Type
Quiz
Book Title
Computer Security Fundamentals 3rd Edition
ISBN 13
978-0789757463

Networking Chapter 12 Instructors Manual Materials Accompany Computer Security Fundamentals Cyber Terrorism And Information

May 3, 2021
Instructors Manual Materials to Accompany
COMPUTER SECURITY FUNDAMENTALS
CHAPTER 12
CYBER TERRORISM AND INFORMATION WARFARE
CHAPTER 12 OBJECTIVES
When students finish reading this chapter, they will be able to:
Explain what cyber terrorism is and how it has been used in some actual cases.
Understand the basics of information warfare.
Have a working knowledge of some plausible cyber-terrorism scenarios.
Have an appreciation for the dangers posed by cyber terrorism.
CHAPTER OVERVIEW
As the world becomes more dependent upon computer systems, the danger of cyber terrorism will grow. Cyber
terrorism is not a big problem today; it is the problem that is looming on our horizon. There must be a much
stronger emphasis on computer security. In addition to the basic security measures recommended in this book,
this chapter provides recommendations for preparing for and protecting systems against cyber terrorism. This
chapter explores the actual and possible use of computers for terrorism, information warfare, propaganda,
information control, and disinformation. It looks at the history and future trends in cyber terrorism and some steps
to take to combat it.
The major sections in this chapter are
1. Introduction. This section offers a description of cyber terrorism and why it is a growing threat to IT
security.
3. Military Operations Attacks. This section depicts how our military operations could be compromised
through less secure minor systems.
5. Information Warfare. This section covers the use and misuse of information for propaganda, information
control, and divulging disinformation to the enemy.
7. Future Trends. This section covers both positive and negative trends in the ongoing battle with cyber
terrorism.
CHAPTER OUTLINE
I. Chapter 12 Objectives
II. Introduction
Actual Cases of Cyber Terrorism
China Eagle Union
III. Economic Attacks
IV. Military Operations Attacks
V. General Attacks
Supervisory Control and Data Acquistions
VI. Information Warfare
Propaganda
Information Control
Disinformation
VII. Actual Cases
Recent cases
VIII. Future Trends
Positive Trends
Negative Trends
IX. Defense Against Cyber Terrorism
X. Summary
XI. Test Your Skills
XII. Exercises
XIII. Projects
KEY TERMS
cyber terrorism Using the Internet to terrorize someone or some group of individuals.
hactivism Hacking conducted for ideological purposes.
TEACHING NOTES
I. Economic Attacks
Teaching Tips: Our economy is based on trust. Trust is built on good information.
Point out that the economic crash of the 1930s happened in large part due to a breakdown in trust in the
stock market and banks. Many peoples’ economic lives were ruined when that trust was broken. Now
imagine that terrorists could break the economic trust we have in the banking system or start a rumor that
the banking system was ready to fail. What would be the outcome?
II. Military Operations Attacks
Teaching Tips: “The army travels on its stomach.” How many computerized systems
are in use by the military to keep the army running and well informed? Have students list as many
systems as they can think of.
III. General Attacks
Teaching Tips: Review what havoc viruses, worms, and malicious programs have
done in the past. Ask the class what would happen if these had been a coordinated attack by paid
professionals.
IV. Information Warfare
V. Actual Cases
Teaching Tips: Ask students whether they can recall any cases of cyber terrorism.
Ask what their feelings are about the CIA or NSA using cyber terrorism against other countries.
VI. Future Trends
Teaching Tips: As hackers have shown, there are always unknown vulnerabilities in
our computer systems. What can the government do to help protect U.S. systems and the Internet? Can we
completely protect cyberspace? Should we spend resources if most cyber terrorism acts are not fatal?
VII. Defense Against Cyber Terrorism
PROJECTS/EXERCISES
I. Discussion Questions
A. Discussion Question 1
Are we better prepared against cyber terrorism since 9/11? How?
B. Discussion Question 2
Currently, what do you think is the most vulnerable computer system to cyber
terrorism? What could be the results if attacked?
II. Web Projects
A. Web Project 1
Go to Google.com to find articles about whether cyber terrorism is a real risk or
is over-hyped. Try starting at
http://www.zdnet.com.au/news/security/0,2000061744,20280859,00.htm and
http://www.walden.co.il/pages/News/221101.html.
B. Web Project 2
Go to Google.com to find out about the software backdoor that the U.S. installed
in a U.S.S.R. oil pipeline program during the Cold War. You can start at
http://www.theregister.co.uk/2004/03/16/explosive_cold_war_trojan_has/. How does
U.S. involvement in cyber warfare impact our interests in other countries?
C. Web Project 3
Go to Google.com and look up “Digital Pearl Harbor.What are the
assumptions? Is it realistic? What could be the impact?
D. Web Project 4
Go to Google.com and find out how terrorists are using the Internet for
communications and coordination. You can start at
http://www.usip.org/pubs/specialreports/sr116.pdf.
WEB RESOURCES
Cyber terrorism resources
CHAPTER REVIEW/ANSWERS TO TEST YOUR SKILLS
Multiple Choice Questions
1. What is the most likely damage from an act of cyber terrorism?
2. Which of the following is not an example of financial loss due to cyber terrorism?
3. Which of the following military/government systems would most likely be the target of a
successful computer hack?
4. Which of the following might be an example of domestic cyber terrorism?
5. What differentiates cyber terrorism from other computer crimes?
6. Which of the following is a political group that has already used the Internet for political
intimidation?
7. What is information warfare?
8. Which of the following would most likely be considered examples of information warfare?
9. Which of the following is a likely use of Internet newsgroups in information warfare?
10. Sending a false message with weak encryption, intending it to be intercepted and deciphered, is
an example of what?
11. Which of the following best describes the communication goal of any intelligence agency?
12. Which of the following conflicts had a cyber warfare component?
13. Which of the following agencies has allegedly had one of its cyber spies actually caught?
14. According to the October 2002 InfoWorld magazine article, which of the following systems may
be vulnerable to attack?
15. Which of the following is a cyber attack that would likely cause imminent loss of life?
Exercises
EXERCISE 10.1 FINDING INFORMATION WARFARE
EXERCISE 10.2: CYBER TERRORISM THREAT ASSESSMENT
The purpose of this exercise is to show students how to use the Internet as an information source on
EXERCISE 10.3: FINDING INFORMATION POLICIES
EXERCISE 10.4: HOW COMPANIES DEFEND AGAINST CYBER TERRORISM
Students must get a sense of real-world applications for what they are learning and for them to move
EXERCISE 10.5: PULLING IT ALL TOGETHER
This exercise should be the culmination of all that students have learned thus farboth from the text and
Projects
PROJECT 10.1 COMPUTER SECURITY AND CYBER TERRORISM
Successful students will take security measures mentioned in this book and show how they might be
PROJECT 10.2 THE LAW AND CYBER TERRORISM
PROJECT 10.3 CYBER TERRORISM SCENARIO
The purpose of this exercise is to get students to consider what responses should be taken to a cyber
Case Study
This case study is designed to get students to think about the requirements of environments that need
more security than the average business. Students should come up with a wide range of security
precautions. Precautions such as