Combating Cyberterrorism cyberterrorism

advertisement
Combating Cyberterrorism
As a general definition, cyberterrorism can be described as the use of computing
resources to intimidate or coerce a government, civilian population, or any other segment
of a nation’s citizenrywith political or social objectives. It is important that IT
professionals be aware of possible threats that cyberterrorism can cause, especially in
areas where information security is critical.
Although many people only started worrying about cyberterrorism in the aftermath of the
September 11, 2001, attacks, this threat was present even before these attacks. With the
boom of the Internet in the past decade, financial institutions, utilities companies, healthcare organizations, and even governmental institutions started moving critical functions
and information to networks. Now, many companies have almost all their operations
automated, and their infrastructure (including their most critical applications) relies on
network processes. Unfortunately, this infrastructure might not be secure enough to
withstand the brunt of cyberattacks.
Until recently, terrorists have not considered the Internet a target because it could not
disrupt nationwide operations. Moreover, until now, terrorists preferred a headlinesgrabbing visual impact for their attacks, such as a crashing building or a shoe bomb,
rather than disrupting information and communications infrastructure through
technology.
It is important to differentiate between hackers and cyberterrorists. Hackers work on their
own, usually for fun or for monetary gain; this means they are loners who are motivated
by self-interest or finances. Cyberterrorists, in contrast, are part of a well-organized
terrorist network, whose actions are driven by political or social ideologies. Although
terrorist organizations could enlist a professional hacker to initiate a cyberattack, the
hacker’s interest in handsome monetary gain is likely to be at the bottom of their
willingness to consort with and assist a terrorist organization.
The U.S. government has taken several steps to address the threat of cyberterrorism. The
creation of a secure intranet, called GovNet, to support sensitive government operations
is one of these steps. However, GovNet has been the target of verbal attacks from several
experts who think it will not stop cyberattacks. Needless to say, this has created some
controversy for GovNet. Another step has been the establishment of a link between
government and private industry to create an environment for sharing information about
attacks.
Wall Street IT executives are supportive of the idea of creating a centralized mechanism
for alerts and access to information about hacking and terrorist threats. On the other hand,
they point out that today, most of the attacks come from insiders; this means that people
with access to the organization’s networks can use this power for harmful purposes.
Therefore, many security experts contend that companies should base the thoroughness of
employee background checks on the sensitivity of the position they have (or will have)
inside the organization.
In October 2001, the Gilmore Commission, headed by Virginia governor James Gilmore,
outlined specific steps to protect critical infrastructure. The commission recommended
the creation of a nonprofit entity between the private sector and the government to solve
conflicts about sharing security information. It also outlined the need for a cybercourt to
address information security issues and the creation of a body to prepare a plan for
information security research and development.
We must not overlook that the targets of cyberattacks can extend beyond government
organizations and corporations; our personal computers and our most sensitive and
individual information may also be vulnerable to attack. How can we “regular” citizens
protect our computer systems from cyberattacks? Some basic steps such as setting
password controls for all our personal accounts, avoiding easy-to-guess passwords, and
checking logs that can detect an intruder can make our systems less easy targets for
cyberattacks. Unfortunately, there are no foolproof mechanisms for protecting a system,
so maybe we should consider isolating devices storing our most critical information from
outside connection.
Many private organizations have developed sophisticated mechanisms to protect their
corporate networks. Most of them use a combination of hardware and software, such as
security routers, firewalls, encryption software, and intruder detection systems, to protect
their private network from hackers and cyberterrorism. A variety of increasingly
sophisticated security tools are available, and network managers should carefully choose
the combination that best fits the company’s purposes and best protects the company’s
data and infrastructure integrity.
Download