Skip to main content

Abstract

.The growth of the Internet has been accompanied by an increase in the number and importance of malicious actors who seek to undertake all types of nefarious activities in cyberspace. As a result, there is an ongoing battle today to secure the cyber domain – cyber security has emerged as a major issue that affects every user of the Internet. To describe this situation, this chapter identifies some common terms and concepts related to Internet security. It describes several cyber-attacks to illustrate how cyber security poses an ongoing challenge. It also provides examples of ongoing initiatives undertaken by the United States and the International Community to improve cyber security. It concludes by exploring threats to the expanding confluence of connected devices known as the “Internet of Things.”

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Bibliography

  • “About the Global Conference on Cyberspace” (2015) The Hague, 16-17, April 2015, located at: https://www.gccs2015.com/gccs/all-about-gccs2015, Accessed on April 29, 2015.

  • “ANON OPS: A Press Release,” Blog Posting, Wired.com, December 10, 2010.

  • Alexander, Keith B. (2014) Statement before the House Committee on Armed Services, March 12, 2014.

    Google Scholar 

  • Amit, Iftach Ian (2010) “Cyber [Crime/War]: Linking State Governed Cyber Warfare with Online Criminal Groups,” Security and Innovation.

    Google Scholar 

  • Anderson, Robert (2014) “Cybersecurity, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland,” testimony before the Committee on Homeland Security and Government Affairs, US Senate, September 10, 2014.

    Google Scholar 

  • Annual Report to Congress (2013) “Military and Security Developments Involving the People”s Republic of China,” United States, Secretary of Defense, May, 2013.

    Google Scholar 

  • Arango, Tim (2014) “Sunni Extremists in Iraq Seize 3 Towns from Kurds and Threaten Major Dam,” The New York Times, August 3, 2014.

    Google Scholar 

  • Ari-Habib, Maria (2014) “Jihadists Step Up Recruitment,” The Wall Street Journal, June 27, 2014.

    Google Scholar 

  • Arthur, Charles (2014) “Syrian Electronic Army Hacks Skype”s Twitter and Blog Accounts,” The Guardian, January 2, 2014.

    Google Scholar 

  • Barnes Julian E. and Danny Yadron (2015) “U.S. Probes Hacking of Military Twitter Accounts by Pro-Islamic State Group,” The Wall Street Journal, January 12, 2015.

    Google Scholar 

  • BBC News (2010) Spanish Police Smash Huge Botnet, March 3, 2010.

    Google Scholar 

  • Beaumont, Claudine (2010) “Mariposa Botnet Busted by Spanish Police,” The Telegraph, March 3, 2010.

    Google Scholar 

  • Caris, Charlie (2014) “The Islamic State Announces Caliphate,” Institute for the Study of War, Blogspot, June 2014.

    Google Scholar 

  • Carr, Jeff (2008) “Russia/Georgia Cyber War – Findings and Analysis,” Project Grey Goose: Phase I Report, October 17, 2008.

    Google Scholar 

  • Carter, Ash (2015) “The DoD Cyber Strategy,” April 17, 2015.

    Google Scholar 

  • Chang, Amy (2014) “Warring State: China”s Cybersecurity Strategy,” Center for a New American Security, December 2014.

    Google Scholar 

  • Clapper, James R. (2015) “Worldwide Threat Assessment of the US Intelligence Community,” Statement for the Record for the Senate Armed Services Committee, February 26, 2015.

    Google Scholar 

  • Coleman, Kevin (2014) “Syrian Electronic Army,” Cyber Intelligence Advisory, SilverRhino LLC, March 2014.

    Google Scholar 

  • Coleman, Kevin (2015) “Vehicle Computing Platform,” Executive Insights, May 2015.

    Google Scholar 

  • Council of Europe (2001) “Convention on Cybercrime,” Budapest, Hungary, November 23, 2001.

    Google Scholar 

  • Council of Europe (2015) “Global Action on Cybercrime,” about the Project, located at `http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/GLACY/GLACY_en.asp, Accessed on April 29, 2015.

