Cyberwar- The Battle of a New Frontier - Edward Forde_b
-
Upload
edwardsforde -
Category
Documents
-
view
215 -
download
0
Transcript of Cyberwar- The Battle of a New Frontier - Edward Forde_b
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
1/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 1
Cyberwar: The Battle of a New Frontier
Edward S. FordeJune 4, 2011
Email: [email protected]
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
2/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 2
Cyberwar - The battle of a new frontier
Table of Contents .....................................................................................P. 2
Abstract ....................................................................................................P. 3
Cyber Terms ............................................................................................P. 4
Introduction................................................................................................P. 8
Can Cybersecurity protect us in the cyberwar through cyberspace? ...........P. 9
Potential benefits and obstacles to overcome...........................................P. 10
Who should be in charge of cyber security? .............................................P. 11
Who are the likely cyber criminals? ..........................................................P. 12
What methods or tactics are they using? .....................................................P. 14
What impact does Cyberterrorism have on government, commercial and private
companies? ............................................................................................. P. 16
Can Cyber Weapons be considered Weapons of Mass Disruption?.............P. 17
How can we fix our cyber defense? .......................................................... P. 18
Conclusion ................................................................................................ P. 23
References................................................................................................. P. 24
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
3/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 3
Abstract
This research is a review of cyberwar and the Cybersecurity of cyberspace.
Physical War has been around forever but our new enemy lurks out on the frontier of
cyberspace. There is an overwhelming amount of articles pertaining to cyberspace and
the cyberwar, but where do we mount our research for our Cybersecurity? Even though
Cybersecurity is not only being fought by governments, it is being fought by universities,
corporations, private businesses all the way down to the home users. Protecting our
network defenses regardless if they are military or commercial, are vital to our daily
growth and protection as a nation. As IT professionals, are we doing enough to protect
our commercial businesses, government networks, private homes and employees from
social networking, cyberattacks and cyber thugs? Providing our organizations with
information assurance polices against this cyber war gives the Information Technology
professional the availability, integrity, authentication, confidentiality, and non-repudiation
to protect us in the battle of a new frontier.
Keywords: cyber, war, Information Assurance, Defense in Depth, security, hacker
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
4/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 4
Cyber Terms:
Cyber - A prefix used in a growing number of terms to describe new things that are
being made possible by the spread of computers (Webopedia, 2011).
Cyber Operator - working on behalf of a government wants to acquire a high priority
technology or carry out a mission that serves his government's interests(Ruiz, 2011).
Cyberpunk - a term loosely describing an antisocial individual conforming to a peculiar
lifestyle characterized by an obsession with both computers and the dark side of the
Internet (Steed, 2001).
Cyberspace - the abstract, non-physical world made up of networked computers where
people communicate, shop, study, research, play, socialize and other-wise interact
(Steed, 2001).
Cybertown - a virtual community set in the latter half of the 21st Century that may be
accessed through the Netscape Web browser, Netscape Navigator (Steed, 2001).
Cyber crime - encompasses any criminal act dealing with computers and networks(called hacking) (Webopedia, 2011).
Cyber operator - working on behalf of a government wants to acquire a high priority
technology or carry out a mission that serves his government's interests (Ruiz, 2011).
Cyber Security - enables an organization to practice safe security techniques required
to minimize the number of successful cyber security attacks (Techni Core, 2011).
Cyber Terrorist - A cyber terrorist (which we haven't seen too many of yet) wants to
cause chaos (Ruiz, 2011).
Cyber Warrior - a Network Warfare and Ops Squadron fights battles 24/7 from a
building in a nondescript office park here at Lackland Air Force Base (Munro, 2007).
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
5/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 5
Denial of service attacks (DoS) - are designed to lock out legitimate users from web
sites or networks. Hackers run programs that repeatedly request information from the
victim's computer until that computer is unable to answer any other requests. Hackers
can run programs of automated scripts that barrage the victim computer or network so
that it becomes unusable by legitimate users, or even has to be shut down.
Distributed denial of service attacks (DDoS) - are automated attacks that run
simultaneously from multiple computers. Hackers can plant Trojan horse programs on
the computers of unsuspecting accomplices throughout the network or internet. At a
given hour, all involved computers coordinate requests for information from theoverloaded victim computer.
