In: Computer Science
differences between cyberterrorists, hacktivists and state-sponsored attackers. Which would you consider to be more dangerous to a corporate network, and why? Which would be more dangerous to a government network, and why?
Cyber attackers are categorized in keeping with their
target, tactics, techniques, malware, and
procedures:
1. Cybercriminals are stereotypic attackers,
targeting organizations to form cash through extortion or the
revelation of compromised knowledge. Ransomware, malware that holds
knowledge surety until the owner pays the financial award, is the
first threat to organizations in 2016, particularly to mHealth
devices and mission-critical assets.
2. Hacktivists are politically-motivated,
targeting establishments with opposing affairs of state to their
agenda. the foremost common attack with a denial of service
technique, overloading a server till it crashes. once it involves
tending, hacktivists area unit searching for specific patient
knowledge, belongings or they are attempting to embarrass the
establishment.
3. Cyberterrorists target systems to disrupt or
destroy important services and infrastructure of a particular
nation, sector or organization. Attacks on the tending sector area
unit designed to border a lesser hacking cluster to cause turmoil
or cause panic.
4. Nation-State Actors sponsor different threat
teams that launch against foreign governments and organizations.
They place confidence in advanced malware tailor-made to their
target and sometimes contain rootkits for a persistent presence,
secret writing to hinder reverse engineering and codes to mask its
presence. The tending sector is targeted by nation-state actors to
disrupt service and collect personal knowledge.
5. Script Kiddies are the smallest amount of good
cyber attackers. Most of those tools area unit automatic, because
the users are not technically-savvy, and that they enter through
expedient means that, through vulnerable systems.
HACKTIVISM :
Hacktivism is that the convergence of hacking with policy, wherever
“hacking” is employed here to check with operations that exploit
computers in ways in which area unit uncommon and sometimes
felonious, generally with the assistance of special software
package (“hacking tools”). Hacktivism includes electronic direct
action, that brings ways of direct action to the Internet. This
section explores four forms of operations: virtual sit-ins and
blockades, automatic email bombs, web hacks, and pc break-ins, and
pc viruses and worms. as a result of hacking incidents area unit
typically reported within the media, operations during this class
will generate appreciable content for each of the activists and
their causes.
Virtual Sit-Ins and Blockades:
A virtual civil disobedience or blockade is that the Internet
version of a physical civil disobedience or blockade. The goal in
each case is to indicate to the protestors and their cause by
disrupting traditional operations and block access to facilities.
With a civil disobedience, thousands of activists at the same time
visit an internet web site and arrange to generate most traffic
against the location that different users cannot reach it. a gaggle
job itself Strano Network conducted one in every of the primary
such demonstrations as a protest against French government policies
on nuclear and social problems. On Dec twenty-one, 1995, they
launched a one-hour Net’Strike attack against the net sites
operated by varied government agencies.
Email Bombs:
It is one factor to send one or 2 messages to government
policymakers, even daily. however, it's quite another to bombard
them with thousands of messages promptly, distributed with the help
of automatic tools. The impact is to utterly jam a recipient’s
incoming email box, creating it not possible for legitimate email
to induce through. Thus, Associate in Nursing email bomb is
additionally a sort of virtual blockade. though email bombs area
unit typically used as a method of revenge or harassment, they need
conjointly been wont to protest government policies
Web Hacks and pc Break-Ins:
The media is stuffed with stories of hackers gaining access to
internet sites and commutation a number of the content with their
own. Frequently, the messages area unit political, as once a gaggle
of Portuguese hackers changed the sites of forty Indonesian servers
in September 1998 to show the shibboleth “Free East Timor” in giant
black letters. in keeping with The big apple Times, the hackers
conjointly more links to internet sites describing Indonesian human
rights abuses within the former Portuguese colony.89 Then in August
1999, Jose Ramos architect, the Sydney-based Nobelist UN agency
represents the East Timor independence movement outside Indonesia,
warned that a world network of hackers planned to bring Indonesia
to a standstill if Jakarta sabotaged the ballot on the longer term
of East Timor. He told the Sydney Morning Herald that over one
hundred hackers, largely teenagers in Europe and also the us, had
been making ready the setup.
Computer Viruses and Worms Hacktivists have used pc viruses and
worms to unfold protest messages and harm target pc systems. each
area unit styles of malicious code that infect pcs and propagate
over computer networks. The distinction is that a worm is Associate
in Nursing autonomous piece of software package that spreads on its
own, whereas a plague attaches itself to different files and code
segments and spreads through those parts, typically in response to
actions taken by users (e.g., gap Associate in Nursing email
attachment). The boundary between viruses and worms, however, is
bleary and not necessary to the discussion here.
CYBERTERRORISM:
Cyberterrorism is that the intended, politically driven attack
against info, pc systems, pc programs, and knowledge that lead to
violence against noncombatant targets by subnational teams or
cloak-and-dagger agents.
Terrorist teams area unit victimization the web extensively to
unfold their message and to speak and coordinate action. However,
there are few, if any, electronic network attacks that meet the
standards for cyberterrorism. The 1998 email bombing by the web
Black Tigers against the Sri Lankan embassies was maybe the nearest
factor to cyberterrorism that has occurred to this point, however
the harm caused by the flood of email, for instance, pales as
compared to the deaths of 240 folks from the physical bombings of
the U.S. embassies in Nairobi and Dar metal Salaam in August.
Cyberdefense :
The main impact of cyber threats on foreign and domestic policy
relates to defensive against such acts, significantly attacks
against important infrastructures. At the international level, many
countries, together with the us, are addressing such problems as
mutual legal help treaties, surrender, the sharing of intelligence,
and also the want for uniform pc crime laws in order that
cybercriminals is with success investigated and prosecuted even
once their crimes cross international borders, as they thus
typically do. This effort isn't targeted on either cyberterrorism
or hacktivism, however rather addresses Associate in Nursing array
of actions that features all styles of hacking and electronic
network attacks, pc and telecommunications fraud, and electronic
piracy (software, music, etc.). It conjointly covers
state-sponsored cyber warfare operations that use hacking and
electronic network attacks as a military weapon.
CONCLUSIONS:
The Internet is clearly dynamic to the landscape of political
discourse and support. It offers new and cheap ways for assembling
and commercial enterprise info, for human action and coordinative
action on a world scale, and for reaching intent on policymakers.
It supports each open and personal communication. support teams and
people worldwide area unit taking advantage of those options in
their tries to influence policy.
Hacktivists could feel a way of authorization as a result of they
will management government computers and acquire media attention,
however, that doesn't mean they're going to achieve dynamic policy.
So far, anecdotal proof suggests that for the bulk of cases,
they're going to not.
With relevancy cyberterrorism, that is, the utilization of hacking
tools and techniques to communicate grave hurt like loss of life,
few conclusions are drawn concerning its potential impact on
policy, as a result of there are no reported incidents that meet
the standards.combined with hacking threats normally, is
influencing policy selections associated with cyber defense at each
a national and international level.
Thank U:)