Page 69 - Pure Life 23
P. 69

(
                  /
               68   International Multi. J. of PURE LIFE. 7 (23): 47-77, Summer 2020
                  One  of  the  major  forms  of     smartphones,  Personal  Digital
               attack is the “Denial of Service”     Assistants,  3G  and  4G  mobile
               (DoS),  which  is  aimed  at          communications,  and  wireless
               governments,  large  institutions,    sensor networks.
               and big businesses because their         Unlike countries, CST has no
               computers  are  equipped  with  a     international    borders,      no
               lot  of  bandwidth  and  can  be      legislations,  and  no  cooperation
               subjected    to    multi-pronged      agreements.
               attacks by many computers.               States  are  faced  with  the
                  The  protection  against  DoS      challenge  of  countering  cyber-
               attacks is not really possible.       terrorism    and    real   world
                  Social  engineering  is  an        terrorism.
               efficient form of attack, the most       A  few  nations  are  attacking
               common  one  being  ‘phishing’        other  countries,  corporations,
               aimed at bank accounts.               and organizations in CST.
                  There  are  well-established          Arash     Barfar     of    the
               rules    to     counter     social    University  of  Florida  and
               engineering    attacks,    related    Kiyana  Zolfaghar  and  her
               mainly     to    protection    of     colleague  at  the  KN  Toosi
               information.                          University  of  Technology  in
                  States and institutions should     Tehran have suggested that “the
               use technology, approved by the       first  step  that  must  be  taken  to
               International          Standards      surmount  the  barriers  of  failed
               Organization  (ISO)  for  the         cooperation and legislation is to
               protection of confidentiality and     organize  national  efforts  to  use
               authenticity,  which  is  seamless    “web  mining”  techniques  and
               and simultaneous as well as for       “honeypots”  to  wheedle  out
               the enhancement of the security       cyber-terrorists   before    they
               and privacy of all forms of cloud     attack.”
               computing.                               The  victim  states  now  have
                  The  University  of  North         not  only  to  catch  up  with  but
               Carolina in USA developed one         also  to  overtake  hegemonic
               such  technology,  the  use  of       states  that  maraud  CST,  the
               which  could  be  extended  to        features  and  limits  of  which
   64   65   66   67   68   69   70   71   72   73   74