DNS Spoofing - When you point your browser to randomsite.com, your computer will
look up that entry in a massive directory called the Domain Name Service (DNS)
database, and then send you to the appropriate site.
Hacker - someone involved in computer security/insecurity, specializing in the discovery
of exploits in systems (for exploitation or prevention), or in obtaining or preventing
unauthorized access to systems through skills, tactics and detailed knowledge (Pursuit
Magazine, 2010).
Malware - software designed to infiltrate or damage a computer system without the
owners informed consent. The term is a portmanteau of the words malicious and
software (Pursuit Magazine, 2010).
Packet Sniffers - were initially designed as a tool for system administrators to help
debug networking problems. Essentially, they are devices which allow the user to
intercept and interpret "packets" of information traversing a network. Any information
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
6/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 6
shared among a network of computers--username/password pairs, email, files being
transferred--gets translated into "packets," which are sent out across the network.
Phishing - is an attempt to criminally and fraudulently acquire sensitive information,
such as usernames, passwords and credit card details, by masquerading as a
trustworthy entity in an electronic communication. PayPal, eBay and online banks are
common targets (Pursuit Magazine, 2010).
Rootkit - a program (or combination of several programs) designed to take fundamental
control (in UNIX terms root access, in Windows terms Administrator access) of a
computer system, without authorization by the systems owners and legitimatemanagers. Access to the hardware (i.e., the reset switch) is rarely required as a rootkit
is intended to seize control of the operating system running on the hardware (Pursuit
Magazine, 2010).
Social engineering - is a hacker term for deceiving or manipulating unwitting people
into giving out information about a network or how to access it.
Trojans horse programs - Trojans horse programs are "back doors" into a computer
system. A hacker may disguise a Trojan as another program, video, or game, in order to
trick a user into installing it on their system. Once a Trojan is installed, a hacker could
have access to all the files on a hard drive, a system's email, or even to create
messages that pop up on the screen. Trojans are often used to enable even more
serious attacks.
Web Defacements - hacker gains access to these files, he or she can replace or alter
them in any way. The Republican National Committee, the CIA, and The New York
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
7/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 7
Times are just three of the highly publicized web page defacements over the past few
years.
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
8/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 8
Cyberwar: The Battle of a New Frontier
Introduction
The battle of a new frontier is where you find most IT professionals fighting this
cyberwar. Cybersecurity are measures taken to protect a computer or computer system
(as on the Internet) against unauthorized access or attack (Merriam-Webster, 2011).
Protecting our businesses, employees, network defenses regardless if they are military
or commercial, are vital to our daily growth and protection as a nation. All of our
personal information is just sitting on commercial servers, databases and storage
arrays. Even government defense information that could cripple our infrastructure is
vulnerable to attacks.
Cybersecurity requires everyone in the world to fight these emerging new threats.
Cybersecurity is not only being fought by governments, it is being fought by universities,corporations, private businesses all the way down to the home users. Protecting our
network defenses regardless if they are military or commercial, are vital to our daily
growth and protection as a nation. All of our personal information is just sitting on
commercial servers, databases and storage arrays. Even government defense
information that could cripple our infrastructure is vulnerable to attacks.
Organizations have a choice to protect themselves against cyberthreats. At one
end of the continuum is the choice to do nothing: take your chances and hope for the
best. At the other end is the company that locks down everything (Plfeeger and Ciszek
2008).
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
9/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 9
Can Cybersecurity protect us in the cyberwar through cyberspace?
In this cyberwar, cyberspace is unlimited and our enemies have no faces that we
can see at first glance. Policy, procedures and standards must be adhered to in order
to combat these cyberpunks from penetrating our interior walls. Without standards, we
have chaos. According to Techni Core (2011), "Cyber Security standards have been
created due to the amount of sensitive information now stored on systems attached to
the Internet (Cyber Security, para. 1). Techni Core (2011) also states that, Tasks that
were once completed by hand are carried out by Information Systems; therefore, there
is a need for Cyber Security and Information Assurance (IA) (Cyber Security, para. 1).
