GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
300
GSJ: Volume 8, Issue 1, January 2020, Online: ISS N 2320-9186
w w w.globalscientificjournal.com
CYBER ATTACK: AN EMERGING WAR
Lilian O. Aluede & Engr. Peace B. Biragbara
KeyWords
Cyber attack, Denial-of-service, Internet security, loophole, network, risk control, terrorism.
.
ABSTRACT
This research work aims to review “cyber attack” being a significant global risk in terms of likelihood of occurrence stipulations; it will further evaluate the mechanism for attacks, and develop control measures for future attacks.
Using the Russia and Georgia cyber conflict in 2008 as a case study, this paper will elucidate the effect of cyber attack on a nation, designs a
contextual diagram of the relationship between cyber attack and other World Economic Forum (WEF) identified global risks. This work
identifies the possibility of cyber attack triggering terrorism, organised crime, global governance failure, massive incident of data fraud or
theft and critical fragile state if left uncontrolled.
This paper implements the ISO 27001 ISMS Model of PLAN, DO, CHECK ACT to management of cyber attack risk; using reports, computer
journals, peer reviewed articles and internet sources, will design a cyber attack risk control hierarchy strategy in organizational context to
combat this emerging challenge.
GSJ© 2020
www.globalscientificjournal.com
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
301
1. INTRODUCTION:
One notable trend of the global age, is the emergence of Internet of Things (IoT), where the world is dependent on the merger of
telecommunication and computers that are web-enabled, networked and vulnerable (Information Communication Technology) for
financial transaction, shopping, communication, research and development and almost everything.
World Bank Group (2014) shows that daily 43.1% of adults worldwide use the internet, while (ITU 2014) estimated 39% of world’s
population. Averagely 41% of global population, who uses the internet daily, are prone to cyber attacks.
Internet is interconnected network, capable of sharing data and communicating with another network but owners of these data do
not grants access and rights, rather it is done by administrators according to function (Fernadeze 2001).
Just like every open access, there is no restriction as to who accesses what information, thus, the Internet offers anybody, and any
country, a deviated approach to assemble cyber-power, and as such, even terrorist depends on the cyber space to perpetuate cyber
crimes.
Cyber attack dates back to the America Civil war in 1862, when Thomas Freeborn went ashore to truncate the Richmond and Federicksburg telegraph lines in other to disrupt their communication , and in 1905 Russia used the radio jamming mechanism in the Russo-Japanese war (The Economist (2008). Since the emergence of computer age, many nations have engaged in cyber war, like that of
China and America, Russia and Estonian in 2007 and the 2008 Russia attack on Georgia, which will be used as case study for the purpose of this research. Scholars have tried to explain/ defined the context of cyber attack, linking it with cyber terrorism, cyber warfare, cyber exploitation and some just simply refers to it as cybercrime. Only a few have been able to give a standalone definition of
the term ‘cyber-attack’.
2. WHAT IS CYBER-ATTACK?
Cyber-attack is a “deliberate actions to alter, disrupt, deceive, degrade, or destroy computer systems or networks or the information
and/or programs resident in or transiting these systems or networks’ (NATO 2010: 71, Owens et al. 2009 and Lin 2010). Joynal ‘s
(n.d.) definition of cyber attack incorporated “potential to degrade national economic systems and communications networks as a
means of breaking the enemy’s will to resist and inflicting military and political defeat, at low cost and without the need to occupy
territory” emphasising cyber attack as a tool for national war.
On one hand, KAMAL A. (2005) trivialized the magnitude of disruption of cyber attack with his definition “computer network related
mischief, such as defacing websites or releasing a virus or a worm, without necessarily causing any serious disruption or widespread
panic or terror for the general population” although still emphasizing ‘network related mischief’. It seems cyber-attack is a deliberate
or in-deliberate attempt to redirect, deny access, spearhead phishing, introduce virus and worms, disrupt and destroy an individual/
national computer networks.
Cyber-attack is one of the top five global risk having scored 3.80 in WEF‘s (2012) report in terms of Likelihood of occurrence. It ranges from denial of service, website defacement, password sniffing, malware, Trojans and virus attacks, identity theft, unauthorized
access, cyber bulling…. This takes advantage of the vulnerability of computer controlled network system to attack system (network,
computers and operations) which might have been introduced accidentally or as result of loopholes. There are numerous reasons
for this act, being that attackers can order the assets to make assault vectors, keeping in mind the end goal is to accomplish their
desired goals like fraud, theft against organizations, banks, countries, areas and even individuals. The nature of cyber-attack makes it
difficult for a Government to verify if an individual or its enemy has launched the attack, since attackers can also support military
operations when at war with counterpart nations (DSCI 2014). Cyber attack makes it easy for nations to engage in war without any
physical destruction, and as such, attack from a rivalry nation can trigger cyber/ physical war. ISTS (2001) Concluded that there is a
relationship between physical attack, political conflict and cyber attack, given that cyber attack instantaneously accompanies physical
attacks.
3. CYBER ATTACK MECHANISM
Cyber-attack varies depending on the attacker and methods of attacks are numerous, the major forms of cyber attacks are:
i.
Identity Theft: this a fraudulent act perpetuated against individuals, by unauthorized collection of personal important data
like pictures, passports, social security number and driving licence, to enable the attacker design a false profile and act as an
imposter either on social network, accessing loan/credit or even tendering it to the police in case of criminal act (Kamal
2005).
GSJ© 2020
www.globalscientificjournal.com
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
302
Denial of Service/ Distributed Denial of Service (DDOS): In this kind of cyber attack, the correspondence to some or all the
server gadgets could be stuck by flooding the system with spurious packets (Douligeris and Mitrokotsa 2004). This can be
network based, home based or even distributed based attack bringing about the loss of basic data exchange and hence influence long haul and element control abilities, this disrupt usually targets the enemy’s communications and supply lines,
jamming of telecommunications, financial and banking network.
iii.
Virus: like computer codes, boot record infectors, file infectors, and macros that gains access into the network by attaching
itself to infected file, distributing itself in the attacked network, in order to corrupt, disrupt and possibly steal secure data
(Hansman & Hunt (2005)
Worms: These are destructive mechanism sent to targeted networks in order to disrupt, damage secure data for the attacker. ISTS
(2001) analysis suggests that worms like Code red, Ramen, Lion might have been created as response to political conflict. There is a
possibility of a worm attaining sleep state in other to affect significant number of host before becoming destructive, but worms like
Warhol worms and flash worms become destructive as soon as they penetrate the network, giving administration little or no time to
implement control measures (Weaver 2001)
ii.
4. CASE STUDY: RUSSIA'S CYBER OPERATIONS AGAINST GEORGIA IN 2008
The attackers targeted the communication system of Georgia’s military, aiming to destabilize, interrupt communication, and disrupt their
plans. This cyber attack is similar to the one perpetuated against Estonia, but this specifically targeted the Georgia’s military. Their websites
(military, President Mikhail Saakashvili , Ministry of Information, Ministry of Foreign Affairs ) was attacked with denial of service (DoS), having authorized the C2 server bots to attack the targeted websites with ICMP, TCP, and HTTP flooding and also shutting down the emergency response service.
In August 2008, Government and private server was under attack, and the Russia’s attack on Georgia became cumbersome involving volunteers on the stopGeorgia website, giving instructions, target list and DoSHTTP utility to assist in flooding the targeted websites (The Economist 2008). Although Korns & Kastenberg (2005) claims non-involvement of Russia government on this DoS attack, and Hruska J. (2008)
believes the attack was a combined effort from the Russia government and organised crime facilitators, but the Ministry Of Foreign Affairs
of Georgia (2008) blames the Russia government for this attack.
Georgia being vulnerable to the attacks (Tikk et al. 2008), resulted to physical shooting war, and seeking “cyber refuge” in United States
(Korns & Kastenberg 2005). This has not only changed perception of cyber attack, also an eye-opening opportunity to analyse the overlooked facet of cyber conflict (A.F. L. REV. 2009). With the help of The US, Georgia responded unconventionally, which brought to the limelight the United States’ failed approach to combating cyber war. Thus issued a statement to counterattack any cyber attack in the future
“never again will we see major warfare without a strong cyber component executed as part of it” (LANGEVIN 2008).
5. PROTECTIVE MECHANISM
Protection of cyber space has become a global concern since humans depend on computers for everything ranging from assisted driving,
human/object tracking, identification/ authorization, social networking, gaming, forecasting, and notifications/alarms (theft, burglary, fire,
temperature etc) (Atzori Et Al 2010). If cyber attack is left uncontrolled it can result to terrorism, organised crime, global governance failure
and critical fragile state as shown in Figure 1
.
GSJ© 2020
www.globalscientificjournal.com
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
303
Cyber Attack
Mineral resource supply vulnerability
Massive digital
misinformation
Massive incident of
data fraud or theft
(Weaver 2001)
Critical systems failure
Militarization of space
(A.F. L. REV. 2009)
Chronic Fiscal imbalance
Terrorism
(A.F. L. REV. 2009)
Organised
crime
(Hruska 2008)
Failure of diplomatic conflict
resolution (Tikk 2008)
Severe income disparity
Global
failure
Governance
Major
systemic
financial failure
Critical fragile state
FIGURE 1: INTERCONNECTION OF OTHER RISKS TO CYBER ATTACK
For individuals, following basic steps like: the use of encryption, passwords, antivirus, authorization codes, double checking URLS
before imputing any personal data to avoid redirected websites and use of firewalls (DHS 2013) will beef up personal computer security which will in turn prevent/ minimize cyber attacks. However, there is no global approved definition for cyber security, and
there is no objective measure for defending against cyber attacks (ITU 2012), Cyber security is very subjective because it is all about
human perception of loopholes and prioritizing information to be safeguarded. This challenge makes it difficult for IT personnel, and
probably underestimates risk/damage that can possibly be caused by cyber attacker to their computers/networks (CIO 2014).
Speed and animosity of cyberspace favours cyber attacker (Miller & Kuehl 2010), utilizing “laundering” host to mask their location
and identity (Lee 2002) enhances the possibility of going undetected after committing havoc.
For organizational targeted attack where a one-success can result to business loss, the information security team need to define risk
tolerability level, develop/ implement a strategic defence mechanism using the hierarchy of risk control: elimination, substitution,
engineering controls, administrative controls, and personal protective equipment.
GSJ© 2020
www.globalscientificjournal.com
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
304
i.
ii.
iii.
Eliminating loopholes: The cyber security appraisal ought to be intensive, incorporating all refined digital assault situations,
for example, information respectability assaults, timing electronic interruptions, DoS assaults, and facilitated digital assaults
(Sridhar & Govindarasu 2012). The tests should be directed on distinctive vendors, bearing in mind that some software/hardware manufactured might have a defect or bug. System risk assessment, testing and identifying possible loopholes for cyber attacks can be done to eliminate loopholes using the following objective matrix
a.
Identifying Network Security Weakness
Weak firewalls rules
Network configuration/ design vulnerabilities
Continuous audit for vulnerabilities
b.
Identify Software Security Weakness
Credential management
Improper authorization, authentication, privilege, access and control
Bugs
Cryptographic issues
Code quality
Kernel Flaws
Continuous audit for vulnerabilities
Substitution: Using the traditional method of risk matrix, which is impact x likelihood of occurrence (ISO 31000 2009), prioritize information to be safeguarded, depending on possible threat and vulnerability identified on prioritized data, in place of
every loophole identified, substitute a security measure. For example easily spoofed protocols, User Datagram Protocol
(UDP) packets, old Rate Control Protocol (RCP) protocols can be substituted with more secure protocol (Wheeler & Larsen
2003)
Engineering controls: The organization should create Computer Security Incident Response Team (CSIRT) a committee that
consist of technical professionals, which focuses on computer security incidents, coordinates and accelerate information
exchange to the specific security incident (Yamaguchi 2002) Using the following technology approach to prevent, monitor
and combat cyber attack:
a. Querying: Different mechanisms can be utilized to query the network, to enable trace back of any data entering the
network, Cooperative Intrusion Traceback and Response Architecture (CITRA) is an effective tool for tracing (Sterne et
al. 2001), the observer network can also be reconfigured to detect changes. Pre-positioning of the routers to store
logs, performing input debugging, and using combined techniques can help query the server for attacks, and using the
force attacker self-identification technique can help unmask any dormant or active attack on network (Wheeler &
Larsen 2003)
b. Encryption: Deploy Virtual Private Network (VPN) to improve communication/ transmission protocols to provide enhanced security especially when communicating with unverified servers/network (Falco & Scarfone, 2008)
c. Intrusion Detection Systems (IDSs) Firewall: This is a technique used for detection and filtering of computer network,
although (Wheeler & Larsen 2003) critic IDS control measure due to its ‘false positives and false negative’ alerts, firewall is still a recommended security measure.
d. Authorization, Authentication and access control: Despite the limited change ability and lengthy deployment challenges involved in remote authentication as suggested by Sridhar & Govindarasu (2012), this is still a reliable technique for limiting and controlling access to network servers and assuring data integrity .
e. Use of external auditor (white hacker): After implementing all possible control measures, the engineering team,
should audit their network server with an external auditor, by engaging a consultants known as white hackers to hack
their severs in order to determine the solidification of the organizational network.
GSJ© 2020
www.globalscientificjournal.com
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
305
iv.
v.
Administrative control: the management team of any organization should define the ‘security policy’ and set tolerance level
for cyber attack, and being that cyber attack is inevitable, management should insure the organization against any attack
and implement the developed safety culture /policy
Personal protective measures: Training of individuals on internet security should be a regular occurrence in any organization, individuals should be mandated to comply with safety policy such as using strong passwords, protecting login credentials, requesting for authorization, identification and signature verification for any secured data, and as well sign / encrypt
secure data being exchanged
6. MODEL FOR RISK MANAGEMENT
Using the ISO 27001 Internet Security Management System (ISMS) Model of PLAN DO CHECK ACT see
Figure 2 for implementation strategy.
Implementing the ISO 27001 ISMS Model in
Cyber Attack Management
Management Review
Take corrective and
preventive actions
identified
ACT
PLAN
Define organisational security
policy
Identify possible loopholes
using number 5 Error! Reference source not found.
Analyse possible risk
Design a risk matrix
Continuous improvement
CHECK
DO
Monitor and evaluate
Review statement of applicability if feasible
Use an external auditor (white
hackers)
Documentation and record
keeping
FIGURE 2: MODEL FOR MANAGING CYBER ATTACK RISK
GSJ© 2020
www.globalscientificjournal.com
Design the defence and response
strategy
Implement objective control
measures (using the risk control
hierarchy as detailed in Number 5)
Training and awareness on cyber
security policy/ strategy
Defined roles and responsibilities
for risk owners
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
306
FIGURE 3 SHOWS RISK, STAKEHOLDERS, AND APPLICABLE TREATMENT TO THE IDENTIFIED RISKS.
Risk
Stakeholders
Treatments
Cyber attack loopholes
IT security response team
a.
b.
Identifying
Network
Security
Weakness
Identify Software Security Weakness (Sridhar & Govindarasu 2012)
See 5Error! Reference source not
found. for detailed matrix
Attacks
IT security response team
Installing and developing protective
mechanism for the organisation as detailed in number 5
Bad design and bugs in operating
system
Technology Developer
Software developed should be made to
undergo quality check, in other to detect
defects before being released.
Financial loss
Management
Management should insure the organisation against financial loss (Yamaguchi
2002)
Negligence
Management
implementation
of
security
cy/mechanism developed
Unauthorized access and identity
theft
Technology operators
Use of passwords, encryption, safeguard
login credentials and validation
Porous regulations
Government
forcement)
(Law
en-
poli-
There should be an international law
on cyber attack, defining the
illegal and legal international acts
to enable an attacked state determine
best response strategy (Ophardt 2010)
FIGURE 3: RISK MANAGEMENT TABLE
Conclusion
This paper has critically analysed the chosen WEF risk, reviewed cyber attack mechanisms, and using a case study elaborated on possibility of cyber attack triggering physical war, and went further to design and implement control strategy for the risk management.
Being that cyber attackers are constantly enhancing their technology and methodology of attack, suggests the interested stakeholders in network security to adopt continuous improvement to any control measures in place.
Since cyber attack is an emerging form of warfare which is not negotiable, and research shows that hacker’s control of Supervisory
Control and Data Acquisition (SCADA) systems, can result to physical injury and death, then collaborative effort form government,
organizations and individuals will be required if significant success story will emerge from the battle against cyber attacks
.
GSJ© 2020
www.globalscientificjournal.com
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
307
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
Atzori, L., Lera A., & Morabito, G. (2010) „The Internet of Things: A survey‟ Computer Networks 54 (2010), 2787–2805
CIO (2014) Targeted Cyber Attack Prevention with IT Security [online] available from <http://www.cio.com/article/2369978/cybercrime/targeted-cyber-attackprevention-with-it-security.html> [18th August 2014]
Data Security Council of India (2014) Cyber Attacks [online] available from <https://www.dsci.in/taxonomypage/242 > [20th August 2012]
Douligeris, C. and Mitrokotsa A. (2004) “DDoS Attacks and Defence Mechanisms: Classification and State-of-the-art” Computer Networks 44 (2004) 643–66
Fernandez, E. (2001) An overview of Internet security. Proceedings of the World’s Internet & Electronic Cities Conference (WIECC 2001), May 1-3, 2001, Kish Island, Iran.
Hansman, S. & Hunt, R. (2005) “A taxonomy of network and computer attacks”. Computer and Security
Hruska J. (2008) Russians May Not be Responsible for Cyberattacks on Georgia, ARS TECHNICA [online] Aug. 13, 2008, available on <http://arstechnica.com> ( 17
August 2014)
http://www.tripwire.com/state-of-security/featured/preventing-cyber-attacks-identifying-top-risks/
Institute for Security Technology Studies (2001) Cyber Attacks During the War on Terrorism: A Predictive Analysis [online] available from
<http://www.ists.dartmouth.edu/docs/cyber_a1.pdf> [29th August 2014]
International Organization for Standardization (2012) ISO 27001 IT security Management system standard [online] available from < http://www.iso-27001-itsecurity-management.com/what-iso27001-certification.htm > [25 August 2014]
International
Telecommunication
Union
(2012)
WCIT
Background
Brief
6
[online]
available
from
<https://www.google.com/url?q=http://www.itu.int/en/wcit-12/Documents/WCIT-backgroundbrief6.pdf&sa=U&ei=LGoAVPziFYnlaLXQgvgJ&ved=0CAoQFjAE&client=internal-uds-cse&usg=AFQjCNEVn65ENXVhRwr5X9NndNUwL2X4uw > [25 August
2014]
International Telecommunication Union (2014)
The World in 2013: ICT Facts and Figures
[online]
available from <http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2013-e.pdf> [20th August 2014]
Joynal P The Brave New World of the 5 Day War: Russia-Georgia Cyberwar, Where Cyber and Military Might Combined for War Fighting Advantage [online]
available at <www.nationalstrategies.com/pdf/publicSafety_GovSec_5DayWar_Joyal.pdf> [02 August 2014]
Kamal A. (2005) „The Law of Cyber-Space‟.
United Nations Institute for Training and Research [online ] 2005), 81.
Available from
<www.un.int/kamal/thelawofcyberspace/The%20Law%20of%20Cyber-Space.pdf> [20 August 2013]
Korns & Kastenberg (2008) Steven Adair, The Website for the President of Georgia Under Attack – Politically Motivated?, Shadowserver Foundation [online]supra
note 1, at 64-65; July 20, 2008, available from <http://www.shadowserver.org/wiki/pmwiki.php/Calendar/ 20080720> (20 August 2014).
LANGEVIN, J. (2008) „U.S. Urged to Go on Offense in Cyberwar‟. Washington Times [online] September 29, 2008.
available from
<http://www.washingtontimes.com/news/2008/sep/29/us-urged-to-go-on-offense-in-cyberwar> [26 August 2014]
Lee, S., & Clay S. (2002) “Technical, Legal, and Societal Challenges to Automated Attack Traceback.” IEEE IT Professional 4(3), 12-18.
Lin, H. (2010) „Offensive Cyber Operations and the Use of Force‟ Journal of National Security Law &Policy 4 (63)
Miller, R., & Kuehl, D. (2010) „Section 4: Protecting Our Cyber Borders Cyberspace and the "First Battle" in 21st Century War‟. US Army Combined Arm Centre
Newsletter 10-52 [online] July 2010 available from <http://usacac.army.mil/cac2/call/docs/10-52/ch_4.asp> [30 August 2014]
Ministry
Of
Foreign
Affairs
of
Georgia
(2008)
Cyber
Attacks
Disable
Georgian
Websites
[online]
available
from<http://georgiamfa.blogspot.com/2008_08_01_archive.html> (30 August 2014).
NATO Standardization Agency (2010) „NATO Glossary of Terms and Definitions (English and French)‟ Allied Administrative Publication (AAP) [online] 6 (2014: 71)
available from <http://nso.nato.int/nso/zPublic/ap/aap6/AAP-6.pdf > [29th August 2014]
Nickolov, E. (2008) Modern Trends In The Cyber Attacks Against The Critical Information Infrastructure[online] available from
<https://www.google.com/url?q=http://www.itu.int/ITU-D/cyb/events/2008/sofia/docs/nickolov-modern-trends-sofia-oct08.pdf&sa=U&ei=LGoAVPziFYnlaLXQgvgJ&ved=0CBAQFjAJ&client=internal-uds-cse&usg=AFQjCNHkDl0rlRAftPKhSkkri_Ldp-7k4A> [18 August 2014]
Ophardt, J. (2010) Cyber Warfare and The Crime of Aggression: The Need for Individual Accountability on Tomorrow‟s Battlefield‟ Duke Law & Technology [online]
Review 3 available from < http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1198&context=dltr > (29 August 2014)
Owens, A., Dam, k. and Lin (2009) Technology, Policy, Law and Ethics Regarding U.S Acquisition and Use of Cyber-Attack Capabilities. Ed. Committee on offensive
information warfare, National Research Council: National academic press: Washington
Reich P., Weinstein S., Wild, C. & Cabanlong , A., (2010) Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents - and the Dilemma of Anonymity in
European Journal of Law and Technology 1( 2) 2010
Sridhar, S. & Govindarasu, M. (2012) Cyber–Physical System Security for the Electric Power Grid „Proceedings of the IEEE‟ 100 (1), 210-224 held January 2012
Sterne, D., Djahandari K, Balupari R, Cholter W, Babson B, Wilson B, Narasimhan P, Purtell A, Schnackenberg D, Linden S. (2002) “Active Network Based DDoS
Defense.” Proceddings of the DARPA Active Networks Conference and Exposition (DANCE 02). ISSN 0-7695-1564-9/02. IEEE Computer Society.
Stouffer, K., Falco, J. and Scarfone, K. (2008) NIST SP 800-82: Guide to industrial control systems (ICS) security, National Institute of Standards and Technology, Tech.
Rep.,
The Air Force Law Review (2009) „Sovereignty in Cyberspace: Can It Exist?‟ Cyber Law Edition 64 (2009) 46-48
The
Economist
(2008)
"Marching
off
to
Cyberwar."
[online]
4
December
2008
available
from
<http://www.economist.com/science/tq/displaystory.cfm?story_id=12673385> [30 August 2014]
Tikk, E. (2008) "Cyber Attacks Against Georgia: Legal Lessons Learned," presentation at the NATO Cooperative Cyber Defence Centre of Excellence. Held August
2008
GSJ© 2020
www.globalscientificjournal.com
GSJ: Volume 8, Issue 1, January 2020
ISSN 2320-9186
308
[32] Us Department of Homeland Security (2013) Protect Myself from Cyber Attacks [online] available from <http://www.dhs.gov/how-do-i/protect-myself-cyberattacks> [15th August 2014]
[33] Weaver, N. (2001) Warhol Worms: The Potential for Very Fast Internet Plagues, University of California Berkeley
[34] World Bank Group (2014) Internet users (per 100 people) [online] available from <http://data.worldbank.org/indicator/IT.NET.USER.P2> 20th August 2012]
[35] Yamaguchi, S. (2002) Cyber Attack: Urgent Demand for Protecting our Infrastructure [online] available from <httpss://www.itu.int/itudoc/itut/workshop/security/present/s2p1.pdf> [20 August 2014]
[36]
GSJ© 2020
www.globalscientificjournal.com