[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
-
Iranian Cyber-Attacks
QUESTION
An essay about Iranian Cyber-Attacks
[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]
| Subject |
Essay Writing |
Pages |
4 |
Style |
APA |
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]
Answer
Title: Iranian Cyber-Attacks
Thesis: Iranian cyber-attacks were in reaction to America’s imposed economic sanctions to oppose Iran’s nuclear program, retaliation to punish and dishonor ideological adversaries, and defeat regional enemies in the Middle East.
- Introduction
- This paper examines the strategic goals of Iran’s cyber-attacks as discussed in the article.
- In 2012 and 2014, Iran executed DDOS attacks against American banks and the 2012 Shamoon attack against Saudi Arabia’s oil company Aramco.
- The campaign called Operation Ababil barred access to several major financial institutions' websites by crushing their servers with web traffic.
- Body
- Operation Ababil was an escape strategy to global sanctions, and a means to modernize the Iranian economy.
Evidence
- The grappling Iranian economy because of sanction of both Americans and the UN and its allies
- Iran is seeking an economic alliance with China
- Iran has been keen to seek intellectual property theft through cyber operations to improve its competitive advantages concentrating on defense and IT.
- The cyberattacks were a means to punish and dishonor ideological enemies, mostly Saudi Arabia and America.
Evidence:
- The Shamoon malware directed against Saudi and Qatari oil and gas firms in 2012
- DDOS attacks against American banks in 2012
- Iran’s action to damage business and industrial institutions demonstrates an indifference to global norms.
- The cyber-attacks were a means to overpower Iran's enemies in the Middle East.
Evidence:
- Cyber-attacks are one of the means Iranians are leveraging their dominance in the region.
- Seeking to make itself the region's great power, Iran has frequently nettled against Israel and countries allied to America like Saudi, UAE, and Bahrain.
- The Iranian leadership has constantly sought to weaken and challenge those countries in the region that it perceives as direct enemies.
- This paper has demonstrated Iran's interests in pursuing cyber operations as a retaliatory attack against American sanctions, becoming a powerhouse in the Middle East, and dishonoring and punishing ideological enemies.
- Americans need to comprehend Iran’s better comprehension of Iran's history and strategic justification for cyber-attacks as a means for America to develop broader cyber-warfare bearing against enemies and judicious American reaction to future cyber threats from Iran and elsewhere.
References
|
|
Bouveret, A. (2018). Cyber risk for the financial sector: A framework for quantitative assessment. International Monetary Fund.
Egloff, F. (2017). Cybersecurity and the Age of Privateering. Perkovich/Levite (Hg.): Understanding cyber conflict. Fourteen analogies. Washington, DC, 231-247.
Healey, J., Mosser, P., Rosen, K., & Tache, A. (2018). The Future of Financial Stability and Cyber Risk. The Brookings Institution Cybersecurity Project, October.
Issues Arising from Sustained Iranian Cyber-attacks Campaigns U.S and Global Financial Targets
Kramer, F. D., and Butler, R. J. (2019).Cybersecurity: Changing the Mode. Atlantic Council.
|
|
|
|
|
|
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]
Related Samples
[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]