The Pros And Cons Of Cyber Attacks

Improved Essays
Some organizations still use outdated machines because they cannot afford to upgrade. It is not in their budget, so Microsoft systems that run 2003??? May still be infected with the Conficker virus.
Conficker affected Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems. It then patched the “hole” at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012). Conficker’s logic includes mechanisms to generate lists of new domain names on a daily basis to seek out Internet rendezvous points that the authors use for updates and for command and control of the machines infected. Conficker also uses binary validation
…show more content…
Computer-induced failures of U.S. power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption” said ty Deputy Secretary of Defense William Lynn. Admiral Mike McConnell voiced his concerns on how cyber attacks can be used as a weapon of mass destruction. General Staff, Alexander Burutin, voiced his concerns on how cyber attacks can infiltrate military control system, navigation and communication systems and other facilities that control the state’s economy and Armed Forces depend on. Other organaizations can also manipulate Supervisory Control and Data Acquisition (SCADA) systems that regulate pumps, valves, elevators, generators, and other machines. John Markoff reported that There are reports that in 1982 President Ronald Reagan approved the covert introduction of malware into SCADA that resulted in a large-scale explosion and major damage to a Soviet gas pipeline (as cited in Krepinevich, 2012). So it is possible. Aside from its ability to execute massive DDoS attacks, the Conficker botnet could crack sophisticated codes, perhaps enabling its controller to breach, compromise, and even destroy protected databases. By early 2009, Conficker B invaded the United Kingdom’s Defense Ministry. Purpose of Conficker, no one knows. Some speculate that it was created as a proof of concept for a cyber weapon, and that its deployment enabled its master(s) to conduct the equivalent of a field test to confirm that a worm could be embedded and spread quickly, and that even after being detected it could sustain its command and control links despite efforts to break them. Interestingly, other variants of Conficker are still embedded in computers around the world. Bowden reported, “Perhaps even more worrisome is that few cyber experts believe Conficker is the product of a

Related Documents

  • Improved Essays

    Description of the remaining publicly available datasets is given in Table 5.1. The Conficker P2P botnet dataset contains data from the UCSD Network Telescope for three days between November 2008 and January 2009. The first day, 21st November 2008 data, covers the onset of the Conficker A infection. On the second day, 21st December 2008, only Conficker A was active and during the third day both Conficker A and B were active.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The worm also creates the following registry entry so that it is launched every time Windows starts: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ windows auto update= msblast.exe Blaster uses two methods for searching IP addresses to infect new machines. Blasters cannot spread to the windows server 2003, Unpatched computers running these OS may crash as a result of the worms will attempt to exploit them. Blaster worm uses the affected computers as a propagation medium to spread virus to other machines.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Although terrorism has been around for millennia in different forms, today terrorism is becoming more and more prevalent with the ability to reach across the globe. Terrorism is defined as “the unlawful use of force and violence against persons or property to intimidate or coerce a government and/or the civilian population to advance ideological objective” (Schwab, p.115). These attacks can be performed by individuals or by groups. They may also be either overt or covert attacks. An example of an overt attack is when planes were hijacked on September 11, 2001, destroying the twin towers at the World Trade Center in New York and hitting the Pentagon in Washington D.C.…

    • 1724 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Researchers from Blue Coat Labs have identified the emergence of a previously undocumented attack framework that is being used to launch highly targeted attacks in order to gain access to, and extract confidential information from, victims’ computers. Because of the many layers used in the design of the malware, we’ve named it Inception—a reference to the 2010 movie “Inception” about a thief who entered peoples’ dreams and stole secrets from their subconscious. Targets include individuals in strategic positions: Executives in important businesses such as oil, finance and engineering, military officers, embassy personnel and government officials. The Inception attacks began by focusing on targets primarily located in Russia or related to Russian…

    • 141 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    We have seen the most recent terrorist attacks in Paris performed by the terrorist organization called the “ISIS,” and this is the perfect scenario to define terrorism as an act of war, or as a crime, or both. However, terrorism is a controversial definition that could mean different things to the parties involved in that act either directly or indirectly. If we consider terrorism to be a crime, then this terrorists can be trialed in the domestic law, but these attacks are sometimes dismissed as isolated events in the international law grounds. On the other hand, if we categorize terrorism as being an act of war, then we assume that such conflict is between two nations not between a nation and an organization such as the ISIS. Then again, in…

    • 983 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Conficker, a botnet or virus, affected several Windows operating systems such as Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems which lacked patches and had access to the internet (Krepinevich, 2012; Mills, 2009; Ackerman, 2009). Once it infiltrated an organization’s system, it mended the breach located at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012). In order to propagate to other systems, Conficker created a list of new domain names daily to discover other central domains that the virus’ creator employed to update, control or command the infected machines and signed solely by the creator…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Secondly, all the powers have very clear problems. One big problem with soft power is that it is difficult to incorporate into government strategy due to its dependency on credibility, and also results often take a long time and the resources used in soft power are not under full government control (83). An example of why soft power may not be successful if implemented in government strategy is with the issue of North Korea’s nuclear weapons because North Korea cannot be stopped with soft power (84). Any country would need hard power if they were to dispute this issue, not soft power because the use of culture or values would not be able to deter the use of weaponry. Soft power in government is also a problem because governments rarely have…

    • 1535 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Microsoft Windows Failures Microsoft has undoubtedly had a major influence on the PC since its introduction of MS-DOS 1.0 in 1981. The introduction of the GUI has changed the way we use PCs since the days of MS-DOS, and it’s impossible to think about the computing world without it today. A GUI isn’t the only thing that makes an operating system, its performance, familiarity, hardware support and security all play important roles to their success or failures. Windows 1.x Windows 1.x was Microsoft’s first attempt at creating a GUI interface based operating system and required you to install it on top of MS-DOS 2.0 (Hollister, 2012). This first Windows OS was considered a failure’, because of promises Microsoft made that they couldn’t deliver.…

    • 788 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    1). Based on our discussion of various types of malicious attacks (Chapter 11), which two or three of them do you consider to be the most significant threat against government and political organizations, and why? Which threats may not be as great of a risk for those organizations, and why? Malicious attacks tend to forcefully take advantage of or abuse some other ’innocent’ person’s computer with the intention of stealing the individual 's information or tamper with the functionality of the machine.…

    • 1588 Words
    • 7 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays