Cyber Attacks a Growing Threat, Congressman Says

By Jody Ray Bennett February 12, 2013

A recent rash of cyber security attacks has drawn the attention of Congress, Pat Meehan, R-PA, writes in The Mercury. The attacks have been focused on U.S. bank accounts.

Izz ad-Din al-Qassam is connected to the attacks; the group is connected to and working with the Iranian government. Citigroup, PNC and Capital One, among others, have all been affected by the attacks, either by service disruption or by shutting down the sites.

U.S. security officials have predicted that Iran has been growing more capable of cyber attacks such as these. In April 2012 Frank Cilluffo, director of the Homeland Security Policy Institute at George Washington University said “there is little, if any, reason to think that Iran would hesitate to engage proxies to conduct cyber strikes against perceived adversaries.”

Online attacks can have larger targets than just personal bank accounts. Air-traffic and rail control systems, the power grid, water systems, power plants, wireless networks and defense networks are all potential targets. While taking down online banking functionality only causes an inconvenience, infrastructure attacks can cause blackouts, damn failures, communication failures and an inability to mobilize defense. Anything that is controlled by a computer and is connected to another computer is at some level of risk from cyber attacks.

In the summer of 2012, two large companies in the Middle East had important business information wiped from databases and tens of thousands of computers destroyed in an attack. In much the same way business data can be erased, bank account balances can be erased, as the information is now saved on computers; as more records are digitized, more personal information is subject to theft and unwanted deletion. The subcommittee on cybersecurity, infrastructure and protection as well as security technologies will be creating a plan to prevent such attacks on Americans.




Edited by Rachel Ramsey

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

How valuable is your personal data?

By: Special Guest    9/22/2017

Are you unknowingly working for someone else and is Big Tech making vast gains at our expense?

Read More

Designing Insightful Dashboards for Decision Making

By: Special Guest    9/21/2017

As businesses continue to accumulate data that has the potential to improve operations and increase revenue, dashboard design is becoming a key compon…

Read More

Artificial Intelligence: The Human to Bot Handoff

By: Special Guest    9/21/2017

Artificial intelligence (AI) is one of the most talked about and debated topics of conversation happening today. It is touching every industry.

Read More

Dark Data - Do You Have a Plan?

By: Special Guest    9/19/2017

Practically every organization has vast amounts of "dark data" in the form of weblogs, machine logs, and logs from sensors on everything from oil rigs…

Read More

Open is the New Black for Mobile Voice Services

By: Special Guest    9/18/2017

It's time for some fresh thinking about voice services. Once the dominant source of revenue for mobile operators, voice calls are now a rare form of c…

Read More