Abstract
.The growth of the Internet has been accompanied by an increase in the number and importance of malicious actors who seek to undertake all types of nefarious activities in cyberspace. As a result, there is an ongoing battle today to secure the cyber domain – cyber security has emerged as a major issue that affects every user of the Internet. To describe this situation, this chapter identifies some common terms and concepts related to Internet security. It describes several cyber-attacks to illustrate how cyber security poses an ongoing challenge. It also provides examples of ongoing initiatives undertaken by the United States and the International Community to improve cyber security. It concludes by exploring threats to the expanding confluence of connected devices known as the “Internet of Things.”
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Bibliography
“About the Global Conference on Cyberspace” (2015) The Hague, 16-17, April 2015, located at: https://www.gccs2015.com/gccs/all-about-gccs2015, Accessed on April 29, 2015.
“ANON OPS: A Press Release,” Blog Posting, Wired.com, December 10, 2010.
Alexander, Keith B. (2014) Statement before the House Committee on Armed Services, March 12, 2014.
Amit, Iftach Ian (2010) “Cyber [Crime/War]: Linking State Governed Cyber Warfare with Online Criminal Groups,” Security and Innovation.
Anderson, Robert (2014) “Cybersecurity, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland,” testimony before the Committee on Homeland Security and Government Affairs, US Senate, September 10, 2014.
Annual Report to Congress (2013) “Military and Security Developments Involving the People”s Republic of China,” United States, Secretary of Defense, May, 2013.
Arango, Tim (2014) “Sunni Extremists in Iraq Seize 3 Towns from Kurds and Threaten Major Dam,” The New York Times, August 3, 2014.
Ari-Habib, Maria (2014) “Jihadists Step Up Recruitment,” The Wall Street Journal, June 27, 2014.
Arthur, Charles (2014) “Syrian Electronic Army Hacks Skype”s Twitter and Blog Accounts,” The Guardian, January 2, 2014.
Barnes Julian E. and Danny Yadron (2015) “U.S. Probes Hacking of Military Twitter Accounts by Pro-Islamic State Group,” The Wall Street Journal, January 12, 2015.
BBC News (2010) Spanish Police Smash Huge Botnet, March 3, 2010.
Beaumont, Claudine (2010) “Mariposa Botnet Busted by Spanish Police,” The Telegraph, March 3, 2010.
Caris, Charlie (2014) “The Islamic State Announces Caliphate,” Institute for the Study of War, Blogspot, June 2014.
Carr, Jeff (2008) “Russia/Georgia Cyber War – Findings and Analysis,” Project Grey Goose: Phase I Report, October 17, 2008.
Carter, Ash (2015) “The DoD Cyber Strategy,” April 17, 2015.
Chang, Amy (2014) “Warring State: China”s Cybersecurity Strategy,” Center for a New American Security, December 2014.
Clapper, James R. (2015) “Worldwide Threat Assessment of the US Intelligence Community,” Statement for the Record for the Senate Armed Services Committee, February 26, 2015.
Coleman, Kevin (2014) “Syrian Electronic Army,” Cyber Intelligence Advisory, SilverRhino LLC, March 2014.
Coleman, Kevin (2015) “Vehicle Computing Platform,” Executive Insights, May 2015.
Council of Europe (2001) “Convention on Cybercrime,” Budapest, Hungary, November 23, 2001.
Council of Europe (2015) “Global Action on Cybercrime,” about the Project, located at `http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/GLACY/GLACY_en.asp, Accessed on April 29, 2015.
Crittenden, Michael R. and Sam Dagher (2014) “Obama Cools Talk of Strikes against Islamic State in Iraq or Syria: Extremists Killed Nearly 500 This Week in One Syrian Province, Opposition Activists Say,” The Wall Street Journal, August 28, 2014.
CSIS (Center for Strategic and International Studies) (2013) “The Economic Impact of Cybercrime and Cyber Espionage,” July, 2013.
“Cyberspace Policy Review, Assuring a Trusted and Resilient Information and Communication Infrastructure” (2009) United States, Executive Office of the President, May 2009.
Cyber Threat Intelligence (2015) “Cyber Caliphate: ISIS Plays Offense on the Web,” Posted by RFSID, www.recordedfuture.com, April 2, 2015.
Dettmer, Jamie (2014) “Digital Jihad: ISIS, Al Qaeda Seek a Cyber Caliphate to Launch Attacks on US,” Fox News, September 14, 2014.
“Executive Order – Improving Critical Infrastructure Cybersecurity” (2013) Executive Office of the President, The White House, February 12, 2013.
Gates, Bill (1995) The Road Ahead, Viking.
