Professional Documents
Culture Documents
Running Head: TECHNOLOGY 1: Cyberterrorism and Network Protection Student's Name Institution Affiliation
Running Head: TECHNOLOGY 1: Cyberterrorism and Network Protection Student's Name Institution Affiliation
Student’s Name
Institution Affiliation
TECHNOLOGY 2
Attributes of a Cyberattack
There are different interpretations concerning what constitutes cyberattacks. Kenney assigned
various attributes related to different cybersecurity phenomena such as cyberattack, hacktivism, cyber
warfare, and cyberterrorism. The first attribute assigned involves computer attacks that target other
computers, systems, and data they store. The computer is used as both a weapon and a target. The
attribute applies to any form of cyber phenomena since it indicates that an attack has to be done on a
computer or its system and information it holds. The second attribute involves an attack that aims at
pursuing a political, social, or religious concern. The attribute is applicable or shared with cyber
phenomena such as hacktivism, cyberterrorism as well as cyber warfare, with each fitting into a specific
aim or concern being pursued. For instance, cyberterrorism is often applicable in either religious or
The third attribute of cybersecurity involves an attack that is threatening or producing physical
violence against individuals, possessions, or crucial infrastructure. The attribute can be said to be fitting
within the cyberterrorism arena but can as well be applied to cyber warfare. The fourth attribute
involves an attack that results in widespread fear or causes physical intimidation on or beyond the
targeted victims (Ayres & Maglaras, 2016). The attribute forms one of the greatest objectives of
cyberterrorism. The attribute however does not apply to any other cyber phenomena. From the
interpretation, it is only cyberterrorism that falls within and fulfills all the four attributes.
I agree with the author's assertion that "cyberterrorism continues to be a controversial topic in
social media crimes". The ubiquitous nature of computer networks promotes the topics of cybercrime
and cyberterrorism in the world security landscape. The increase in connectivity has promoted
vulnerability towards risks of fraud, theft, and attack (Redins, 2012). The internet and social media
platforms are increasingly used in enhancing cyberterrorism. The world is undergoing major
TECHNOLOGY 3
technological transformations that invite the efforts of cyber terrorists to organize crimes and state-
sponsored acts to practice espionage and other illegal activities that are threats to national security and
to data breaches and intrusion to networks and systems. Cyberterrorism has been used to interrupt
elections and political campaigns thus making voters at risk of getting their information exposed
(Whitman & Mattord, 2017). The social media is heavily used in spreading propaganda such as
recruitment and radicalization in terrorism, terrorist financing, training, and execution of cyberattacks.
Compare and contrast three ways in which the EWS provides next-generation protection for networks
Due to the need to safeguard information security, various methods must be in place to protect
networks and systems from cyberterrorism and related attacks. The methods include the intrusion
detection system (IDS) which provides detection solutions by inspecting operations in a certain
environment and determine their normalcy. Intrusion prevention system (IPS) offers a reactive solution
to networks and systems by reacting against possible cyberattacks or threats. On the other hand, the
early warning system emerged to thoroughly and proactively detect internet threats, complex attack
situations, and advanced persistent threats (Ramaki & Atani, 2016). The method can be used in
managing attacks and threats before the happening of any security issue.
To protect networks and systems that face cyber terror attacks, there are various ways in which
EWS is effectively used as compared to the other methods. First, Both the EWS and IDS are trying to
detect threats that are known, offer a proper report, and come up with a comprehensive log of network
status before the detected threats become actual damages. In particular, EWS focuses on giving
hypothesis and required prediction, as well as necessary advice in circumstances where there is no full
recognition of system status. The method provides the assumptions, necessary forecasts, and
TECHNOLOGY 4
recommendations in unknown situations. That implies, EWS uses early indicators to begin on-time in
preventing or minimizing the damages in a system and processing incomplete information (Niblett,
2012).
Secondly, as compared to IDS and IPS, early warning systems have come up with a unique and
new horizon for information, computer systems as well as networks security. The outlined systems will
assist in network protection for the future generation as it is capable of receiving input data from a
variety of embedded sensors in a protected network. By receiving a high volume of low-level intrusion
alerts, an alert correlation component gives rise to a high-level description of the fraud or malicious
operations being undertaken on the network. EWS is capable of facilitating an alert management role
for security controllers or administrators. Thirdly and most importantly, by providing proactive solutions
as opposed to IPS, EWS functionality involves the detection of any form of change from the present or
existing or normal situation of a phenomenon (Anderson, 2017). The early warning systems detect
unknown system behaviors that can be potentially harmful. Therefore, it prevents such malicious
intrusions by ensuring that the system networks are regularly monitored and its architecture can vitally
Reference
Anderson, K. (2017). Using agility to combat cyber-attacks. Journal of Business Continuity & Emergency
Planning, 10(4), 298-307.
Ayres, N., & Maglaras, L. A. (2016). Cyberterrorism targeting the general public through social
media. Security and Communication Networks, 9(15), 2864-2875.
Ramaki, A. A., & Atani, R. E. (2016). A survey of IT early warning systems: architectures, challenges, and
solutions. Security and Communication Networks, 9(17), 4751-4776.
Whitman, M. E., & Mattord, H. J. (2017). Principles of information security (6th ed.). Boston, MA:
Course Technology. ISBN-13: 9781337102063.