According to the Headquarters Department of the Army (2007) Information
Assurance policy mandates roles, responsibilities, and procedures for implementing the
Army Information Assurance Program" (p. 1). Having these Information Assurance
principles and polices in place, also ensures that private businesses, banks, electric and
gas companies are protected from these cyber criminals, cyber terrorists and cyber
operators. The National Information Systems Security (INFOSEC) (2000) states,
Information Assurance is achieved when information and information systems are
protected against such attacks through the application of security services such as:
Availability, Integrity, Authentication, Confidentiality, and Non-Repudiation.
In order to apply defense in depth techniques and put cyber security polices in
place, you must have buy in from senior management. Without buy in from senior
management, you will have a harder time guarding against cyber terrorism. Once you
have the go ahead, these polices and techniques should include: security policy,
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
10/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 10
Information Assurance principles, system level Information Assurance architectures and
standards, criteria for needed Information Assurance products, acquisition of products
that have been validated by a reputable third party, configuration guidance, and
processes for assessing the risk of the integrated systems (The National Information
Systems Security (INFOSEC), 2000). Information technology professionals are their
own worst enemies. They too should apply to their own standards maintain policies
such as: Analog/ISDN/VoIP Line Policy, DMZ Lab Security Policy, Remote Access
Policy, Router Security Policy, The Third Party Network Connection Agreements and a
VPN Security Policy.
Potential benefits and obstacles to overcome.
From this research, it seems clear that keeping up with todays cyberwar is a
hard task. Cyber crime grows faster than weeds and their tactics changes like the wind.
Cyber warriors are even harder to come by because of the lack of training and skills.
Since the Information Technology field is so vast, IT Specialists require a continuous
updates to their education, certifications and knowledge. Without the updates, they will
be obsolete to their duties at hand. To combat these cyber thugs, governments are
training their cyber operators (a.k.a. cyber spooks) to use the Internet for espionage
purposes (Pfanner, 2011).
According to Lynn (2010), cyberwarfare is asymmetric. The low cost of
computing devices means that U.S. adversaries do not have to build expensive
weapons, such as stealth fighters or aircraft carriers, to pose a significant threat to U.S.
military capabilities. A dozen determined computer programmers can, if they find a
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
11/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 11
vulnerability to exploit, threaten the United States' global logistics network, steal its
operational plans, blind its intelligence capabilities, or hinder its ability to deliver
weapons on target (Lynn, 2010, p.98).
Cyber defense is just a piece of the pie for Cybersecurity. According to
Saydiari (2004) we can define cyber defense from its component words. Cyber, short
for cyberspace, refers to both networked infrastructure (computers, routers, hubs,
switches, and firewalls) and the information assets (critical data on which an
organization depends to carry out its mission) (p. 52). Defense is the act of making safe
from attack. Therefore, cyber defense refers to an active process of dependably makingcritical function safe from attack (SAYDIARI, 2004).
Who should be in charge of cyber security?
Since all of these networks, computers, internet protocols, software and
networking hardware are used by everyone; cybersecurity should not fall to one person,
company or government agency, cyber security should on all parties and combat the
issues together. But, this is an even harder task. Sharing of information is not a
common practice between government and commercial entities. We do have software
companies that release fixes that produced vulnerabilities, but what happens to those
government agencies that find these vulnerabilities and choose to keep it from the
public because they are now able to exploit their enemies defenses. That still leaves
us and them vulnerable to other cyber criminals for exploitation.
According to Zetter's (2009) article titled, NSA DOMINANCE OF
CYBERSECURITY WOULD LEAD TO GRAVE PERIL, EX-CYBER CHIEF TELLS
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
12/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 12
CONGRESS , the intelligence community has always and will always prioritize its own
collection efforts over the defensive and protection mission of our governments and
nations digital systems. High levels of classification prevent the sharing of information
necessary to adequately defend our systems and creates insurmountable hurdles when
working with a broad range of government that lack appropriate clearances, no
communication and partnership with the private sectors (Zetter, 2009).
Sharing the responsibility of cyber initiatives with the cyber town is just like
sharing the responsibility with the open source software community. It gives everyone
an opportunity to communicate, find and repair the holes in our networks, computers ansoftware packages, so we can mount a proper cyber defense. According to Wheeler
(2003) The advantages of having source code open extends not just to software that is
being attacked, but also extends to vulnerability assessment scanners and they should
intentionally look for vulnerabilities in configured systems (p. 12). These same
principles can apply to the sharing of resources and initiatives when it comes to fighting
cyber crimes.
