DoS: No One is Safe - Conclusion
(Page 4 of 4 )
First of all, the effect of cyber warfare depends entirely upon the country. If the people are more dependent upon receiving information via the Internet, as opposed to radio and television, then the effect on that country will obviously be more drastic. Also, the attacks nowadays are easier to hide behind, meaning better organization and higher profile attackers willing to take the risk because cyber attacks often aren't classified among the more serious criminal offenses.
Cyber warfare will mostly come in two varieties: the DoS attacks, which I have already touched upon, and infiltration via the spread of malware and trojans. Usually an attacker dealing in the latter will have more technical knowledge of the systems involved. That is why it is always necessary to have an adequate amount of operational experience, or at least connections with those who do, within law enforcement in case a large scale, countrywide attack occurs.
Prevention is somewhat obvious and I have mentioned it before. However, dealing with national network security will depend largely on the cooperation of the ISPs. Other than that, updated virus scanners, firewalls, and other security tools are a necessity, but I'm sure you already knew that. Also, be aware of disgruntled employees. They are often prime suspects in an attack. After all, the attacks in Estonia were most likely done by someone offended by the Soviet memorial incident.
Hopefully this information isn't all redundant blather. Otherwise you just read this article for absolutely no reason. Or maybe not. It is always a good idea to review your defenses against cyber attacks.
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |