Difference between revisions of "Offensive weapons (virusses/worms/hackers)"

From ScenarioThinking
Jump to navigation Jump to search
 
(7 intermediate revisions by one other user not shown)
Line 1: Line 1:
==Description==
xrqwWW  <a href="http://eseztmqolmmr.com/">eseztmqolmmr</a>, [url=http://ymyppdkhqcjs.com/]ymyppdkhqcjs[/url], [link=http://nsjrawqlxgrp.com/]nsjrawqlxgrp[/link], http://dzoiazlnueiz.com/
People will always find new ways to exploit certain systems. The current technological weapons are:
- Distrubuted Denial of Service Attacks
- Virusses
- Trojan Horses
- Malware
- Exploits


These weapons can be used to obtain access to or information from computer systems and are used often.
==Enablers==
<br><u>Development of Computer Science</u><br>
Computer Science has been developing at a very fast pace. New products, technology and research drive the market. Thanks to new technology like evolutionary algorithms, faster networks and machines worms and viruses can spread more quickly and are harder to discover.<br><br>
 
<u>Expansion of the internet</u><br>
The on-going expansion of the internet provides scalability opportunities and connectivity.  More and more specific systems can be targeted and one destructive virus could potentially hurt millions of computer systems.<br><br>
 
<u>Carelessness and unawareness of computer-users</u> <br>
Because most of the people are not fully aware of the cyber threats and are not capable to secure their systems hackers profit from this. Through social engineering they can obtain access to systems and information. It’s often said that humans are the weakest link in security.<br><br>


==Enablers==
<u>Software flaws</u> <br>
Evolution of software (new algorithms make better virusses)<br>
Hackers constantly find new ways to exploit software. These exploits can be a threat to companies and people and give the opportunity to gain an advantage in case of a cyber war. The defensive mechanisms have to play catch up to the new exploits that are found daily. <br>
Expansion of the internet<br>
Carelessness and unawareness of computer-users<br>
Social engineering<br>
Unsecure software<br>


==Inhabitors==
==Inhabitors==
Growing awareness of the weapons<br>
<u>Security systems</u><br>
Software Architecture more secure<br>
http://scenariothinking.org/wiki/index.php/Security_systems
Evolution of defense mechanisms<br>
<br>
Cyberlaws?<br>
 
<u>Cyber laws</u><br>
Cybercrime has been legislated as a crime by the The Convention on Cybercrime (2001), cyber warfare activities are similar to cyber terrorism, so the US Acts, for example, against terrorism can be applied. Because people can now be prosecuted for cyber war the barrier to use a cyber attack is higher. <br>


==Paradigms==
==Paradigms==
Owners of botnets recieve money to send spam and DDoS targets. It's getting more organized and commercial. needs more explanation
Owners of botnets recieve money to send spam and DDoS targets. It's getting more organized and commercial. Countries are setting up cyber war departments and are more aware of the possibilities of cyber attacks.
 
==Experts==


==Timing==


==Web Resources==
==Web Resources==
http://www.sophos.com/pressoffice/news/articles/2008/02/botnet-busted.html
http://www.vnunet.com/vnunet/news/2191082/claims-russia-hired-botnets

Latest revision as of 08:48, 15 May 2010

xrqwWW <a href="http://eseztmqolmmr.com/">eseztmqolmmr</a>, [url=http://ymyppdkhqcjs.com/]ymyppdkhqcjs[/url], [link=http://nsjrawqlxgrp.com/]nsjrawqlxgrp[/link], http://dzoiazlnueiz.com/

Enablers


Development of Computer Science
Computer Science has been developing at a very fast pace. New products, technology and research drive the market. Thanks to new technology like evolutionary algorithms, faster networks and machines worms and viruses can spread more quickly and are harder to discover.

Expansion of the internet
The on-going expansion of the internet provides scalability opportunities and connectivity. More and more specific systems can be targeted and one destructive virus could potentially hurt millions of computer systems.

Carelessness and unawareness of computer-users
Because most of the people are not fully aware of the cyber threats and are not capable to secure their systems hackers profit from this. Through social engineering they can obtain access to systems and information. It’s often said that humans are the weakest link in security.

Software flaws
Hackers constantly find new ways to exploit software. These exploits can be a threat to companies and people and give the opportunity to gain an advantage in case of a cyber war. The defensive mechanisms have to play catch up to the new exploits that are found daily.

Inhabitors

Security systems
http://scenariothinking.org/wiki/index.php/Security_systems

Cyber laws
Cybercrime has been legislated as a crime by the The Convention on Cybercrime (2001), cyber warfare activities are similar to cyber terrorism, so the US Acts, for example, against terrorism can be applied. Because people can now be prosecuted for cyber war the barrier to use a cyber attack is higher.

Paradigms

Owners of botnets recieve money to send spam and DDoS targets. It's getting more organized and commercial. Countries are setting up cyber war departments and are more aware of the possibilities of cyber attacks.


Web Resources

http://www.sophos.com/pressoffice/news/articles/2008/02/botnet-busted.html http://www.vnunet.com/vnunet/news/2191082/claims-russia-hired-botnets