Who are the likely cyber criminals?
In order to understand who the cyber criminals are, you must also understand the
differences in the various types of hackers. In Charles (2008) article, The type of
hackers: Black Hat, White Hat or Grey Hat Hacker, Which Type are you?, states:
a) A white hat hacker is a computer and network expert who attacks a
security system on behalf of its owners or as a hobby, seeking vulnerabilities that a
malicious hacker could exploit. Instead of taking malicious advantage of exploits, a
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
13/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 13
white hat hacker notifies the system's owners to fix the breach before it is can be taken
advantage of.
b) A black hat is a person who compromises the security of a computer
system without permission from an authorized party, typically with malicious intent. A
black hat will maintain knowledge of the vulnerabilities and exploits they find for a
private advantage, not revealing them to the public or the manufacturer for correction.
c) A grey hat is a skilled hacker who sometimes will act legally and other
times may not. They are a cross between white hat and black hat hackers. They usuallydo not hack for personal gain or have malicious intentions, but may or may not
occasionally commit crimes during the course of their technological exploits (Charles,
2008).
The type of cyber criminals we have been focusing on in this research are known
as black hats, crackers and hackers. In the world of cyberspace we will not seeairplanes crashing into buildings or bombs exploding on trains but we could see human
and economic consequences that are very much on par with traditional acts of terrorism
(Chertoff, 2008). In the world of cyberspace, we will see the cyber criminals, hackers,
cyber operators from other governments that wish to infiltrate, steal and cause chaos.
Computers at the Pentagon, since 9/11 attacks, have been attacked by attempted
intrusions estimated at 100,000 times a year (Marshall, 2010). Google announced in
January of this year, that they were pulling out of China because of a highly
sophisticated and targeted attack on their corporate infrastructure originating from China
that resulted in the theft of intellectual property from Google (Marshall, 2010).
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
14/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 14
All criminals pursue the path of least resistance More than half of all computer
breaches occur in the retail and food and beverage industries, which have fewer
Cybersecurity safeguards than, for example, the financial services sector, which
handles vast amounts of money and generally has sophisticated safeguards (see figure
1) (Marshall, 2010). By hacking these computer systems enables the hackers to use
those computers as zombies to penetrate other computers.
Figure 1 (Marshall, 2010).
What methods or tactics are cyber criminals using?
Some network security attacks are listed below (Weng and Qin, 2007):
a) Email Based Network Security Attacks
b) Logon Abuse Attacks
c) Spoofing Attacks
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
15/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 15
d) Intrusion Attacks (Vlachos, Androutsellis-Theotokis and Spinellis).
e) Denial of Service (DoS) Network Security Attacks
f) Worms & Trojans
g) Web page defacing
These cyber criminals have been known to use malware, launching of phishing
attacks, rootkits and viruses to penetrate our defenses. They don't always have to use a
computer's front or back door in order to get in; they use deceit like social engineering to
obtain personnel information that allows them sometimes faster and deeper access on
our networks. One of the most notorious hacker of all time that used a lot of socialengineering was Kevin Mitnick. He was considered the most famous hackers of all
time. He has over twenty years of experience circumventing information security
measures and has successfully breached information security at the IRS and the Social
Security Administration using social engineering techniques (Frontline, 2001).
In 2008, the U.S. Department of Defense suffered a significant compromise of its
classified military computer networks. It began when an infected flash drive was
inserted into a U.S. military laptop at a base in the Middle East (Lynn, 2010, p.98).
Gen. Keith Alexander, director, National Security Agency Commander, U.S. Cyber
Command was quoted saying, "that the U.S. military is responsible for protecting more
than 7 million machines, linked through 15,000 networks with 21 satellite gateways and
20,000 commercial circuits composed of countless devices and components"
(McCluney, 2010, para. 10). Further evidence is provided in the same article which also
stated, "National and military information infrastructures are heavily intertwined and as a
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
16/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 16
result, Defense Department (DoD) systems are probed by unauthorized users 250,000
times an hour, over 6 million times a day"(McCluney, 2010, para. 10).
What impact does Cyberterrorism have on government, commercial and private
companies?
