Cyber Security



.The growth of the Internet has been accompanied by an increase in the number and importance of malicious actors who seek to undertake all types of nefarious activities in cyberspace. As a result, there is an ongoing battle today to secure the cyber domain – cyber security has emerged as a major issue that affects every user of the Internet. To describe this situation, this chapter identifies some common terms and concepts related to Internet security. It describes several cyber-attacks to illustrate how cyber security poses an ongoing challenge. It also provides examples of ongoing initiatives undertaken by the United States and the International Community to improve cyber security. It concludes by exploring threats to the expanding confluence of connected devices known as the “Internet of Things.”


  1. “About the Global Conference on Cyberspace” (2015) The Hague, 16-17, April 2015, located at:, Accessed on April 29, 2015.
  2. “ANON OPS: A Press Release,” Blog Posting,, December 10, 2010.
  3. Alexander, Keith B. (2014) Statement before the House Committee on Armed Services, March 12, 2014.Google Scholar
  4. Amit, Iftach Ian (2010) “Cyber [Crime/War]: Linking State Governed Cyber Warfare with Online Criminal Groups,” Security and Innovation.Google Scholar
  5. Anderson, Robert (2014) “Cybersecurity, Terrorism, and Beyond: Addressing Evolving Threats to the Homeland,” testimony before the Committee on Homeland Security and Government Affairs, US Senate, September 10, 2014.Google Scholar
  6. Annual Report to Congress (2013) “Military and Security Developments Involving the People”s Republic of China,” United States, Secretary of Defense, May, 2013.Google Scholar
  7. Arango, Tim (2014) “Sunni Extremists in Iraq Seize 3 Towns from Kurds and Threaten Major Dam,” The New York Times, August 3, 2014.Google Scholar
  8. Ari-Habib, Maria (2014) “Jihadists Step Up Recruitment,” The Wall Street Journal, June 27, 2014.Google Scholar
  9. Arthur, Charles (2014) “Syrian Electronic Army Hacks Skype”s Twitter and Blog Accounts,” The Guardian, January 2, 2014.Google Scholar
  10. Barnes Julian E. and Danny Yadron (2015) “U.S. Probes Hacking of Military Twitter Accounts by Pro-Islamic State Group,” The Wall Street Journal, January 12, 2015.Google Scholar
  11. BBC News (2010) Spanish Police Smash Huge Botnet, March 3, 2010.Google Scholar
  12. Beaumont, Claudine (2010) “Mariposa Botnet Busted by Spanish Police,” The Telegraph, March 3, 2010.Google Scholar
  13. Caris, Charlie (2014) “The Islamic State Announces Caliphate,” Institute for the Study of War, Blogspot, June 2014.Google Scholar
  14. Carr, Jeff (2008) “Russia/Georgia Cyber War – Findings and Analysis,” Project Grey Goose: Phase I Report, October 17, 2008.Google Scholar
  15. Carter, Ash (2015) “The DoD Cyber Strategy,” April 17, 2015.Google Scholar
  16. Chang, Amy (2014) “Warring State: China”s Cybersecurity Strategy,” Center for a New American Security, December 2014.Google Scholar
  17. Clapper, James R. (2015) “Worldwide Threat Assessment of the US Intelligence Community,” Statement for the Record for the Senate Armed Services Committee, February 26, 2015.Google Scholar
  18. Coleman, Kevin (2014) “Syrian Electronic Army,” Cyber Intelligence Advisory, SilverRhino LLC, March 2014.Google Scholar