  • Crittenden, Michael R. and Sam Dagher (2014) “Obama Cools Talk of Strikes against Islamic State in Iraq or Syria: Extremists Killed Nearly 500 This Week in One Syrian Province, Opposition Activists Say,” The Wall Street Journal, August 28, 2014.

    Google Scholar 

  • CSIS (Center for Strategic and International Studies) (2013) “The Economic Impact of Cybercrime and Cyber Espionage,” July, 2013.

    Google Scholar 

  • “Cyberspace Policy Review, Assuring a Trusted and Resilient Information and Communication Infrastructure” (2009) United States, Executive Office of the President, May 2009.

    Google Scholar 

  • Cyber Threat Intelligence (2015) “Cyber Caliphate: ISIS Plays Offense on the Web,” Posted by RFSID, www.recordedfuture.com, April 2, 2015.

  • Dettmer, Jamie (2014) “Digital Jihad: ISIS, Al Qaeda Seek a Cyber Caliphate to Launch Attacks on US,” Fox News, September 14, 2014.

    Google Scholar 

  • “Executive Order – Improving Critical Infrastructure Cybersecurity” (2013) Executive Office of the President, The White House, February 12, 2013.

    Google Scholar 

  • Gates, Bill (1995) The Road Ahead, Viking.

    Google Scholar 

  • Gladstone, Rick and Vindu Goel (2015) “ISIS Is Adept on Twitter, Study Finds,” The New York Times, March 6, 2015.

    Google Scholar 

  • Gorman, Siobhan (2014) “Navy Hacking Blamed on Iran Tied to H-P Contract,” The Wall Street Journal, March 6, 2014.

    Google Scholar 

  • Grauman, Brigid (2012) “Cyber-Security: The Vexed Question of Global Rules. An Independent Report on Cyber-preparedness around the World,” Santa Clara, CA, McAfee, 2012.

    Google Scholar 

  • Greenberg, Andy (2015) “Researchers Plan to Demonstrate a Wireless Car Hack This Summer,” Wired, April 27, 2015.

    Google Scholar 

  • Gunelius, Susan (2013) “The History and Evolution of the Internet,” ACI Blog Post, October 2013.

    Google Scholar 

  • Hagel, Chuck (2014) “2014 Quadrennial Defense Review,” March 4, 2014.

    Google Scholar 

  • Higgins, Kelly Jackson (2012) “Shamoon, Saudi Aramco, And Targeted Destruction,” Dark Reading, August 22, 2012.

    Google Scholar 

  • Higgins, Kelly Jackson (2015) “Hacking Virginia State Trooper Cruisers,” Dark Reading, May 22, 2015.

    Google Scholar 

  • HP Security Research (2013) “Syrian Electronic Army,” HPSR Threat Intelligence Briefing Episode 3, April 2013

    Google Scholar 

  • HP Security Research (2014) “Islamic Republic of Iran,” HP Security Briefing Episode 11, February 2014.

    Google Scholar 

  • Ibish, Hussein (2015) “The ISIS Theater Of Cruelty,” The New York Times, February 19, 2015.

    Google Scholar 

  • ICS-CERT MONITOR (2013) “Trends in Incident Response in 2013 Overview,” October/November/December 2013.

    Google Scholar 

  • Imperva (2012) “The Anatomy of an Anonymous Attack,” Imperva”s Hacker Intelligence Summary Report, 2012.

    Google Scholar 

  • Intel Corporation (2015) “The Cybersecurity Framework in Action: An Intel Use Case,” Solution Brief, 2015.

    Google Scholar 

  • IRC Radio (2011) “Anonnews – Everything Anonymous,” IRC Radio, Blog Posting, Creative Commons, February 26, 2011.

    Google Scholar 

  • Jackson, William (2011) “Cybereye: FBI Shares Lessons of Zeus Botnet Ring Takedown,” Government Computer News, July 22, 2011.

    Google Scholar 

  • Joint Publication 1-02 (2014) Department of Defense Dictionary of Military and Associated Terms, The Joint Staff.

