Dr. Aly, O.
Computer Science
Introduction
The purpose of this discussion is to discuss and analyze the cyber warfare and cyber terrorism. The discussion addresses the damages that could be to the government, companies, and ourselves in United Stated if we get attacked by a foreign government using cyber warfare or cyber terrorism. The discussion also discusses whether the United States is prepared for such a scenario.
Cyber Warfare and Cyber Terrorism
The term cyberterrorism was coined in 1996 by combining the terms cyberspace and terrorism. The term, since then, has become widely accepted after being embraced by the United States Armed Forces. In 1998, a report was generated by the Center for Strategic and International Studies entitled Cybercrime, Cyberterrorism, Cyberwarfare, Averting an Electronic Waterloo. In this report, the probabilities of these activities affecting a nation were discussed, followed by a discussion of the potential outcomes of such attacks and methods to limit the likelihood of such events (Janczewski, 2007).
The term cyberterrorism is defined in (Janczewski, 2007) as “means premeditated, politically motivated attacks by subnational groups or clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combatant targets.”
Cyber attacks are usually observed after physical attacks. The increased wave of cyberattacks was observed after the downing of an American plane near the cost of China, cyber attacks from both countries began against facilities of the other side is a good example. Another example includes the cyber attacks throughout the Israeli/Palestinian conflict, and the Balkans War and the collapse of Yugoslavia. Moreover, cyber attacks are aimed at targets representing high publicity value. Favorite targets by attackers are top IT and transportation industry companies such as Microsoft, Boeing, and Ford. The increases in cyber attacks have clear political/terrorist foundations. The available statistics indicate that any of the previously mentioned conflicts result in a steady increase in cyber attacks. For instance, attacks by Chinese hackers and the Israeli/Palestinian conflict show a pattern of phased escalation (Janczewski, 2007).
Building protections against cyber attacks requires understanding the reasons for such attacks, to reduce and eliminate the attacks. The most probable reasons for cyber attacks include a fear factor, spectacular factor, and vulnerability factor. The fear factor is the most common denominator of the majority of terrorist attacks because the attacker desires to create fear in individuals, groups or societies. The spectacular factor reflects the attacks that aim at either creating huge direct losses and/or resulting in a lot of negative publicity. Example include the Amazon.com site which was closed for some time due to a Denial of Service (DoS) attack in 1999. As a result, Amazon incurred losses due to suspended trading, but the publicity the attack created was widespread. The vulnerability factor includes the cyber activities which do not always end up with huge financial losses. Some of the most effective ways to demonstrate the vulnerability of organization are to cause a denial of service to the commercial server or something as simple as the defacement of web pages of organizations, very often referred to as computer graffiti (Janczewski, 2007).
Cyber attacks consist of virus and worms attacks which can be delivered through email attachments, web browser scripts, and vulnerability exploits engines. They can also include Denial of Service (DoS) attacks designed to prevent the use of public systems by legitimate users by overloading the normal mechanisms inherent in establishing and maintaining computer-to-computer connections. Cyber attacks can also include web defacements of informational sites which service governmental and commercial interests to spread disinformation, propaganda, and/or disrupt information flows. Unauthorized intrusions into systems are another form of Cyberattacks which leads to the theft of confidential and/or proprietary information, modification and/or corruption of data, and the inappropriate usage of a system for launching attacks on other systems (Janczewski, 2007).
Cyber Terrorist Attacks are used to cause disruptions. They come into forms; one against data and another control system. Theft and corruption of data lead to services being sabotaged, and this is the most common form of Internet and computer attack. The control system attacks are used to disable or manipulate physical infrastructure such railroads, electrical networks, water supplies and so forth. Example include the incident in Australia in March 2000 which happened by an employee who could not secure full-time employment used the Internet to release one million liters of raw sewage into the river and coastal waters in Queensland.
Potential Impact and Defenses and Fortifications
The cyber attacks and cyber terrorism have negative impact and consequence on the nation. These consequences may include loss of life, significant damage to property, serious adverse U.S. foreign policy consequences, or serious economic impact on the United States (DoD, 2015). The preparation of a program of activities aimed at setting up effective defenses against potential threats plays a key role in mitigating the impact of such attacks. These fortifications include physical defenses, system defenses, personnel defenses, and organizational defenses. The physical defenses are required to control physical access to facilities. The system defenses are also required to limit the capabilities of unauthorized changes to data in storage or transit. The personnel defenses are required to limit the changes of inappropriate staff behavior. The organizational defenses are required to create and implement an information security plan. Table 1 summarizes these defenses (Janczewski, 2007).

Table 1. Summary of Required Defenses.
In summary, the cyber attacks and cyber terrorism have a negative impact on the nation. The government and organizations must prepare the appropriate defenses to mitigate and alleviate such negative impact. These defenses include physical, system, personnel and organizational.
References
DoD. (2015). The DOD Cyber Strategy. Retrieved from https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf.
Janczewski, L. (2007). Cyber warfare and cyber terrorism: IGI Global.