Gladstone, Rick and Vindu Goel (2015) “ISIS Is Adept on Twitter, Study Finds,” The New York Times, March 6, 2015.
Gorman, Siobhan (2014) “Navy Hacking Blamed on Iran Tied to H-P Contract,” The Wall Street Journal, March 6, 2014.
Grauman, Brigid (2012) “Cyber-Security: The Vexed Question of Global Rules. An Independent Report on Cyber-preparedness around the World,” Santa Clara, CA, McAfee, 2012.
Greenberg, Andy (2015) “Researchers Plan to Demonstrate a Wireless Car Hack This Summer,” Wired, April 27, 2015.
Gunelius, Susan (2013) “The History and Evolution of the Internet,” ACI Blog Post, October 2013.
Hagel, Chuck (2014) “2014 Quadrennial Defense Review,” March 4, 2014.
Higgins, Kelly Jackson (2012) “Shamoon, Saudi Aramco, And Targeted Destruction,” Dark Reading, August 22, 2012.
Higgins, Kelly Jackson (2015) “Hacking Virginia State Trooper Cruisers,” Dark Reading, May 22, 2015.
HP Security Research (2013) “Syrian Electronic Army,” HPSR Threat Intelligence Briefing Episode 3, April 2013
HP Security Research (2014) “Islamic Republic of Iran,” HP Security Briefing Episode 11, February 2014.
Ibish, Hussein (2015) “The ISIS Theater Of Cruelty,” The New York Times, February 19, 2015.
ICS-CERT MONITOR (2013) “Trends in Incident Response in 2013 Overview,” October/November/December 2013.
Imperva (2012) “The Anatomy of an Anonymous Attack,” Imperva”s Hacker Intelligence Summary Report, 2012.
Intel Corporation (2015) “The Cybersecurity Framework in Action: An Intel Use Case,” Solution Brief, 2015.
IRC Radio (2011) “Anonnews – Everything Anonymous,” IRC Radio, Blog Posting, Creative Commons, February 26, 2011.
Jackson, William (2011) “Cybereye: FBI Shares Lessons of Zeus Botnet Ring Takedown,” Government Computer News, July 22, 2011.
Joint Publication 1-02 (2014) Department of Defense Dictionary of Military and Associated Terms, The Joint Staff.
Kaspersky, “Carbanak APT: The Great Bank Robbery,” Report, Version 2.0, February 2015, 1–23.
Krebs, Brian (2014a) “A First Look at the Target Intrusion, Malware,” krebsonsecurity.com, January 15, 2014.
Krebs, Brian (2014b) “Email Attack on Vendor Set up Breach at Target,” krebsonsecurity.com, February 12, 2014.
Leiner, Barry M., et al. (2009) “A Brief History of the Internet,” 2009.
Lewis, James A. (2008) “Securing Cyberspace for the 44th President,” A Report of the CSIS Commission, December 2008.
Markoff, John (2008) “Before the Gunfire, Cyberattacks,” New York Times, August 12, 2008.
Marson, Carolyn Duffy (2009) “The Evolution of the Internet,” PCWorld, February 12, 2009.
Martonyi, János (2012) “Budapest Conference on Cyberspace,” Millenáris Park, Budapest, Hungary, October 4–5, 2012.
McClure, Stuart (2014) Operation Cleaver, Cylance Report, December 2014.
McCullagh, Declan (2010) “T.J. Maxx Hacker Sentenced to 20 Years in Prison,” CNET, Tech Industry Section, March 25, 2010.
McGrath, Maggie (2014) “Target Data Breach Spilled Info On As Many As 70 Million Customers,” Forbes, January 10, 2014.
McGurk, Sean P. (2011) “The DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure,” Testimony before the US House Committee on Homeland Security, April 15, 2011.
Miller, Michael E. (2015) “Car Hacking Just Got Real: In Experiment, Hackers Disable SUV on Busy Highway,” The Washington Post, July 22, 2015.
Monaco, Lisa O. (2015) “Strengthening Our Nation”s Cyber Defenses,” Remarks as Prepared for Delivery, The Wilson Center, Washington, DC, February 10, 2015.
Nakashima, Ellen (2013) “Confidential Report Lists U.S. Weapons System Designs Compromised by Chinese Companies,” Washington Post, May 27, 2013.
National Institute of Standards and Technology (2013) “Glossary of Key Information Security Terms,” NISTIR 7298 Revision 2, May 2013.
National Institute of Standards and Technology (2014) “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, February 12, 2014.
Obama, Barak (2011) “International Strategy for Cyberspace,” May 2011.
