Cyber Crimes

Read Complete Research Material

CYBER CRIMES

Cyber Crimes

Table of Contents

Case Studies: Information Warfare & Cyber Terrorism3

Russian denial-of-service attack on the country of Estonia in 20073

Victim:3

Aggressor:3

Type of Cyber Attack:4

The technique and the outcome:4

Measures taken by the victim:4

Cyber-attacks during the 2008 South Ossetia war between Georgia and Russia4

Victim:5

Aggressor:5

Type of Cyber Attack:5

The technique and the outcome:6

Measures taken by the victim:6

US State Department Compromised Computers in the East Asia Bureau in July 20066

Victim:7

Aggressor:7

Type of Cyber Attack:7

The technique and the outcome:8

Measures taken by the victim:8

Compare and contrast of the attacks, and cyber defense mechanism that is critical for preventing the reoccurrence of these attacks8

The Final Paper10

Executive Summary of Cyber Crime Task Force Plan10

Cyber crime threats in St. Louis County10

Greatest cyber crime threats for St. Louis County:11

Types of cyber crime that would be the top priorities for the task force:11

Cyber Crime Task Force Structure12

Cyber Crime Task Force Equipment13

Cyber Crime Legislation14

Conclusion14

References16

Case Studies: Information Warfare & Cyber Terrorism

Russian denial-of-service attack on the country of Estonia in 2007

Beginning on the 27th of April of the year 2007, the cyber attacks on the country of Estonia refers to a chain of cyber-attacks that flooded the Estonian organizations websites, which included broadcasters, newspapers, ministries, banks, and the Parliament of Estonia, in the course of the row of Estonia with Russia regarding the Tallinn Bronze Soldier's reallocation, an complicated grave marker of the society era, in addition to the Tallinn war graves. Majority of the cyber-attacks, which entailed any impact on the Estonian population were attacks of distributed service denial type that ranged from lone persons utilizing numerous techniques such as floods of ping to Botnets' expensive rentals normally utilized for the distribution of spam (Traynor, 2007; Kerner, 2007).

Victim:

The victims of the cyber-terrorism or information warfare campaign included the various the Estonian organizations as described above.

Aggressor:

The aggressor in the cyber-terrorism or information warfare campaign was allegedly the Russian country. However, some time after the attack the Estonian officials failed to provide any sort of evidence. Nonetheless, cyber attack experts are of the view that such an attack could not have taken place without the assistance of the higher level Russian officials and the government.

Type of Cyber Attack:

The type of cyber attack that took place was hacking and denial-of-service.

The technique and the outcome:

The technique that was used by the attackers was flooding the websites of the Estonian organizations with spam, Botnets and ping floods. However, the outcome of these attacks was that the targeted websites crashed because of the numerous bogus requests, which it was bombarded with.

Measures taken by the victim:

The measures that the Estonian government took following these attacks included cutting accessibility to the critical websites (such as those that were attacked) from abroad and building stronger networks. These attacks do, to some extent, prevent future attacks; however, it has been stressed by experts that international treaties and laws need to be formed so that if anyone, in future, attempts doing such an attack should be considered as a criminal under the international laws and courts.

Cyber-attacks during the 2008 South Ossetia war between Georgia and Russia

On the 5th ...
Related Ads