Cyber Attacks a Growing Threat, Congressman Says

By

A recent rash of cyber security attacks has drawn the attention of Congress, Pat Meehan, R-PA, writes in The Mercury. The attacks have been focused on U.S. bank accounts.

Izz ad-Din al-Qassam is connected to the attacks; the group is connected to and working with the Iranian government. Citigroup, PNC and Capital One, among others, have all been affected by the attacks, either by service disruption or by shutting down the sites.

U.S. security officials have predicted that Iran has been growing more capable of cyber attacks such as these. In April 2012 Frank Cilluffo, director of the Homeland Security Policy Institute at George Washington University said “there is little, if any, reason to think that Iran would hesitate to engage proxies to conduct cyber strikes against perceived adversaries.”

Online attacks can have larger targets than just personal bank accounts. Air-traffic and rail control systems, the power grid, water systems, power plants, wireless networks and defense networks are all potential targets. While taking down online banking functionality only causes an inconvenience, infrastructure attacks can cause blackouts, damn failures, communication failures and an inability to mobilize defense. Anything that is controlled by a computer and is connected to another computer is at some level of risk from cyber attacks.

In the summer of 2012, two large companies in the Middle East had important business information wiped from databases and tens of thousands of computers destroyed in an attack. In much the same way business data can be erased, bank account balances can be erased, as the information is now saved on computers; as more records are digitized, more personal information is subject to theft and unwanted deletion. The subcommittee on cybersecurity, infrastructure and protection as well as security technologies will be creating a plan to prevent such attacks on Americans.




Edited by Rachel Ramsey

TechZone360 Contributing Writer

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More