    Google Scholar 

  • Kaspersky, “Carbanak APT: The Great Bank Robbery,” Report, Version 2.0, February 2015, 1–23.

    Google Scholar 

  • Krebs, Brian (2014a) “A First Look at the Target Intrusion, Malware,” krebsonsecurity.com, January 15, 2014.

  • Krebs, Brian (2014b) “Email Attack on Vendor Set up Breach at Target,” krebsonsecurity.com, February 12, 2014.

  • Leiner, Barry M., et al. (2009) “A Brief History of the Internet,” 2009.

    Google Scholar 

  • Lewis, James A. (2008) “Securing Cyberspace for the 44th President,” A Report of the CSIS Commission, December 2008.

    Google Scholar 

  • Markoff, John (2008) “Before the Gunfire, Cyberattacks,” New York Times, August 12, 2008.

    Google Scholar 

  • Marson, Carolyn Duffy (2009) “The Evolution of the Internet,” PCWorld, February 12, 2009.

    Google Scholar 

  • Martonyi, János (2012) “Budapest Conference on Cyberspace,” Millenáris Park, Budapest, Hungary, October 4–5, 2012.

    Google Scholar 

  • McClure, Stuart (2014) Operation Cleaver, Cylance Report, December 2014.

    Google Scholar 

  • McCullagh, Declan (2010) “T.J. Maxx Hacker Sentenced to 20 Years in Prison,” CNET, Tech Industry Section, March 25, 2010.

    Google Scholar 

  • McGrath, Maggie (2014) “Target Data Breach Spilled Info On As Many As 70 Million Customers,” Forbes, January 10, 2014.

    Google Scholar 

  • McGurk, Sean P. (2011) “The DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure,” Testimony before the US House Committee on Homeland Security, April 15, 2011.

    Google Scholar 

  • Miller, Michael E. (2015) “Car Hacking Just Got Real: In Experiment, Hackers Disable SUV on Busy Highway,” The Washington Post, July 22, 2015.

    Google Scholar 

  • Monaco, Lisa O. (2015) “Strengthening Our Nation”s Cyber Defenses,” Remarks as Prepared for Delivery, The Wilson Center, Washington, DC, February 10, 2015.

    Google Scholar 

  • Nakashima, Ellen (2013) “Confidential Report Lists U.S. Weapons System Designs Compromised by Chinese Companies,” Washington Post, May 27, 2013.

    Google Scholar 

  • National Institute of Standards and Technology (2013) “Glossary of Key Information Security Terms,” NISTIR 7298 Revision 2, May 2013.

    Google Scholar 

  • National Institute of Standards and Technology (2014) “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, February 12, 2014.

    Google Scholar 

  • Obama, Barak (2011) “International Strategy for Cyberspace,” May 2011.

    Google Scholar 

  • Obama, Barak (2013) “Improving Critical Infrastructure Cybersecurity,” Executive Order 13636, February 12, 2013.

    Google Scholar 

  • Obama, Barak (2015a) “Promoting Private Sector Cybersecurity Information Sharing,” Executive Order 13691, February 13, 2015.

    Google Scholar 

  • Obama, Barak (2015b) “Remarks at the Cybersecurity and Consumer Protection Summit,” Stanford University, Palo Alto, California, February 13, 2015.

    Google Scholar 

  • Pagliery, Jose, Jamie Crawford and Ashley Killough (2015) “CENTCOM Twitter Account Hacked, Suspended,” CNN News, January 12, 2015.

    Google Scholar 

  • Panetta, Leon E. (2012) “Defending the Nation from Cyber Attack,” Business Executives for National Security, New York, October 11, 2012.

    Google Scholar 

  • Perlroth, Nicole (2012) “Attacks on 6 Banks Frustrate Customers,” The New York Times, September 30, 2012.

    Google Scholar 

  • Perlroth, Nicole and David Gelles (2014) “Russian Hackers Amass over a Billion Internet Passwords,” The New York Times, August 5, 2014.

    Google Scholar 

  • Rampton, Roberta and Alina Selyukh (2015) “Obama Seeks Enhanced Cybersecurity Laws to Fight Hackers,” Reuters, January 13, 2015.