Cyberterrorism has a huge impact government, businesses and home users.
According to the National Research Council (2002), cyberattacks could compromise
systems and networks in ways that could render communications and electric power
distribution difficult or impossible, disrupt transportation and shipping, disable financial
transactions, and result in the theft of large amounts of money. A successful attack maylay a foundation for later attacks, be set to cause damage well after the initial
penetration, or enable the clandestine transmission of sensitive information stored on
the attacked system (National Research Council, 2002, p. 5).
The impact of risk that cyberterrorism has on government, commercial and
private companies are enormous. According to McDowell (2004, 2009), among these
dangers are viruses erasing your entire system, someone breaking into your system
and altering files, someone using your computer to attack others, or someone stealing
your credit card information and making unauthorized purchases. In either case,
malicious acts against a network can cause systems to go down. Losses to production,
loss of revenue, loss of information could be crippling to organizational viability and
sustainment. According to Harreld and Fonseca (2001) Information security is a
business risk-management issue, and implementation is the responsibility of every
person at a company (p. 37).
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
17/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 17
Chertoff (2008) believes that this could happen in the event of a successful cyber
attack:
1. A successful cyber attack could shut down essential government services,
imperil business operations, erode public trust in financial transactions, and
disrupt electronic communications.
2. The impact of a cyber attack could be far-reaching indeed, threatening multiple
sectors of the economy at once and creating cascading effects across
interdependent systems and operations.
Can Cyber Weapons be considered Weapons of Mass Disruption?Weapons of Mass Destruction were once considered nuclear, radiological, and
biological weapons. Welcome to the World Wide Web, where one click of a mouse
could bring an entire corporation or government down to its knees. One slip of a
tongue, an individual leaves a password exposed, and you could lose your identity. In
cyberspace, these weapons of mass destruction can destroy everything if we are not
protected.
Most people to include the United States government consider cyber weapons to
be weapons of mass destruction. One such threat is that of malicious code being
embedded in firmware of computer or application software from foreign suppliers. The
government has found that foreign suppliers of software or computers have slip in
harmful code in amongst the tens of millions of lines of code that comes installed on the
hard disk. Many of times, they have added this harmful code to the BIOS (Basic
Instruction Operating Set). According to Technolytics Institute (2007) Every time you
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
18/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 18
turn on the computer or other device, the malicious code would initiate and wait to arm
itself and become a cyber weapon (p. 2).
How can we fix our cyber defense?
According to Techni Core (2011), "U.S. Government entities have an even higher
and more pressing urgency to implement the strictest form of Cyber Security practices
to secure its information up to the highest classified level. The need for Cyber Security
within the Government Information Systems is especially critical since many current
terrorist and espionage acts are organized and facilitated using the Internet(Cyber
Security, para. 3). Plfeeger and Ciszek (2008) propose a four-step process can help
organizations evaluate assets to be protected, potential assailants, and likely methods
and tactics:
Ranking and Risk Analysis
Methods of Protection
Gap Analysis and Ranking
Identify Course of Action
Commercial businesses have a need for cyber security to protect their trade
secrets, proprietary information, HIPAA-regulated medical and personal information,PCI compliance, and personally identifiable information (PII) of customers or employees
(Techni Core, para. 2). According to CERT Software Engineering Institute (2001),
"Security risks arise from the possibility of intentional misuse of your computer by
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
19/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 19
intruders via the Internet (III, para. A). Information security is concerned with three main
areas:
Confidentiality - information should be available only to those who rightfully have
access to it
Integrity -- information should be modified only by those who are authorized to do
so
Availability -- information should be accessible to those who need it when they
need it (CERT Software Engineering Institute, 2001).
The Department of Defense has been fighting back these cyber criminals with
their own cyber spooks from the National Security Agency called the Red Team. NSAs
Red Team according to Derene (2008), are sort of like the Special Forces units of the
security industryhighly skilled teams that clients pay to break into the clients' own
networks. For commercial and government agencies, these guys find the security
flaws so they can be patched before someone with more nefarious plans sneaks in
(Derene, 2008).
We can fix our cyber defense by using these nine objectives in our IT security:
1. Having a strong, effective information security program consisting of many
layers (Spontek, 2006).
