Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Running head: TECHNOLOGY 1

Cyberterrorism and Network Protection

Student’s Name

Institution Affiliation
TECHNOLOGY 2

Cyberterrorism and Network Protection

Attributes of a Cyberattack

There are different interpretations concerning what constitutes cyberattacks. Kenney assigned

various attributes related to different cybersecurity phenomena such as cyberattack, hacktivism, cyber

warfare, and cyberterrorism. The first attribute assigned involves computer attacks that target other

computers, systems, and data they store. The computer is used as both a weapon and a target. The

attribute applies to any form of cyber phenomena since it indicates that an attack has to be done on a

computer or its system and information it holds. The second attribute involves an attack that aims at

pursuing a political, social, or religious concern. The attribute is applicable or shared with cyber

phenomena such as hacktivism, cyberterrorism as well as cyber warfare, with each fitting into a specific

aim or concern being pursued. For instance, cyberterrorism is often applicable in either religious or

political aim while hacktivism focuses much on governments or political views.

The third attribute of cybersecurity involves an attack that is threatening or producing physical

violence against individuals, possessions, or crucial infrastructure. The attribute can be said to be fitting

within the cyberterrorism arena but can as well be applied to cyber warfare. The fourth attribute

involves an attack that results in widespread fear or causes physical intimidation on or beyond the

targeted victims (Ayres & Maglaras, 2016). The attribute forms one of the greatest objectives of

cyberterrorism. The attribute however does not apply to any other cyber phenomena. From the

interpretation, it is only cyberterrorism that falls within and fulfills all the four attributes.

I agree with the author's assertion that "cyberterrorism continues to be a controversial topic in

social media crimes". The ubiquitous nature of computer networks promotes the topics of cybercrime

and cyberterrorism in the world security landscape. The increase in connectivity has promoted

vulnerability towards risks of fraud, theft, and attack (Redins, 2012). The internet and social media

platforms are increasingly used in enhancing cyberterrorism. The world is undergoing major
TECHNOLOGY 3

technological transformations that invite the efforts of cyber terrorists to organize crimes and state-

sponsored acts to practice espionage and other illegal activities that are threats to national security and

critical infrastructure. Cyberterrorism continues to be a controversial topic as it promotes vulnerability

to data breaches and intrusion to networks and systems. Cyberterrorism has been used to interrupt

elections and political campaigns thus making voters at risk of getting their information exposed

(Whitman & Mattord, 2017). The social media is heavily used in spreading propaganda such as

recruitment and radicalization in terrorism, terrorist financing, training, and execution of cyberattacks.

Compare and contrast three ways in which the EWS provides next-generation protection for networks

facing cyber terror attacks over IDS or IPS capability.

Due to the need to safeguard information security, various methods must be in place to protect

networks and systems from cyberterrorism and related attacks. The methods include the intrusion

detection system (IDS) which provides detection solutions by inspecting operations in a certain

environment and determine their normalcy. Intrusion prevention system (IPS) offers a reactive solution

to networks and systems by reacting against possible cyberattacks or threats. On the other hand, the

early warning system emerged to thoroughly and proactively detect internet threats, complex attack

situations, and advanced persistent threats (Ramaki & Atani, 2016). The method can be used in

managing attacks and threats before the happening of any security issue.

To protect networks and systems that face cyber terror attacks, there are various ways in which

EWS is effectively used as compared to the other methods. First, Both the EWS and IDS are trying to

detect threats that are known, offer a proper report, and come up with a comprehensive log of network

status before the detected threats become actual damages. In particular, EWS focuses on giving

hypothesis and required prediction, as well as necessary advice in circumstances where there is no full

recognition of system status. The method provides the assumptions, necessary forecasts, and
TECHNOLOGY 4

recommendations in unknown situations. That implies, EWS uses early indicators to begin on-time in

preventing or minimizing the damages in a system and processing incomplete information (Niblett,

2012).

Secondly, as compared to IDS and IPS, early warning systems have come up with a unique and

new horizon for information, computer systems as well as networks security. The outlined systems will

assist in network protection for the future generation as it is capable of receiving input data from a

variety of embedded sensors in a protected network. By receiving a high volume of low-level intrusion

alerts, an alert correlation component gives rise to a high-level description of the fraud or malicious

operations being undertaken on the network. EWS is capable of facilitating an alert management role

for security controllers or administrators. Thirdly and most importantly, by providing proactive solutions

as opposed to IPS, EWS functionality involves the detection of any form of change from the present or

existing or normal situation of a phenomenon (Anderson, 2017). The early warning systems detect

unknown system behaviors that can be potentially harmful. Therefore, it prevents such malicious

intrusions by ensuring that the system networks are regularly monitored and its architecture can vitally

explain the system's operations.


TECHNOLOGY 5

Reference

Anderson, K. (2017). Using agility to combat cyber-attacks. Journal of Business Continuity & Emergency
Planning, 10(4), 298-307.

Ayres, N., & Maglaras, L. A. (2016). Cyberterrorism targeting the general public through social
media. Security and Communication Networks, 9(15), 2864-2875.

Niblett, G. (2012). Threats and Countermeasures. ITNow, 54(1).

Ramaki, A. A., & Atani, R. E. (2016). A survey of IT early warning systems: architectures, challenges, and
solutions. Security and Communication Networks, 9(17), 4751-4776.

Redins, L. (2012). Understanding cyberterrorism. Risk Management, 59(8), 32-36.

Whitman, M. E., & Mattord, H. J. (2017). Principles of information security (6th ed.). Boston, MA:
Course Technology. ISBN-13: 9781337102063.

You might also like