  19. Coleman, Kevin (2015) “Vehicle Computing Platform,” Executive Insights, May 2015.Google Scholar
  20. Council of Europe (2001) “Convention on Cybercrime,” Budapest, Hungary, November 23, 2001.Google Scholar
  21. Council of Europe (2015) “Global Action on Cybercrime,” about the Project, located at `, Accessed on April 29, 2015.
  22. Crittenden, Michael R. and Sam Dagher (2014) “Obama Cools Talk of Strikes against Islamic State in Iraq or Syria: Extremists Killed Nearly 500 This Week in One Syrian Province, Opposition Activists Say,” The Wall Street Journal, August 28, 2014.Google Scholar
  23. CSIS (Center for Strategic and International Studies) (2013) “The Economic Impact of Cybercrime and Cyber Espionage,” July, 2013.Google Scholar
  24. “Cyberspace Policy Review, Assuring a Trusted and Resilient Information and Communication Infrastructure” (2009) United States, Executive Office of the President, May 2009.Google Scholar
  25. Cyber Threat Intelligence (2015) “Cyber Caliphate: ISIS Plays Offense on the Web,” Posted by RFSID,, April 2, 2015.
  26. Dettmer, Jamie (2014) “Digital Jihad: ISIS, Al Qaeda Seek a Cyber Caliphate to Launch Attacks on US,” Fox News, September 14, 2014.Google Scholar
  27. “Executive Order – Improving Critical Infrastructure Cybersecurity” (2013) Executive Office of the President, The White House, February 12, 2013.Google Scholar
  28. Gates, Bill (1995) The Road Ahead, Viking.Google Scholar
  29. Gladstone, Rick and Vindu Goel (2015) “ISIS Is Adept on Twitter, Study Finds,” The New York Times, March 6, 2015.Google Scholar
  30. Gorman, Siobhan (2014) “Navy Hacking Blamed on Iran Tied to H-P Contract,” The Wall Street Journal, March 6, 2014.Google Scholar
  31. Grauman, Brigid (2012) “Cyber-Security: The Vexed Question of Global Rules. An Independent Report on Cyber-preparedness around the World,” Santa Clara, CA, McAfee, 2012.Google Scholar
  32. Greenberg, Andy (2015) “Researchers Plan to Demonstrate a Wireless Car Hack This Summer,” Wired, April 27, 2015.Google Scholar
  33. Gunelius, Susan (2013) “The History and Evolution of the Internet,” ACI Blog Post, October 2013.Google Scholar
  34. Hagel, Chuck (2014) “2014 Quadrennial Defense Review,” March 4, 2014.Google Scholar
  35. Higgins, Kelly Jackson (2012) “Shamoon, Saudi Aramco, And Targeted Destruction,” Dark Reading, August 22, 2012.Google Scholar
  36. Higgins, Kelly Jackson (2015) “Hacking Virginia State Trooper Cruisers,” Dark Reading, May 22, 2015.Google Scholar
  37. HP Security Research (2013) “Syrian Electronic Army,” HPSR Threat Intelligence Briefing Episode 3, April 2013Google Scholar
  38. HP Security Research (2014) “Islamic Republic of Iran,” HP Security Briefing Episode 11, February 2014.Google Scholar
  39. Ibish, Hussein (2015) “The ISIS Theater Of Cruelty,” The New York Times, February 19, 2015.Google Scholar
  40. ICS-CERT MONITOR (2013) “Trends in Incident Response in 2013 Overview,” October/November/December 2013.Google Scholar
  41. Imperva (2012) “The Anatomy of an Anonymous Attack,” Imperva”s Hacker Intelligence Summary Report, 2012.Google Scholar
  42. Intel Corporation (2015) “The Cybersecurity Framework in Action: An Intel Use Case,” Solution Brief, 2015.Google Scholar
  43. IRC Radio (2011) “Anonnews – Everything Anonymous,” IRC Radio, Blog Posting, Creative Commons, February 26, 2011.Google Scholar
  44. Jackson, William (2011) “Cybereye: FBI Shares Lessons of Zeus Botnet Ring Takedown,” Government Computer News, July 22, 2011.Google Scholar
  45. Joint Publication 1-02 (2014) Department of Defense Dictionary of Military and Associated Terms, The Joint Staff.Google Scholar