2. Create what security professionals refer to as a "defense in
depth."(Spontek, 2006).
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
20/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 20
3. Create well-designed IT security program are to make any unauthorized,
unwanted access to your information systems extremely difficult, easily
detected and well-documented (Spontek, 2006).
4. Firewalls, virus filters, intrusion detection systems, monitoring programs
and usage policies are all essential components of a strong defense
(Spontek, 2006).
5. Ensure that adequate information security tools are available, everyone is
properly trained in their use, and that enough time is available to use themproperly. Then hold all personnel accountable for their information system
security practices.
6. Conduct frequent, unannounced red-team penetration testing of deployed
systems and report the results to responsible management (National
Research Council, 2002, p. 13).
7. Promptly fix problems and vulnerabilities that are known or that are
discovered to exist.
8. Mandate the organization-wide use of currently available
network/configuration management tools, and demand better tools from
vendors.
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
21/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 21
9. Use defense in depth - design systems under the assumption that they
could be connected to a compromised network or a network that is under
attack, and practice operating these systems under this assumption.
The three biggest reasons these cyber criminals are still getting into commercial
and government networks is because of the lack of end user training, lack of updated
protocols, lack of defense in depth techniques and security policies not being enforced.
If there is little to no training or security policies for employees then it will be easier for
these hackers to apply their techniques into your organizations.
The best way of guarding against Cyberterrorism (Harreld and Fonseca, 2001):
1) Protect what you consider most critical to business operations, assets, and
continuity.
2) Have intrusion detection so you'll know when intruders get around your defenses.
3) Have a response team and a response plan.
4) Tighten rules for inbound traffic.
5) If you don't do business with addresses in certain countries or regions, consider
denying those IP blocks at your gateways.
6) Ports are just as important in your defensive strategy as IP addresses.
7) Establish a good security and disaster-recovery posture for your networks.
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
22/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 22
8) Consider special insurance designed to cover Internet-and network-related
damage or loss.
9) Notify all users on your networks not to open suspicious e-mail attachments.
10)Force anti-virus updates throughout the network and direct all users, particularly
those with laptops, to power up and update their anti-virus before conducting any
business on the computer.
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
23/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 23
Conclusion
Apparently, some of the information technology professionals are not doing their
due diligence. Policy, procedures and security standards must be adhered to in order to
combat these cyberpunks from penetrating our interior walls. Without security
standards, we have chaos. Having a policy for everything is better than not having any
polices. As stated earlier, Information Assurance is achieved when information and
information systems are protected against such attacks through the application of
security services such as: Availability, Integrity, Authentication, Confidentiality, and Non-
Repudiation.
Training is another aspect in the battle of a new frontier we see as the cyberwar.
According to Mallery (2008) Security is a very specialized area and requires
appropriate training and knowledge. As IT professionals, we must be in a position to
both identify vulnerabilities on a network, but also be in a position to identify attack
patterns on the network (Mallery, 2008). Training is not only for Information Technology
professionals, but for the employees as well. IT professionals must obtain and possess
the knowledge; wisdom and understanding to pass on in layman terms so that their
employers are able to get a better understanding of the war they are fighting. Without
assistance or buy in from senior management, the IT professional will find resistance
and their battle in the cyberwar will be lost.
-
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
24/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 24
References
Biddick, M. (2010, August). GAP IN FEDERAL IT STRATEGY. InformationWeek,(1275),
36. Retrieved January 22, 2011, from ABI/INFORM Global. (Document ID:
2114712641).
Brandt, A. (2009). HIGH-RISK SECURITY THREATS (AND HOW TO FIX THEM).
(Cover story). PC World, 27(3), 62-70. Retrieved from EBSCOhost.
CERT SOFTWARE ENGINEERING INSTITUTE. (2001). CERT Coordination Center
Home Network Security. Retrieved from
http://www.cert.org/tech_tips/home_networks.html#III-A
Charles, K. (2008). THE TYPES OF HACKERS: BLACK HAT, WHITE HAT OR A
GREY HAT HACKER, WHICH TYPE ARE YOU?. Examiner.com, 2008( 8), 1.