Obama, Barak (2013) “Improving Critical Infrastructure Cybersecurity,” Executive Order 13636, February 12, 2013.
Obama, Barak (2015a) “Promoting Private Sector Cybersecurity Information Sharing,” Executive Order 13691, February 13, 2015.
Obama, Barak (2015b) “Remarks at the Cybersecurity and Consumer Protection Summit,” Stanford University, Palo Alto, California, February 13, 2015.
Pagliery, Jose, Jamie Crawford and Ashley Killough (2015) “CENTCOM Twitter Account Hacked, Suspended,” CNN News, January 12, 2015.
Panetta, Leon E. (2012) “Defending the Nation from Cyber Attack,” Business Executives for National Security, New York, October 11, 2012.
Perlroth, Nicole (2012) “Attacks on 6 Banks Frustrate Customers,” The New York Times, September 30, 2012.
Perlroth, Nicole and David Gelles (2014) “Russian Hackers Amass over a Billion Internet Passwords,” The New York Times, August 5, 2014.
Rampton, Roberta and Alina Selyukh (2015) “Obama Seeks Enhanced Cybersecurity Laws to Fight Hackers,” Reuters, January 13, 2015.
Rosenbach, Eric (2015) Statement before the U.S. Senate Committee on Armed Services, April 14, 2015.
Schmidt, Michael S. and Helene Cooper (2015) “ISIS Urges Sympathizers to Kill U.S. Service Members It Identifies on Website,” The New York Times, March 21, 2015.
Schwartz, Mathew J. (2012) “Anonymous Leaves Clues in Failed Vatican Attack,” Dark Reading, February 29, 2012.
Sherstobitoff, Ryan (2014) “Cyber Espionage,” McAfee Labs Threats Report, November 2014.
Spaulding, Suzanne and Phyllis Schneck (2015) “Examining the President”s Cybersecurity Information Sharing Proposal,” Testimony for a House Committee on Homeland Security, February 25, 2015.
Stewart, Vincent R. (2015) “Defense Intelligence Agency, Worldwide Threat Assessment,” February 3, 2015.
Strategy for Operating in Cyberspace (2011) U.S. Department of Defense, July 2011.
The National White Collar Crime Center (2007) “2007 Internet Crime Report,” Federal Bureau of Investigation.
Tikk, Eneken, Kadri Kaska and Liis Vihul (2009) International Cyber Incidents: Legal Considerations, NATO Cooperative Cyber Defence Centre of Excellence.
Todd, Brian and Forrest Brown (2013) “Syria”s Cyberattack: First Wave of a Bigger War?“ CNN.com, August 30, 2013.
Ullrich, Johannes B. (2015) “New Cyberthreats: Defending against the Digital Invasion,” Search Security, April 3, 2015.
United Nations General Assembly (2013) “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” A/68/98, June 24, 2013.
United Nations General Assembly (2015) “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” A/70/174, July 22, 2015.
United States District Court (2014) Indictment, Criminal No. 14-118, Filed May 1, 2014.
United States, Executive Office of the President (2010) The Comprehensive National Cybersecurity Initiative, Initiative #12, March, 2010.
United States, Executive Office of the President (2011) International Strategy for Cyberspace, The White House, May, 2011.
Walker, Danielle (2012) “Natural Gas Giant Rasgas Targeted in Cyber Attack,” SC Magazine, August 31, 2012.
Wan, William and Ernesto Londono (2014) “China Vents Outrage over U.S. Cyberspying Indictment,” https://washingtonpost.com, May 20, 2014.
Weisman, Steve (2015) “Are You Safe in the Internet of Things,” USA Today, April 4, 2015.
Wortzel, Larry M. (2013) The Dragon Extends its Reach: Chinese Military Power Goes Global, Potomac Books.
Wortzel, Larry M. (2014) “China”s Military Modernization and Cyber Activities,” Strategic Studies Quarterly, Spring 2014.
Yadron, Danny (2014) “Chinese Hacked U.S. Military Contractors, Senate Panel Says Hackers Broke into Computer Networks 20 Times in a Year,” The Wall Street Journal, September 18, 2014.
Yadron, Danny and Emily Glazer (2015) “New Report Says Computer Criminals Stole Millions From Banks,” The Wall Street Journal, February 15, 2015.
Yun Byung-Se, H.E. (2013) “Seoul Conference on Cyberspace,” Seoul, South Korea, October 17–18, 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Jasper, S., Wirtz, J. (2017). Cyber Security. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_9
Download citation
DOI: https://doi.org/10.1057/978-1-137-53675-4_9
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-53674-7
Online ISBN: 978-1-137-53675-4
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)