    Google Scholar 

  • Rosenbach, Eric (2015) Statement before the U.S. Senate Committee on Armed Services, April 14, 2015.

    Google Scholar 

  • Schmidt, Michael S. and Helene Cooper (2015) “ISIS Urges Sympathizers to Kill U.S. Service Members It Identifies on Website,” The New York Times, March 21, 2015.

    Google Scholar 

  • Schwartz, Mathew J. (2012) “Anonymous Leaves Clues in Failed Vatican Attack,” Dark Reading, February 29, 2012.

    Google Scholar 

  • Sherstobitoff, Ryan (2014) “Cyber Espionage,” McAfee Labs Threats Report, November 2014.

    Google Scholar 

  • Spaulding, Suzanne and Phyllis Schneck (2015) “Examining the President”s Cybersecurity Information Sharing Proposal,” Testimony for a House Committee on Homeland Security, February 25, 2015.

    Google Scholar 

  • Stewart, Vincent R. (2015) “Defense Intelligence Agency, Worldwide Threat Assessment,” February 3, 2015.

    Google Scholar 

  • Strategy for Operating in Cyberspace (2011) U.S. Department of Defense, July 2011.

    Google Scholar 

  • The National White Collar Crime Center (2007) “2007 Internet Crime Report,” Federal Bureau of Investigation.

    Google Scholar 

  • Tikk, Eneken, Kadri Kaska and Liis Vihul (2009) International Cyber Incidents: Legal Considerations, NATO Cooperative Cyber Defence Centre of Excellence.

    Google Scholar 

  • Todd, Brian and Forrest Brown (2013) “Syria”s Cyberattack: First Wave of a Bigger War?“ CNN.com, August 30, 2013.

  • Ullrich, Johannes B. (2015) “New Cyberthreats: Defending against the Digital Invasion,” Search Security, April 3, 2015.

    Google Scholar 

  • United Nations General Assembly (2013) “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” A/68/98, June 24, 2013.

    Google Scholar 

  • United Nations General Assembly (2015) “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” A/70/174, July 22, 2015.

    Google Scholar 

  • United States District Court (2014) Indictment, Criminal No. 14-118, Filed May 1, 2014.

    Google Scholar 

  • United States, Executive Office of the President (2010) The Comprehensive National Cybersecurity Initiative, Initiative #12, March, 2010.

    Google Scholar 

  • United States, Executive Office of the President (2011) International Strategy for Cyberspace, The White House, May, 2011.

    Google Scholar 

  • Walker, Danielle (2012) “Natural Gas Giant Rasgas Targeted in Cyber Attack,” SC Magazine, August 31, 2012.

    Google Scholar 

  • Wan, William and Ernesto Londono (2014) “China Vents Outrage over U.S. Cyberspying Indictment,” https://washingtonpost.com, May 20, 2014.

  • Weisman, Steve (2015) “Are You Safe in the Internet of Things,” USA Today, April 4, 2015.

    Google Scholar 

  • Wortzel, Larry M. (2013) The Dragon Extends its Reach: Chinese Military Power Goes Global, Potomac Books.

    Google Scholar 

  • Wortzel, Larry M. (2014) “China”s Military Modernization and Cyber Activities,” Strategic Studies Quarterly, Spring 2014.

    Google Scholar 

  • Yadron, Danny (2014) “Chinese Hacked U.S. Military Contractors, Senate Panel Says Hackers Broke into Computer Networks 20 Times in a Year,” The Wall Street Journal, September 18, 2014.

    Google Scholar 

  • Yadron, Danny and Emily Glazer (2015) “New Report Says Computer Criminals Stole Millions From Banks,” The Wall Street Journal, February 15, 2015.

    Google Scholar 

  • Yun Byung-Se, H.E. (2013) “Seoul Conference on Cyberspace,” Seoul, South Korea, October 17–18, 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Scott Jasper .

Editor information

Editors and Affiliations

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Jasper, S., Wirtz, J. (2017). Cyber Security. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_9

Download citation

Publish with us

Policies and ethics