  46. Kaspersky, “Carbanak APT: The Great Bank Robbery,” Report, Version 2.0, February 2015, 1–23.Google Scholar
  47. Krebs, Brian (2014a) “A First Look at the Target Intrusion, Malware,”, January 15, 2014.
  48. Krebs, Brian (2014b) “Email Attack on Vendor Set up Breach at Target,”, February 12, 2014.
  49. Leiner, Barry M., et al. (2009) “A Brief History of the Internet,” 2009.Google Scholar
  50. Lewis, James A. (2008) “Securing Cyberspace for the 44th President,” A Report of the CSIS Commission, December 2008.Google Scholar
  51. Markoff, John (2008) “Before the Gunfire, Cyberattacks,” New York Times, August 12, 2008.Google Scholar
  52. Marson, Carolyn Duffy (2009) “The Evolution of the Internet,” PCWorld, February 12, 2009.Google Scholar
  53. Martonyi, János (2012) “Budapest Conference on Cyberspace,” Millenáris Park, Budapest, Hungary, October 4–5, 2012.Google Scholar
  54. McClure, Stuart (2014) Operation Cleaver, Cylance Report, December 2014.Google Scholar
  55. McCullagh, Declan (2010) “T.J. Maxx Hacker Sentenced to 20 Years in Prison,” CNET, Tech Industry Section, March 25, 2010.Google Scholar
  56. McGrath, Maggie (2014) “Target Data Breach Spilled Info On As Many As 70 Million Customers,” Forbes, January 10, 2014.Google Scholar
  57. McGurk, Sean P. (2011) “The DHS Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure,” Testimony before the US House Committee on Homeland Security, April 15, 2011.Google Scholar
  58. Miller, Michael E. (2015) “Car Hacking Just Got Real: In Experiment, Hackers Disable SUV on Busy Highway,” The Washington Post, July 22, 2015.Google Scholar
  59. Monaco, Lisa O. (2015) “Strengthening Our Nation”s Cyber Defenses,” Remarks as Prepared for Delivery, The Wilson Center, Washington, DC, February 10, 2015.Google Scholar
  60. Nakashima, Ellen (2013) “Confidential Report Lists U.S. Weapons System Designs Compromised by Chinese Companies,” Washington Post, May 27, 2013.Google Scholar
  61. National Institute of Standards and Technology (2013) “Glossary of Key Information Security Terms,” NISTIR 7298 Revision 2, May 2013.Google Scholar
  62. National Institute of Standards and Technology (2014) “Framework for Improving Critical Infrastructure Cybersecurity,” Version 1.0, February 12, 2014.Google Scholar
  63. Obama, Barak (2011) “International Strategy for Cyberspace,” May 2011.Google Scholar
  64. Obama, Barak (2013) “Improving Critical Infrastructure Cybersecurity,” Executive Order 13636, February 12, 2013.Google Scholar
  65. Obama, Barak (2015a) “Promoting Private Sector Cybersecurity Information Sharing,” Executive Order 13691, February 13, 2015.Google Scholar
  66. Obama, Barak (2015b) “Remarks at the Cybersecurity and Consumer Protection Summit,” Stanford University, Palo Alto, California, February 13, 2015.Google Scholar
  67. Pagliery, Jose, Jamie Crawford and Ashley Killough (2015) “CENTCOM Twitter Account Hacked, Suspended,” CNN News, January 12, 2015.Google Scholar
  68. Panetta, Leon E. (2012) “Defending the Nation from Cyber Attack,” Business Executives for National Security, New York, October 11, 2012.Google Scholar
  69. Perlroth, Nicole (2012) “Attacks on 6 Banks Frustrate Customers,” The New York Times, September 30, 2012.Google Scholar
  70. Perlroth, Nicole and David Gelles (2014) “Russian Hackers Amass over a Billion Internet Passwords,” The New York Times, August 5, 2014.Google Scholar
  71. Rampton, Roberta and Alina Selyukh (2015) “Obama Seeks Enhanced Cybersecurity Laws to Fight Hackers,” Reuters, January 13, 2015.Google Scholar
  72. Rosenbach, Eric (2015) Statement before the U.S. Senate Committee on Armed Services, April 14, 2015.Google Scholar
  73. Schmidt, Michael S. and Helene Cooper (2015) “ISIS Urges Sympathizers to Kill U.S. Service Members It Identifies on Website,” The New York Times, March 21, 2015.Google Scholar
  74. Schwartz, Mathew J. (2012) “Anonymous Leaves Clues in Failed Vatican Attack,” Dark Reading, February 29, 2012.Google Scholar
  75. Sherstobitoff, Ryan (2014) “Cyber Espionage,” McAfee Labs Threats Report, November 2014.Google Scholar
  76. Spaulding, Suzanne and Phyllis Schneck (2015) “Examining the President”s Cybersecurity Information Sharing Proposal,” Testimony for a House Committee on Homeland Security, February 25, 2015.Google Scholar
  77. Stewart, Vincent R. (2015) “Defense Intelligence Agency, Worldwide Threat Assessment,” February 3, 2015.Google Scholar
  78. Strategy for Operating in Cyberspace (2011) U.S. Department of Defense, July 2011.Google Scholar
  79. The National White Collar Crime Center (2007) “2007 Internet Crime Report,” Federal Bureau of Investigation.Google Scholar
  80. Tikk, Eneken, Kadri Kaska and Liis Vihul (2009) International Cyber Incidents: Legal Considerations, NATO Cooperative Cyber Defence Centre of Excellence.Google Scholar
  81. Todd, Brian and Forrest Brown (2013) “Syria”s Cyberattack: First Wave of a Bigger War?“, August 30, 2013.
  82. Ullrich, Johannes B. (2015) “New Cyberthreats: Defending against the Digital Invasion,” Search Security, April 3, 2015.Google Scholar
  83. United Nations General Assembly (2013) “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” A/68/98, June 24, 2013.Google Scholar
  84. United Nations General Assembly (2015) “Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security,” A/70/174, July 22, 2015.Google Scholar
  85. United States District Court (2014) Indictment, Criminal No. 14-118, Filed May 1, 2014.Google Scholar
  86. United States, Executive Office of the President (2010) The Comprehensive National Cybersecurity Initiative, Initiative #12, March, 2010.Google Scholar
  87. United States, Executive Office of the President (2011) International Strategy for Cyberspace, The White House, May, 2011.Google Scholar
  88. Walker, Danielle (2012) “Natural Gas Giant Rasgas Targeted in Cyber Attack,” SC Magazine, August 31, 2012.Google Scholar
  89. Wan, William and Ernesto Londono (2014) “China Vents Outrage over U.S. Cyberspying Indictment,”, May 20, 2014.
  90. Weisman, Steve (2015) “Are You Safe in the Internet of Things,” USA Today, April 4, 2015.Google Scholar
  91. Wortzel, Larry M. (2013) The Dragon Extends its Reach: Chinese Military Power Goes Global, Potomac Books.Google Scholar
  92. Wortzel, Larry M. (2014) “China”s Military Modernization and Cyber Activities,” Strategic Studies Quarterly, Spring 2014.Google Scholar
  93. Yadron, Danny (2014) “Chinese Hacked U.S. Military Contractors, Senate Panel Says Hackers Broke into Computer Networks 20 Times in a Year,” The Wall Street Journal, September 18, 2014.Google Scholar
  94. Yadron, Danny and Emily Glazer (2015) “New Report Says Computer Criminals Stole Millions From Banks,” The Wall Street Journal, February 15, 2015.Google Scholar
  95. Yun Byung-Se, H.E. (2013) “Seoul Conference on Cyberspace,” Seoul, South Korea, October 17–18, 2013.Google Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  1. 1.School of International Graduate StudiesNaval Postgraduate SchoolMontereyUS

Personalised recommendations