12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

18 2. POLITICAL CYBER ATTACK COMES OF AGE IN 2007FIGURE 2.2 Toompea Castle in the upper <strong>to</strong>wn of Tallinn is the home of the Es<strong>to</strong>nian Parliament. A Denialof Service attack in April 2007 caused the Parliament’s e-mail servers <strong>to</strong> become unavailable, delaying the Es<strong>to</strong>niangovernment’s response <strong>to</strong> countrywide cyber attacks at the time. Source: CIA World Fact Book.Some hackers were able <strong>to</strong> compromise the security of the Web servers of Es<strong>to</strong>nian politicalparties. They used their new access <strong>to</strong> these servers <strong>to</strong> deface them, replacing legitimate contentprovided by the government with content mocking the government. One such defacementadded a moustache <strong>to</strong> a picture of the prime minister. Another placed a falseapology letter from the prime minister.The Es<strong>to</strong>nian Government’s ResponseIn the face of a massive and distributed denial of service attack, options are generally limited.Some Internet service providers offer a “DDoS protection” service or plan; however, efficacyof these services can be limited. In the face of a single remote host sending largeamounts of data, an effective mitigation would be <strong>to</strong> s<strong>to</strong>p talking <strong>to</strong> the host. Two complicatingfac<strong>to</strong>rs in the presence of a distributed denial of service attack are, firstly, the attackingcomputers will be numerous and will change over time, and secondly, the source addresses(IP addresses) of the attacking computers can be forged. 13A denial of service attack can lead <strong>to</strong> panic and confusion among IT staff, so a criticalelement of the reaction <strong>to</strong> a denial of service attack is a swift and meaningful response byIT security. The Es<strong>to</strong>nian government had a very capable computer emergency response team(CERT) that was able <strong>to</strong> both identify that an attack was taking place against their infrastructureand mobilize experts <strong>to</strong> help counter the attacks. 14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!