{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Patel Gunjan Term Paper 1 100429069

Patel Gunjan Term Paper 1 100429069 - TABLE OF CONTENTS...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
TABLE OF CONTENTS Introduction ..................................................................................................................................... 2 Viruses and Worms .......................................................................................................................... 2 Wireless Communication ................................................................................................................. 3 Usage Portals ................................................................................................................................... 3 Scammers ......................................................................................................................................... 4 E-mail ............................................................................................................................................... 4 Remote Access ................................................................................................................................. 5 Online Banking ................................................................................................................................ 5 Web Pages ........................................................................................................................................ 6 Trojan Horses ................................................................................................................................... 7 Cyber Terrorist ................................................................................................................................. 7 Propaganda ...................................................................................................................................... 8 Iraqi War, 2003 ................................................................................................................................ 9 Defence Precautions ........................................................................................................................ 9 Firewall ............................................................................................................................................ 9 Virus Scanners ............................................................................................................................... 10 Future Trends ................................................................................................................................. 11 Conclusion ..................................................................................................................................... 11 Reference ....................................................................................................................................... 13
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Introduction In the modern era, we are very dependent on information technology (IT). In current businesses, a short disruption of the internet could lead to problems. Lots of information is being communicated over the net at daily basis. In the fast pace world of the 21 st century, we are not always concerned about the security of our information. But the truth is, there are people all around the world wanting to attack and harm your systems. The term ‘cyber terrorism’ originated in 1996, by adding cyberspace and terrorism. Cyber terrorism is basically defined as a computer crime that targets networks. Since its ‘cyber’, it does not cause any damage physically to property or infrastructure. In 2006, Bruce Schnieir held a competition in which contestants had to create strategies that terrorists could use in order to attack key components of the United States. Following the competition, and examining all of the suggestions given, he stated that it is very difficult to harm a key component of the US. The competition was held after the 9/11 event, to prevent any further damages. After doing so, a question awakened: could the damages due to 9/11 have been done using IT? Studies show that in the early times, America wasn’t prepared against electronic attacks. Now days, the world is taking the threat of cyber terrorism more seriously. Methods of Attacking Viruses and worms are probably the most commonly known threats. Viruses initially started damaging systems in the 1960s. “Essentially, a computer virus is a self-replicating program that attaches itself to another program or file in order to reproduce.” (Cyber Warfare and Terrorism, page xx) Viruses damage computers and make some components inaccessible for the user. In some cases, the computer might be really damaged that it needs to be re - configured.
Background image of page 2
Worms, on the other hand don’t required another program to reproduce. They can replicate through a network affecting many computers. An example is “The Code Red II” worm. This worm affected over 259,000 systems in around 14 hours. Worms can also be used to monitor certain activities and give information back to the creator. Wireless communication has started being the popular choice for internet access. However, while utilizing wireless links, user may experience environmental hazards that can delay the communication process. When this happens the signals are re-transmitted. This can be used by intruders to spy. Even when the median is secured, there could still be outside access, which is dangerous to users. Research in Auckland, New Zealand stated “more than 60% of wireless office wireless office systems work without any protection-that is, anybody with a laptop and wireless antenna would be able to use a network as an authorized user.” (Cyber
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}