Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

critique discussion post below-half page

critique discussion post below-half page

critique discussion post below-half page

Question Description

Cyber Terrorism as a Strategic Threat

There have been many varying definitions of cyberterrorism. This has led to a great deal of confusion among the private sector, including the financial services companies, on how to define any attacks on their systems and how to respond to these attacks. PBI-FS, being in the financial sector, has an elevated level of threat from cyberterrorists. As such there need to be a clear definition of what constitutes cyberterrorism and how the company will respond to these specific threats or incidents. While still a divisive topic, a generally accepted definition of cyberterrorism is “…pre-mediated, politically motivated attacks by sub national groups or clandestine agents or individuals against information and computer systems, computer programs, and data that results in violence against non-combatant targets” (Littl3field, 2017) Using this definition, several different cyberattacks can be viewed as cyberterrorist attacks and can be handled as such.

One such attack that can be viewed as a possible terrorist attack is trojan infections of mobile banking applications. “From 2H 2016 to 2H 2017, we saw a 24% increase in banking trojan infections from mobile applications… We have also seen mobile banking trojans delivered as fake updates or through targeted email or SMS phishing.” (Insights, 2018) These trojans can steal banking credentials which is a top seller on the black market. While this cyberattack can be committed by cybercriminals, it can also be used by cyberterrorists to gain information or funding for their operations. PBI-FS needs to be aware that this could happen to it’s clients and ensure that all necessary steps have been taken to protect them to the best of it’s abilities.

Another attack that can be employed by cyberterrorist is extortion attacks against financial services companies such as PBI-FS. These attacks target a bank or financial services company that may have had an unknown or undisclosed data breach. The threat actor will contact the company or bank for an extortion fee to not disclose this information. These attacks are more common in places that have strict privacy laws such as Canada where a data breach could cost heavy fines as well as a significant reputation lost and system downtime to fix the breach. More often than not it is cheaper for the company or bank to pay the threat actor rather than face the government fines. Threat actors in this cyberattack can include cyberterrorist that are looking for specific information, or are trying to extort specific information out of a bank or company, or are trying to quietly fund certain other terrorist operations.

Phishing as a service is another cyberattack that can be used by cyberterrorists that PBI-FS needs to be aware of. “In recent years, the commodification of dark web services is a well-known trend. High-skilled and technically-proficient hackers offer services and stolen data to novice hackers.” (Insights, 2018) Phishing is no different. Experienced hackers will create phishing kits to sell on the dark web to less experienced hackers. This allows the less experienced hacker to easily achieve the goal of gaining sensitive credentials. These phishing kits can be sold to cyberterrorists to be used against financial companies or banks to gain sensitive information on clients or login credentials to steal other sensitive information. This is an alarming trend that will need to be monitored by PBI-FS.

Each of these attacks are not failproof however and there are steps hat PBI-FS can take to protect itself from them. In the U.S. there is an insurance program against terrorist called the Terrorism Risk Insurance Program. “The Terrorism Risk Insurance Act (TRIA) created a temporary federal program that provides for a transparent system of shared public and private compensation for certain insured losses resulting from a certified act of terrorism.” (U.S. Treasury, 2002) There are security efforts that PBI-FS can undertake that will raise the chances of these attacks being unsuccessful. One such effort is “Strong end user education – compliance based practices for handling data, recognizing phishing attempts and procedures to counteract human engineering attempts.” (Secureworks, 2017) Another solution is regular software updates and security patches. These are vital to maintaining the security of the security of the software and applications of the company as all security flaws that are found will be fixed by patch or update. Keeping active and updated anti-virus software is another step that PBI-FS can take against cyberattacks from cyberterrorists. While cyberterrorism is on the rise PBI-FS is not defenseless against is and will continue to be as secure as possible for the safety of it’s clients.

References

Insights. (2018, July). Financial Services THREAT LANDSCAPE Report: The Dark Web Perspective. Retrieved May 4, 2020, from https://cdn2.hubspot.net/hubfs/3699194/Content/Res… Reports/IntSights_Financial_Services_Landscape-Final.pdf

Littl3field. (2017, June 7). Cyber Terrorism: understanding and preventing acts of terror within our cyber space. Retrieved May 1, 2020, from https://littlefield.co/cyber-terrorism-understandi…

Secureworks. (2017, May 12). Cyber Threat Basics, Types of Threats, Intelligence & Best Practices. Retrieved May 4, 2020, from https://www.secureworks.com/blog/cyber-threat-basi…

U.S Treasury. (2002, November 26). U.S. Department of the Treasury. Retrieved May 4, 2020, from https://home.treasury.gov/policy-issues/financial-…

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20