Iranian Cyber-Attacks

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
  1. Iranian Cyber-Attacks

    QUESTION

    An essay about Iranian Cyber-Attacks

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Essay Writing Pages 4 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

Title: Iranian Cyber-Attacks

Thesis: Iranian cyber-attacks were in reaction to America’s imposed economic sanctions to oppose Iran’s nuclear program, retaliation to punish and dishonor ideological adversaries, and defeat regional enemies in the Middle East.

  1. Introduction
  2. This paper examines the strategic goals of Iran’s cyber-attacks as discussed in the article.
  3. In 2012 and 2014, Iran executed DDOS attacks against American banks and the 2012 Shamoon attack against Saudi Arabia’s oil company Aramco.
  4. The campaign called Operation Ababil barred access to several major financial institutions' websites by crushing their servers with web traffic.
  5. Body
  6. Operation Ababil was an escape strategy to global sanctions, and a means to modernize the Iranian economy.

Evidence

  • The grappling Iranian economy because of sanction of both Americans and the UN and its allies
  • Iran is seeking an economic alliance with China
  • Iran has been keen to seek intellectual property theft through cyber operations to improve its competitive advantages concentrating on defense and IT.
  1. The cyberattacks were a means to punish and dishonor ideological enemies, mostly Saudi Arabia and America.

Evidence:

  • The Shamoon malware directed against Saudi and Qatari oil and gas firms in 2012
  • DDOS attacks against American banks in 2012
  • Iran’s action to damage business and industrial institutions demonstrates an indifference to global norms.
  1. The cyber-attacks were a means to overpower Iran's enemies in the Middle East.

Evidence:

  • Cyber-attacks are one of the means Iranians are leveraging their dominance in the region.
  • Seeking to make itself the region's great power, Iran has frequently nettled against Israel and countries allied to America like Saudi, UAE, and Bahrain.
  • The Iranian leadership has constantly sought to weaken and challenge those countries in the region that it perceives as direct enemies.

 

  • Conclusion
  1. This paper has demonstrated Iran's interests in pursuing cyber operations as a retaliatory attack against American sanctions, becoming a powerhouse in the Middle East, and dishonoring and punishing ideological enemies.
  2. Americans need to comprehend Iran’s better comprehension of Iran's history and strategic justification for cyber-attacks as a means for America to develop broader cyber-warfare bearing against enemies and judicious American reaction to future cyber threats from Iran and elsewhere.

References

Bouveret, A. (2018). Cyber risk for the financial sector: A framework for quantitative assessment. International Monetary Fund.

Egloff, F. (2017). Cybersecurity and the Age of Privateering. Perkovich/Levite (Hg.): Understanding cyber conflict. Fourteen analogies. Washington, DC, 231-247.

Healey, J., Mosser, P., Rosen, K., & Tache, A. (2018). The Future of Financial Stability and Cyber Risk. The Brookings Institution Cybersecurity Project, October.

Issues Arising from Sustained Iranian Cyber-attacks Campaigns U.S and Global Financial Targets

Kramer, F. D., and Butler, R. J. (2019).Cybersecurity: Changing the Mode. Atlantic Council.

 

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]