In 2012 a hacking group known as RedHack was punished for bringing down the

In 2012 a hacking group known as redhack was punished

  • Victoria Wellington
  • ICT 6187
  • Homework Help
  • preet2088
  • 10
  • 100% (1) 1 out of 1 people found this document helpful

This preview shows page 3 - 7 out of 10 pages.

In 2012, a hacking group known as RedHack was punished for bringing down the focal Turkish police site while assaulting 350 extra police sites the nation over.
Image of page 3
Assignment #8.1 – Cyber Crime and Homeland Security 4 In 2013, the Syrian Army propelled a disavowal of-benefit assault against the Washington Post and the New York Times, and simply this year, Lizard Squad tweeted out a bomb danger and completed an assault against Sony's Play station arranges. In 2014, different gatherings of Anon Ghost did digital operations against Israeli sites and Jewish organizations. IMPORTANCE OF THE STUDY On account of this, there are five assortment of strategies fear based oppressor programmers could use to focus on the US: 1. Denial of Service (DoS) - This is one of the simplest sorts of assaults to assault and does not take much specialized framework. In any case, for the individuals who might state this is only a disturbance, not a genuine risk, consider this: DoS assaults on retailers amid the Christmas shopping season could harm occasion deals figures and corporate benefits of everybody from Best Buy to Apple, prompting potential stock value decays. DoS assaults on open utilities, for example, vitality and water plants, could upset adversaries and cause open frenzy. DoS assaults on state and government decision specialists and voting gear could upset the discretionary procedure and cast race brings about uncertainty.
Image of page 4
Assignment #8.1 – Cyber Crime and Homeland Security 5 2. Cyber-Crime and Business Extortion - Right now the greater part of composed digital wrongdoing is controlled by Russian and Eastern European gatherings with no genuine political profiles, only a want to profit. Yet, consider the possibility that fear based oppressor bunches assumed a more dynamic part in this. For one, they could collect a huge amount of cash to back their psychological militant operations - to the tune of a large number of cash every year just by offering "crime ware" packs, leasing "botnets," and coercing organizations with Do’s assaults or "ransom ware" (one kind of ransom ware) 3. Cell Phone Targeting - For under $25,000 anybody can assault mobile phone clients around the world utilizing items like Stingray, SkyLock, and others. Mobile phone following items, which abuse the SS7 convention, can be utilized by fear based oppressors to target high- profilic people for death or abducting. 4.Wiping Bank Records - In 2012, Mideast programmers contaminated 30,000 PCs atSaudi Aramco with the Shamoon infection. Made this assault especially harming that theinfection conveyed an extra kind of malware within it, known as a "wiper," which totallydevastated every one of the information on the tablets' hard drives and rendered themunbootable, subsequently making those PCs unusable once more. Or, then again what about theIRS? Envision the turmoil such an assault would cause for the US money related framework.
Image of page 5
5. Targeting Critical Infrastructure - Even all the more terrifying to consider is the assaulting for psychological militants to assault basic framework in the US by abusing surely understood (yet so far to a great extent unfixed) vulnerabilities. Modern control frameworks like SCADA which control the mechanical frameworks at control plants, electric lattices, water treatment plants, oil refineries, and so forth - fundamentally any vast scale mechanical operation.
Image of page 6
Image of page 7

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture