Friday, June 14, 2019

Cases of cyber attacks Case Study Example | Topics and Well Written Essays - 1000 words

Cases of cyber ack-ack guns - Case Study ExampleThe historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to glide path integrity another.Instead of bullets and guns, critical websites of governing and news agencies are hacked or defaced to express political statement and display of IT power. In this paper,a comparison of three cases of cyber terrorism would be discussed to alter people understand the nature, power and threat caused by cyber fervidnesss. Likewise, the governments initiatives to response to similar threats in the future are also included in this report. The case of the cyber attack in Estonia. In 2007, Estonia experienced a massive DDOS attack which paralyzed most of its government websites. Although Russian authorities denied the attack, the Estonian government highly believed that it was from Russia. The attack happened after a political issue which involved removing Estonias transfer of a S oviet war memorial in Talinn to a military memorial park ( A cyber riot, The Economist.com). The cyber attack is considered a DDoS or Distributed Denial Of Service. According to searchsecurity, techtarget.com, DDoS happens when a multitude of compromised systems attack a single target, thereby causing a demurral of service hence, the target system is push upd to shut down which pr emergences legitimate users to receive service. The main targets were banking institutions, schools, government websites and other institutions however, the first launch targeted government sites. The governments response was to shutdown all mobile phone networks as well as banking systems which really caused a lot of inconvenience to the public. The event was catastrophic enough to prompt NATO security experts to head to Estonia and investigate on the matter. A youth conclave known as Nashi meaning Our claimed the attack through its spokes person Konstantin Goloskokov which was funded by private bus iness groups ( Shachtman, Wired.com). Estonia has reacted by creating a Cyber Defense League composed of specialists. It also came up with a Cyber certification Strategy in 2008 that would provide as framework for improving its defense against cyber attacks. Ossetias cyber-attack on Georgia in 2008 In 2008, Russia was accused by Ossetia for hacking its government and commercial websites. The attack on Georgia was believed to be a part of Russias military support in South Ossetia. The target of the attack included government websites harmonize to a report on smh.com.au, the cyber attack included 1. The Georgian Parliament main website has been defaced. The website content showed images of Adolf Hitler which replaced the picture of then Prime Minister Saakashvili 2. The servers of Azerbaijani mean solar day was disabled As a result, some of the governments website like Ministry of Foreign Affairs created a temporary site on the Google Blogger to safely mobilise information. Even ne ws agency servers were attacked that time which really alarmed other countries. The main culprit of the attack was South Ossetia Hack Crew which came from a group of programmers from Russia. Today.az reported that Russian intelligence services were responsible for the attack (today.az,2008). The cyber attack is similar to the DDoS attack that happened in Estonia in 2007. As aforementioned, a DDoS attack would force the target to shut down which denies the legitimate users to access the site. After the attack, different governments such as Ukraine, Poland and Estonia helped Georgia by mirroring the web pages, it was a historic bite in history when Estonia came to the aid of this country (Schachtman, 2008 July). Indeed, Georgia learned a valuable lesson like Estonia which prompted its government to focus on cyber security measures. The National Security Council of Georgia created a Computer Emergency Response Team that can immediately respond to cyber attacks. Similarly, it has been enhancing security measures by continuously monitoring government websit

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.