Professional Documents
Culture Documents
CYBER SECURITY
CONTENT
PAGE NO.
1. CYBER
SECURITY............................................................
.......................... 1
1.1.1
WHAT
IS
CYBER
SECURITY............................................................
...... 2
1.1.2
WHY
IS
CYBER
SECURITY
IMPORTANT............................................ 2
1.2
HOMELAND
SECURITY............................................................
..............
1.2.1
INTRODUCTION...................................................
.................................
1.2.2 EVOLUTION OF HOMELAND SECURITY
CONCEPT.....................
1.2.3
WHAT
DHS
DO
IN
HOMELAND
SECURITY......................................
1.2.4
DIVISION
IN
HOMELAND
SECURITY
INVESTIGATION...............
1.2.5
GOALS
OF
HOMELAND
SECURITY...................................................
1.2.6
CONCLUSION......................................................
....................................
2
2.
CYBER
CRIME................................................................
..............................
2.0.1
INTRODUCTION...................................................
..................................
2.0.2
WHAT
IS
CYBER
CRIME................................................................
.......
2.0.3
CAUSE
OF
CYBER
CRIME................................................................
.....
2.0.4
TYPES
OF
CYBER
CRIME................................................................
......
2.0.5
HOW
TO
ERADICATE
CYBER
CRIME.................................................
2.1.0
ESTONIA
CASE..................................................................
......................
2.1.1
INTRODUCTION...................................................
....................................
2.1.2
ETHNIC
TENSIONS
IN
ESTONIA..........................................................
2.1.3 MULTINATIONAL RESPONSES TO CYBER
TERROR........................
2.1.4
CONCLUSION......................................................
.......................................
3
2.2.0
ATHENS
AFFAIR:
THE
WIRETAP
CASE...............................................
2.2.1INTRODUCTION............................................
..............................................
2.2.2
DISCOVERY
OF
ILLEGAL
TAPS..............................................................
2.2.3
FALLOUT.............................................................
.........................................
2.2.4
CONCLUSION......................................................
.........................................
1.1.1 WHAT IS CYBER SECURITY?
With
the
growing
volume
and
sophistication of cyber attacks, ongoing
attention is required to protect sensitive
business and personal information, as
well as safeguard national security.
During a Senate hearing in March 2013,
the nation's top intelligence officials
warned that cyber attacks and digital
spying are the top threat to national
security, eclipsing terrorism.
cyber crime
2.0.1INTRODUCTION
O
Over the past twenty years,
unscrupulous computer users have
continued to use the computer to
commit crimes; this has greatly
fascinated people and evoked a mixed
feeling of admiration and fear. This
phenomenon has seen sophisticated
6
Theft
of
telecommunication
services
Communication in furtherance of
criminal
c
conspiracies
Telecommunication piracy
Dissemination
of
offensive
material
Illegal
interception
of
telecommunications
11
12
HOMELAND
SECURITY
14
1.2.1INTRODUCTI
ON
Homeland security is an American
umbrella term for "the national effort to
ensure a homeland that is safe, secure,
and resilient against terrorism and other
hazards where American interests,
aspirations, and ways of life can thrive
to the national effort to prevent terrorist
attacks within the United States, reduce
the vulnerability of the U.S. to terrorism,
and minimize the damage from attacks
that do occur.
Ten years after the 9/11 terrorist
attacks,
policymakers
continue
to
grapple with the definition of homeland
security. Prior to 9/11, the United States
15
19
Borders
and
Maritime
Security
Division:
Prevents
contraband, criminals, and terrorists
from entering the United States,
while permitting the lawful flow of
commerce and visitors.
Chemical
and
Biological
Defence Division: Detects, protects
against, responds to, and recovers
from biological or chemical threats
and events.
Cyber
Security
Division:
Creates a safe, secure, and resilient
cyber environment.
Resilient Systems Division:
Enhances resilience to prevent and
protect against threats, mitigates
hazards, responds to disasters, and
expedites recovery.
1.2.6 CONCLUSION
21
ESTONIA CASE
22
2.1.1 Introduction
During the information age,
the Internet has facilitated dramatic
increases in worldwide interconnectivity
and communication. This form of
globalization has yielded benefits, such
as improved standards of living in the
developing world, but it has also given
rise to new weapons of resistance for
groups seeking to oppose certain
political measures and ideologies. One
demonstration of the latter point came
about through the cyber attacks on
Estonia in April and May 2007 by digital
activists from the Russian diasporas.
This
article
examines
these
23
fundamentally
political
attacks
in
cyberspace within the overall context of
globalization. It argues that the situation
that unfolded in Estonia in the spring of
2007 illustrates the increasing ability of
transnational networks to use digital
tools to challenge the policies and
sovereignty of nation-states worldwide.
However, the multinational responses to
the Estonian cyber terrorist attacks
demonstrate the growing interest of
states in defending national sovereignty
in the realm of cyberspace.
government
Computer
Emergency
Response Team (CERT) required Finnish,
German,
Israeli,
and
Slovenian
assistance to restore normal network
operations.
NATO
CERTs
provided
additional assistance, while the EU's
European Network and Information
Security Agency (ENISA) offered expert
technical assessments of the developing
situation. Further, a high level of
intelligence sharing took place among
western countries during the crisis.
While
Russian-speaking
hackers
employed the Internet as a weapon and
tool of mobilization, Estonia and its
allies
used
digital
networks
to
successfully counter the attacks. During
and after the DDoS strikes, NATO and EU
member states began to debate new
directions for cyber security and the
appropriate punishments for states
found to have engaged in digital
warfare.
Sanctions
were
one
punishment option that received fairly
widespread support. Additionally, one
German official even recommended that
NATO consider extending its Article 5
28
2.1.4 Conclusion
The severity of the Estonian
cyber attacks served as a wake-up call
to the world, as it became clear that
potentially autonomous transnational
networks like unhappy pro-Kremlin
29
"hacktivists"
could
avenge
their
grievances by digitally targeting and
nearly
crippling
the
critical
infrastructure
of
technically
sophisticated nation-states. In the
future, an enhanced focus on cyber
security
and
new
multinational
strategies and institutions will be
instrumental in countering electronic
threats to the sovereignty and survival
of states. However, the world of
information security is not unlike the
traditional global security environment;
for each visible action, there is
oftentimes a commensurate reaction.
The attacks on Estonia will likely
encourage
future
groups
of
transnational imitators, and the events
of spring 2007 have provided states
with important information for the
further development and improvement
of their own cyber-warfare capabilities.
The benefits of the
information age are numerous, but
nascent threats like transnational cyber
terrorism and information warfare exist
alongside the positive aspects of
30
31
2.2.1 INTRODUCTION
32
34
2.2.3 FALLOUT
The investigation into the
matter was further hampered when
Greek law enforcement officials began
to make accusations at both Vodafone
and Ericsson, which forced experts on
the defensive. .A recent appeal of the
main opposition party, PASOK, to form
an
investigating
parliamentary
committee
was
rejected
by
the
governing party.
37
2.2.4 CONCLUSION
So what can this affair teach
us about how to protect phone
networks? Once the infiltration was
discovered, Vodafone had to balance the
need for the continued operation of the
network
with
the
discovery
and
prosecution of the guilty parties.
Unfortunately,
the
responses
of
Vodafone and that of Greek law
enforcement were both inadequate.
Through Vodafone's actions, critical data
were lost or destroyed, while the
perpetrators not only received a warning
39
40
41