Cyber Attacks a Growing Threat, Congressman Says

By Jody Ray Bennett February 12, 2013

A recent rash of cyber security attacks has drawn the attention of Congress, Pat Meehan, R-PA, writes in The Mercury. The attacks have been focused on U.S. bank accounts.

Izz ad-Din al-Qassam is connected to the attacks; the group is connected to and working with the Iranian government. Citigroup, PNC and Capital One, among others, have all been affected by the attacks, either by service disruption or by shutting down the sites.

U.S. security officials have predicted that Iran has been growing more capable of cyber attacks such as these. In April 2012 Frank Cilluffo, director of the Homeland Security Policy Institute at George Washington University said “there is little, if any, reason to think that Iran would hesitate to engage proxies to conduct cyber strikes against perceived adversaries.”

Online attacks can have larger targets than just personal bank accounts. Air-traffic and rail control systems, the power grid, water systems, power plants, wireless networks and defense networks are all potential targets. While taking down online banking functionality only causes an inconvenience, infrastructure attacks can cause blackouts, damn failures, communication failures and an inability to mobilize defense. Anything that is controlled by a computer and is connected to another computer is at some level of risk from cyber attacks.

In the summer of 2012, two large companies in the Middle East had important business information wiped from databases and tens of thousands of computers destroyed in an attack. In much the same way business data can be erased, bank account balances can be erased, as the information is now saved on computers; as more records are digitized, more personal information is subject to theft and unwanted deletion. The subcommittee on cybersecurity, infrastructure and protection as well as security technologies will be creating a plan to prevent such attacks on Americans.




Edited by Rachel Ramsey

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

How Enhanced Connectivity Benefits Analytics and Big Data

By: Lindsey Patterson    3/29/2017

Potential benefits of data analysis include enhanced marketing potential, the ability to improve overall efficiency as well as the means to track and …

Read More

Think IT Can Handle Security On Its Own? Think Again

By: Special Guest    3/28/2017

One of the major fears of any IT department is losing control - of projects, of users, of applications. Yet, even with the best technology solutions, …

Read More

Optane: Intel Builds a Supercharger for PCs

By: Rob Enderle    3/28/2017

Optane is Intel's brand name for 3D XPoint memory, a brand-new memory architecture which has speed a bit slower than DRAM but otherwise performs like …

Read More

IBM's Cloud/Data/AI Trinity Vision

By: Doug Mohney    3/27/2017

If you want to know what the future of IT looks like, it's always good to look to IBM. The company pioneered and championed PCs, the Internet, open so…

Read More

The Seven Most Important Features of Any BYOD Policy

By: Larry Alton    3/27/2017

While there's no single "correct" way to design and implement a BYOD policy, there are some staple features you'll need to include if you want to pres…

Read More