Chertoff, M. (2008). THE CYBERSECURITY CHALLENGE. Regulation & Governance,2(4), 480-484. doi:10.1111/j.1748-5991.2008.00051.x
Clapper, D. (2011, January). STOLEN DATA AND FRAUD: THE HANNAFORD
BROTHERS DATA BREACH. Journal of the International Academy for Case
Studies: Special Issue Number 1,121-130. Retrieved January 22, 2011, from
ABI/INFORM Global. (Document ID: 2243561531).
Coleman, K. G. (2007). CYBER WARFARE. Technolytics, 2007(1), 1-7.
http://www.cert.org/tech_tips/home_networks.html#III-Ahttp://www.cert.org/tech_tips/home_networks.html#III-A -
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
25/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 25
Denning, D. E., & Smith, G. (2003). TIGHTER CYBERSECURITY. Issues in Science &
Technology, 20(1), 7-8. Retrieved from EBSCOhost.
Frontline. (2001). THE TESTIMONY OF AN EX-HACKER. Retrieved from
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/testimony.html
Fulghum, D. A. (2009). EMBRACING CYBERWAR. Aviation Week & Space
Technology, 170(25), 49. Retrieved from EBSCOhost.
Gregory Goth. 2009. U.S. UNVEILS CYBERSECURITY PLAN. Commun. ACM 52, 8
(August 2009), 23-23. DOI=10.1145/1536616.1536626
http://doi.acm.org.library.capella.edu/10.1145/1536616.1536626
Hansen, B. (2002, April 12). CYBER-CRIME. CQ Researcher, 12, 305-328. Retrieved
from http://library.cqpress.com/cqresearcher/
Harreld, H., & Fonseca, B. (2001, October). GUARDING AGAINSTCYBERTERRORISM. InfoWorld, 23(43), 34-37. Retrieved May 5, 2011, from
ABI/INFORM Global. (Document ID: 86023472).
http://proquest.umi.com.library.capella.edu/pqdweb?
did=86023472&Fmt=7&clientId=62763&RQT=309&VName=PQD
Harris, S. (2009). THE CYBER DEFENSE PERIMETER. National Journal, 23.Retrieved from EBSCOhost.
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/testimony.htmlhttp://doi.acm.org.library.capella.edu/10.1145/1536616.1536626http://library.cqpress.com/cqresearcher/http://proquest.umi.com.library.capella.edu/pqdweb?did=86023472&Fmt=7&clientId=62763&RQT=309&VName=PQDhttp://proquest.umi.com.library.capella.edu/pqdweb?did=86023472&Fmt=7&clientId=62763&RQT=309&VName=PQDhttp://www.pbs.org/wgbh/pages/frontline/shows/hackers/whoare/testimony.htmlhttp://doi.acm.org.library.capella.edu/10.1145/1536616.1536626http://library.cqpress.com/cqresearcher/http://proquest.umi.com.library.capella.edu/pqdweb?did=86023472&Fmt=7&clientId=62763&RQT=309&VName=PQDhttp://proquest.umi.com.library.capella.edu/pqdweb?did=86023472&Fmt=7&clientId=62763&RQT=309&VName=PQD -
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
26/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 26
Henrie,M. & Liddell, P. (2008, March). QUANTIFYING CYBER SECURITY RISK.
CONTROL ENGINEERING, 55(3), IP.12. Retrieved May 30, 2011, from
ABI/INFORM Global. (Document ID: 1448311781).
Headquarters Department of the Army, .(2007). ARMY REGULATION - INFORMATION
ASSURANCE. Information Management, 25(2), 1-103.
Kaplan, D. (2011, January). 2 MINUTES ON... THE DATA BREACH HEARD AROUND
THE WORLD. SC Magazine, 22(1), 16. Retrieved Mayy 22, 2011, from Criminal
Justice Periodicals. (Document ID: 2238914181).
Lawrence D. Bodin, Lawrence A. Gordon, and Martin P. Loeb. 2008. INFORMATION
SECURITY AND RISK MANAGEMENT. Commun. ACM 51, 4 (April
2008), 64-68. DOI=10.1145/1330311.1330325
http://doi.acm.org/10.1145/1330311.1330325
Lynn, W. (2010). DEFENDING A NEW DOMAIN. Foreign Affairs, 89(5), 97-108.
