a botnet to overload a system and prevents regular accessby real users.
- Supply chain – Attacks an element of an organization before it arrives.
- Zero-day – Bespokes the exploitation of a system that has specific vulnerabilities that the author does not know about.
Manyacts of terrorism are often synonymous with acts of cybercrime and thisalso means they attacks can be implemented by terrorists and or byregular cybercriminals. Cyber terrorism is one of the fastest-growingthreats that doesn’t only target individuals, but it’s also targetingprivate and public organizations and nations as a whole! Prevention ispossible with gathering preliminary reconnaissance on potential threatswhile managing current threats (Littlefield, 2017). Cybersecurityprofessionals need to be able to be prepared for imminent threats thatcould be acts of terrorism. This organization needs to be able to answerquestions such as 1. What do we foresee terrorists wanting to do incyberspace? 2. How can we prevent these actions? 3. How can we beproactive against these actions?
Terroristslook to utilize cyberspace in order to support their motivation,whether that be their religious, social, cultural, political, oreconomic beliefs. Attacking critical infrastructures and services insociety and utilizing cyberspace to inflict harm to others (Littlefield,2017). In addition to this, it’s also important to state that cyberterrorists may also employ cyberspace not only to cause harm but also tofacilitate their activities, including the likes of laundering offinances, encrypted communications, recruitment, and promotion of theiractivities. A valuable method of developing prevention againstcyber-terrorist threats before they could happen is by implementingsecurity as one of the integral parts of development in software anddevices. When discussing prevention methods against cyber terrorism asappose to that of cybercrime, the methods must be considered differentlydue to the perspective of the attacker (Littlefield, 2017).
Specifically,when it comes to cyber-terrorist hitting the financial industry intoday’s time they are faced with highly motivated criminals looking tomake financial gains. From 2017-2018 these criminals were able togenerate billions of dollars worth of profits and causing grosses lossesto reach over $1 trillion to the markets because of their attacks(Intsights, 2018). Their attempts at targeting these banks comes fromgoing after major bank transfer platforms, phishing emails, phishingwebsites that trick users into giving up their credentials, fake mobileapplications, mobile malware, ATM scamming methods, Point of Saleattacks, and attacks against e-banking interfaces. Bank account logins,financial information, IP addresses, domain names, and any otherfinancial record are considered valuable details that can be used by thecybercriminal (Intsights, 2018). Leaked banking information has had a135% increase in financial data that was being sold on the dark webblack markets. On average that is 3.8 incidents per week per bank.
Althoughthe possibilities for cyber-terrorist to make an impact is at largethere are recommendations for reducing the chances of being victimizedbut these groups of people such as using threat intelligence to take aproactive approach to our security program, evaluate risks and not justcompliance to increase security, leverage automation tools, trackthreats, and never underestimate the power of cybersecurity training(Intsights, 2018).
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."