Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Traditional Computer Security
|
Computer was the referent object- needed protecting against digital and physical attack
the system needed protecting |
|
Now, however,
|
as technology's role in Critical Infrastructure has increased the focus of the referent object is now back to the state and to people
Now the question is about the impact of cyberspace and cyber attacks on the 'real' world. |
|
Difference between Cyber Terrorism, Cyber Crime and Hacktivism
|
Cyber Terrorism: cyber incidents mounted by non-stae actors aimed to instill terror for ideological, religious or political purposes
Cyber Crime- using digital technology to commit crimes, bank robbery, trafficking, drugs, fraud Hacktivists are activists who use hacking to further their political message/goals- different from terrorists |
|
Are we facing an electronic Pearl Harbour?
Is the threat from cyber terrorism real? |
No such thing as cyber terrorism:
too technically complex for terrorists lacks the perfomance aspect, mass audience However: terrorism is more than just about the attack, there are different layers: recruitment money transfer, financial support- easier to do online transactions- cyber criminals bank 'Liberty Reserve' broadcasting a message |
|
Security Concerns regarding cyber attacks 1
|
Political bodies being attacked in order to send a message: threat to organisational stability
threat to critical infrastructure web defacement- denial of service- Anonymous v scientology information stolen- Anonymous UK and EDL, BNP, Cyberspace is a force maximiser, do not need large numbers to make a big impact DoS |
|
Security Concerns regarding cyber attacks 2
|
Military hardware being attacked: remote controlled drones
intelligence leak/theft Economic- financial, fraud- how important is money? what if Wall Street was hacked? companies have a lot of information about customers- Tesco coupons, targeted marketing Societal- personal information stolen/used- easy to get hold of now public/private barrier has broken down |
|
Raising Cyber Security onto the agenda
|
Through speech acts, cyber security has been constructed as a national security threat, through framing and the use of language to create an us v them mindset
Cavelty suggests cyber threats are an example of failed securitisation as there have been no cyber terrorism attacks to back up the securitisation. |
|
Cyberspace DOES provide security challenges - 1
|
Cyberspace is transnational- states and individuals cannot control it
Cyberspace is operated as a mix of public and private, where is the line drawn? Cyberspace is a moving target, man made and in a state of constant change, too complex Cyberspace is a virtual realm but has physical infrastructure to support it- internet outputs, mobile masts |
|
Cyberspace DOES provide security challenges - 2
|
Cyberspace goes across borders, signal can be pushed over territorial boundaries.
Anonymity online- makes people braver Lack of precedent- what breaks social rules or actual laws? Makes it easier to protest How do you defend? Attack them back? |
|
Cyberspace DOES NOT provide security challenges
|
If cyber incidents by hacktivists are not counted as terrorism, then there have been no cyber terrorist attacks. (instill terror)
Not a traditional military attack. Cyber terrorism lacks the performance aspect and is too technically difficult Annoying jokes, not actual attack |