123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Isu Internet Security Researchers Combat Cyber-attacks

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The surge in cyber-attacks over the last year, use of cyber weapon such as Stuxnet on industrial installations and leakage of classified documents by WikiLeaks has made it inevitable for Internet security researchers to find new ways to deal with the challenges in the cyberspace. With the emergence of alleged state-sponsored cyber-attacks on rival countries has brought information warfare to the center stage. Information security has become a challenge for Governments worldwide. Countries have started revamping their IT security infrastructure to deal with threats of cybercrime, cyber espionage and cyber-attacks. Security researchers at Iowa State University are developing cyber-attacks to devise resistance and counter-offensive mechanisms. The research is being conducted by a group of electrical and computer engineering students of the University.

The researchers have created a test bed for Supervisory Control and Data Acquisition (SCADA) systems, which are used to monitor and control industrial installations. Through the test researchers endeavor to simulate a real-time cyber-attack scenario. The test may help the ...
... researchers in assessing and analyzing the risks involved and devising protection mechanisms to safeguard critical national installations. The research has been partly sponsored by National Science foundation.

Information security professionals have been alerting the governments on the likely implication of a cyber-attack on crucial government, utility and military installations. Attackers may not only intrude into networks and gain access to privileged information but may also cause of denial-of-service attacks to disrupt operations. Advancements in technology have facilitated automation of operations at crucial installations such as power stations. However, automation has also made them vulnerable to cyber-attacks. A cyber-attack on a power grid may completely disrupt power supply creating chaos among people. An attack on telecommunications infrastructure may lead to complete breakdown of communications and severely impact business operations. Realizing the dangers of cyber warfare, many countries are establishing cyber commands to safeguard crucial industrial and infrastructural facilities.

The researchers are studying the implications of distributed denial-of-service attacks and intrusion attempts by hackers to corrupt or delete data. Little has been done to protect critical installations of private business organizations. Business organizations must regularly assess the threats by conducting security audits, ethical hacking and devise mechanisms to protect their systems and networks against all forms of cyber-attacks.

Total Views: 345Word Count: 372See All articles From Author

Add Comment

Computers Articles

1. Martindale Law Firm Competitive Analysis Data For Legal Industry
Author: Den Rediant

2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates

3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors

4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen

5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns

6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs

7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant

8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant

9. Answering_services
Author: brainbell10

10. Api_security
Author: brainbell10

11. Appium
Author: brainbell10

12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant

13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant

14. Adobe_xd
Author: brainbell

15. Amazon Sagemaker Services
Author: brainbell10

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: