Our Safeguards Against Cyberterrorism And What We Can Do About It

1737 Words Nov 11th, 2015 7 Pages
Nathaniel Howard
COMS 3053
Paper #1
Our Safeguards against Cyberterrorism In reality, attacks in cyber-space happen all the time. Over 20 million cyber-attacks happened within Utah in 2013 each day, and this was from Utah’s government websites, not including businesses. (“Fortis Blog”) Just imagine the various ways one could hack a website. Someone can even look up how to do it nowadays, and with at least half of the population in the U.S. using a computer, there are an untold number of people who use hack from inside the country. There are also those who hack from outside the country, and that is at least enough to accumulate up to 20 million attacks a day. Unfortunately, there are fewer ways to secure ourselves from these attacks, but
…show more content…
This information can be used against us, and used to find other pieces of personal information, such as a social security number. The concern to guard our technology was present before some of us were even born. For example, in 1982, the CIA created the “logic bomb” to disrupt a pipeline in Siberia, which opened up a new tool for hackers (“25 Biggest Cyber Attacks,” 2013). In 2007, the email address belonging to the Secretary of Defense was hacked as part of a spree to exploit weaknesses at the Pentagon (“history of cyber attacks”). Even a high ranking official’s email address wasn’t safe from cyberterrorists. This information alone should scare some people into making cyber-security the top of their worry list. Everyone’s information is always at risk.
How can we be attacked?
A hacked, or exposed, computer allows hackers to do numerous things to the computer, which include the following: Recorded keystrokes, send spam, sell email addresses, infect other systems, illegally distribute music, distribute child porn, etc. (“Introduction to”). These different exploits allow various types of security threats. Sony has had its fair share of attacks, which came in the form of Distributed Denial of Service Attacks, which cause major problems during the holiday season of 2014 (“How DDoS Attacks Work”). During this time, new video game consoles were just made available, and a group called the “Lizard Squad”

More about Our Safeguards Against Cyberterrorism And What We Can Do About It

Open Document