Our Safeguards Against Cyberterrorism And What We Can Do About It
1737 Words7 Pages
Our Safeguards against Cyberterrorism In reality, attacks in cyber-space happen all the time. Over 20 million cyber-attacks happened within Utah in 2013 each day, and this was from Utah’s government websites, not including businesses. (“Fortis Blog”) Just imagine the various ways one could hack a website. Someone can even look up how to do it nowadays, and with at least half of the population in the U.S. using a computer, there are an untold number of people who use hack from inside the country. There are also those who hack from outside the country, and that is at least enough to accumulate up to 20 million attacks a day. Unfortunately, there are fewer ways to secure ourselves from these attacks, but…show more content… Just as a hacker can get information from any citizen in the world, a cyber-terrorist can get information from any government. The methods used to block these attacks could also be similar, even though there might be a few select methods tailored to each.
Why do we need safeguards?
As it was stated earlier, attacks happen every day, probably too many to count, and the need to secure our systems grows exponentially every day. New systems, devices, programs, etc., are being developed, and the current growth of technology is quite staggering. We also give our information online in order to use several services, such as Facebook and Amazon. This information can be used against us, and used to find other pieces of personal information, such as a social security number. The concern to guard our technology was present before some of us were even born. For example, in 1982, the CIA created the “logic bomb” to disrupt a pipeline in Siberia, which opened up a new tool for hackers (“25 Biggest Cyber Attacks,” 2013). In 2007, the email address belonging to the Secretary of Defense was hacked as part of a spree to exploit weaknesses at the Pentagon (“history of cyber attacks”). Even a high ranking official’s email address wasn’t safe from cyberterrorists. This information alone should scare some people into making cyber-security the top of their worry list. Everyone’s information is always at risk.
How can we be attacked?
A hacked, or exposed, computer