Retrieved May 30, 2011, from ABI/INFORM Global. (Document ID: 2129061161).
Mallery, J. (2008). Network Risk Management. Security Technology & Design, 18(5),
52.
Marshall, P. (2010, February 26). CYBERSECURITY. CQ Researcher, 20, 169-192.Retrieved from http://library.cqpress.com/cqresearcher/
McCluney, C. N. (2010, June 8). NEW CYBER CHIEF: CYBERSPACE MUST
BECOME A NATIONAL SECURITY PRIORITY. Armed with Science. Retrieved
http://doi.acm.org/10.1145/1330311.1330325http://library.cqpress.com/cqresearcher/http://doi.acm.org/10.1145/1330311.1330325http://library.cqpress.com/cqresearcher/ -
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
27/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 27
May 30, 2011 from http://science.dodlive.mil/2010/06/08/new-cyber-chief-
cyberspace-must-become-a-national-security-priority/
McDowell, M. (2004, 2009). NATIONAL CYBER ALERT SYSTEM CYBER SECURITY
TIP ST04-001. US-CERT. Retrieved from http://www.us-cert.gov/cas/tips/ST04-
001.html
Merriam-Webster. (2011). Cybersecurity. Retrieved from http://www.merriam-
webster.com/dictionary/cybersecurity
Munro, N. (2007). CYBER WARRIORS. National Journal , 2007 (1007), 1-4., Retrieved
from http://www.govexec.com/dailyfed/1007/102907ol.htm
National Security Priority. Armed with Science. Retrieved November 6, 2010
from http://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-
become-a-national-security-priority/
Pfanner, E. (2011, January 17). WREAKING CYBERHAVOC ISN'T SO EASY; MEDIA
CACHE. The International Herald Tribune, pp. 18.
Pfleeger, S., & Ciszek, T.. (2008, September). CHOOSING A SECURITY OPTION:
THE INFOSECURE METHODOLOGY. IT Professional Magazine, 10(5), 46-52.
Retrieved May 30, 2011, from ABI/INFORM Global. (Document ID: 1557505111).
Pursuit Magazine. (2010). INTERNET & CYBER CRIME TERMS AND DEFINITIONS.
Retrieved from http://pursuitmag.com/cyber-crime-terms-and-definitions/
http://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://www.us-cert.gov/cas/tips/ST04-001.htmlhttp://www.us-cert.gov/cas/tips/ST04-001.htmlhttp://www.merriam-webster.com/dictionary/cybersecurityhttp://www.merriam-webster.com/dictionary/cybersecurityhttp://www.govexec.com/dailyfed/1007/102907ol.htmhttp://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://pursuitmag.com/cyber-crime-terms-and-definitions/http://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://www.us-cert.gov/cas/tips/ST04-001.htmlhttp://www.us-cert.gov/cas/tips/ST04-001.htmlhttp://www.merriam-webster.com/dictionary/cybersecurityhttp://www.merriam-webster.com/dictionary/cybersecurityhttp://www.govexec.com/dailyfed/1007/102907ol.htmhttp://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://science.dodlive.mil/2010/06/08/new-cyber-chief-cyberspace-must-become-a-national-security-priority/http://pursuitmag.com/cyber-crime-terms-and-definitions/ -
8/6/2019 Cyberwar- The Battle of a New Frontier - Edward Forde_b
28/28
CYBERWAR: THE BATTLE OF A NEW FRONTIER 28
Sharon Spontak. (2006, December). DEFENSE IN DEPTH: How Financial Executives
Can Boost IT Security. Financial Executive, 22(10), 51-53. Retrieved January 24,
2011, from ABI/INFORM Global. (Document ID: 1182662141).
Techni Core. (2011). WHAT IS CYBER SECURITY?. Retrieved from http://www.techni-
core.com/what-is-cyber-security.htm
Technolytics Institute, . (2007). Department of Cyber Defense An organization whos
time has come!. Technolytics Institute , 2007 (11), 1-7.
lWheeler, D. A. (2003). SECURE PROGRAMMING FOR LINUX AND UNIX HOW-TO.
David A. Wheeler Personal Home Page, 2003(3), 1-168.
http://www.techni-core.com/what-is-cyber-security.htmlhttp://www.techni-core.com/what-is-cyber-security.html