2014 witnessed the rise of the “Internet of Things” (IoT), a massive network of interconnected devices (estimated to be about 15 billion) ranging from PCs to toasters, cars, and other household and office devices. The IoT is expected to grow to more than 75 billion devices by 2025.
The number of unsecured IoT devices comprises a target-rich environment for cybercriminals to exploit. The impact of vulnerabilities associated with the IoT can be understood by examining the 2016 distributed denial of service (DDoS) attack targeting Dyn. The Dyn attack was made possible by the large number of unsecured Internet-connected devices, like home routers and surveillance cameras, that make up a large portion of the IoT. The attackers directed thousands of devices that had been infected with malicious code to form a botnet. Individually, these devices are harmless; however, their collective computing power was enough to bring down one of the largest DNS services making up the Internet today.
Lately, there has been a marked rise in global ransomware attacks. In May 2017, a massive ransomware attack in 99 countries infected computers and encrypted data, holding it hostage until the administrators paid to regain control of the devices. The scale of the attack was like nothing seen before, but the real danger was in the targets compromised—16 national health services in the UK were attacked, causing appointment cancellations and emergency room shutdowns. Television and communication organizations in Spain and Russia were compromised, as were universities in China and international shipping companies like FedEx. Law enforcement agencies and private security companies around the globe struggled to stem the progress of the ransomware attack by sharing information about prevention and recovery methods.
These two attacks highlight the real danger we are facing from international cybercrime today and in the future.
Upon successful completion of this assignment, you will be able to:
• Discuss the relationship between national law enforcement agencies and private organizations to combat global cybercrime.
• Demonstrate an understanding of the vulnerabilities associated with IoT as it relates to global cybercrime.
Resources
• Textbook: Cybercrime and Digital Forensics: An Introduction
• Web File: An ISTR Special Report: Ransomware and Business 2016.pdf
• IWU Resources
Background Information
Law enforcement agencies and private security companies around the globe struggle to stem the progress of the ransomware attacks. Understanding how a ransomware attack like “WannaCry” identifies targets, infects machines, and moves throughout the Internet will help us develop strategies to prevent future global ransomware attacks. Ransomware attacks highlight the real danger we are facing from international cybercrime today and in the future. It is critical for organizations that have the responsibility of protecting critical national infrastructure or private corporate networks understand the threats associated with online criminal activity.
Instructions
1. Review the rubric to make sure you understand the criteria for earning your grade.
2. Review the following chapters in the textbook, Cybercrime and Digital Forensics: An Introduction:
a. Chapter 10, “Online Extremism, Cyberterror, and Cyber Warfare”
b. Chapter 15, “The Future of Cybercrime, Terror, and Policy”
3. Read the file An ISTR Special Report: Ransomware and Business 2016.
4. In a 750- to 1000-word essay, respond to the following:
a. Choose two key findings from the ISTR report and expand upon the discovery of this information and how it can help aid cybersecurity experts prevent future attacks like “WannaCry.”
b. How can sharing information like this report positively impact the relationship between national law enforcement agencies and private organizations to combat global cybercrime?
0 comments:
Post a Comment