|
||||||||||||||
Cyberattacks: Prepare Your Enterprise Now |
||||
|
A significant increase in cyberattacks is likely to follow the events of 11 September 2001. Enterprises must understand this threat and take action to limit their vulnerabilities. |
|||
|
Bottom Line
|
|||
|
|
|||
|
Key Issue
How will enterprises arm themselves to address increasing information security risk? |
|||
Tactical Guidelines
|
|||
|
Experience shows that disasters are usually followed by an increase in criminal activities, including looting, fraud, acts of revenge and subsequent incidents; the aftermath of the 11 September terrorist attacks is unlikely to be an exception. As enterprises work to respond to these devastating events, they must prepare for a global increase in "cyberattacks" that will threaten their online systems. Tactical Guidelines Enterprises should immediately take the following security measures to counter the increased threat of cyberattack:
What Enterprises Can Expect Gartner analysts and other observers have already noted a number of early indicators that an increase in a wide range of cyberattacks is to be expected. On 14 September 2001, the National Infrastructure Protection Center issued an advisory calling for increased awareness in anticipation of a rise in "cybercrime" incidents. A number of so-called hactivists, ostensibly sympathetic to the United States, are calling for "revenge" cyberattacks, which are likely to target inappropriate sites and could potentially interfere with the official response to the terrorist attacks. (Real-world criminal activities, such as looting in the area of the World Trade Center, bomb threats and fraudulent charities nationwide, have also been reported.) Specific types of potentially damaging "cyberactivities" have different sources and different targets, and carry different levels of risk for enterprises. These types of activities include: Hactivism One of the more-unfortunate responses to the events of 11 September 2001 has been hacking in the name of patriotism. Hactivists are generally online troublemakers using tragedy to justify illegal activities. Although some hactivists may believe they are furthering U.S. interests, their activities are more likely to have the opposite effect. Systems unrelated to the terrorist attacks or perpetrators will likely be compromised and used as staging points for cracking, distributed denials of service or other types of attack. These attacks will, however, probably be initiated by individuals and groups without the resources to cause loss of life or property. The majority of cyberattacks in response to recent events will be launched by hactivists; they will little effect and can be easily managed. Cybercrime Cybercrime i.e., online criminal activity undertaken for financial gain is also expected to rise as criminals attempt to take advantage of perceived uncertainties in financial systems. Fraudulent online solicitations for nonexistent charities also appeared within 24 hours of the terrorist attacks (see "Beware Disaster-Related E-Mail Fraud," FT-14-5178). No new types of cybercrime are expected to emerge from the 11 September 2001 events, but an increase in criminal activity is likely. "Cyberterrorism" We expect cyberterrorism i.e., computer-based crime intended to cause loss of life or property in pursuit of political goals will increase in the near future. These activities, which may come in response to U.S. reprisals for the recent terrorist attacks, will likely target U.S. government facilities, as well as infrastructure centers and nongovernmental organizations such as relief agencies. Enterprises, particularly financial institutions, public utilities, telecommunications companies, online trading firms and e-commerce sites, are also likely to be targeted. Some cyberterrorists will have the benefit of extensive resources and will be highly technically proficient. The goal will be to cause direct financial and personal loss, and to disrupt communication and services. Overall, very few attacks will constitute true cyberterrorism; these few attacks will, however, have the potential to cause significant damage. Bottom LineEnterprises should not panic about the anticipated increase in cyberattacks. They should, however, evaluate their security postures and implement standard security procedures. |
|||
|
This research is part of a set of related research pieces. See AV-14-5238 for an overview. |
|||
|
Entire contents © 2001 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
Resource ID: 341001 |
||