Cyber Attacks

Cyber Attacks

Neil C. Rowe (U.S. Naval Postgraduate School, USA)
DOI: 10.4018/978-1-59904-947-2.ch024
OnDemand PDF Download:


Information systems (computers and networks) are increasingly the targets of attacks ranging from vandalism to serious crimes (Richardson, 2003). Since government systems are valuable resources for a society, it is important to protect them from such attacks. Unfortunately, however, government systems can be especially vulnerable (Lucasik, Goodman, & Longhurst, 2003). This is in part because government is distributed over many locations, and therefore, it is hard to protect all of its information systems well. Second, many government systems must be accessible to a wide range of people (even if through a government intermediary), unlike the specialized systems used in other settings, and users will include a few fools and criminals. Third, governments often use popular business software, and the more popular that software is, the more attacks are known against it. Finally, there are many people with antipathy or grudges against governments for one reason or another, and they may seek revenge by attacking a government’s information system and data. With the global Internet, attackers need not be in the same country as the government they attack. Therefore, it is important to become familiar with the kinds of possible attackers, attacks, and countermeasures that governments could encounter on their computer systems and computer networks (Boswoth & Kabay, 2002; Schwartau, 2001).

Complete Chapter List

Search this Book: