Chapter 8 Case Study Questions 1. Cyberwarfare is becoming a very serious problem. It is equivalent to a “sneak attack” that is so powerful, that in milliseconds, unknowingly, can instantly disable a country 's financial infrastructure, take down Web sites belonging to anyone from the local mom & pop business around the corner to the White House, America’s defense military structures and many others. Because of the challenges for security experts, it makes it near impossible for some of the attacks, big or small, from being detected. Furthermore, the complexity of the perpetrators warfare will make it equally difficult in in not only identifying who they are, but bringing them to justice. Attacks have become much more widespread, technically sophisticated, and even more potentially devastating by the minute. As the advancement of technology continues to progress forward at a rate of speed never going to slow down, so does the threat of cyberwarfare. Both go dangerously hand in hand. 2. People: Most attacks are the work of highly skilled professionals, educated or self-taught. …show more content…
Although the battle of how far the government can go to implement this has stuck a chord with privacy rights of an individual. There was also the creation of Cybercom, the first headquarters designed to coordinate government cybersecurity efforts. It was activated in May 2010 whose ultimate goal will be to prevent catastrophic cyberattacks against the U.S. Some insiders suggest that it might not be able to effectively organize the governmental agencies without direct access to the President, which it currently lacks. Lastly, because agencies like the CIA are prohibited by law from acting on American soil, there are proposals to entrust some of the cyberwarfare work to private defense
The Department of Homeland Security faces challenges of failure to coordinate and cooperate in the latest fight against computer crimes as well as more general intelligence-gathering operations. (...
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
The NSA helps to supply the military with weapons and supplies. The NSA also helps protect citizens by providing high tech security. Some of which are approving standards, techniques, systems, and equipment related to the security of National Security Systems (NSA.gov). In addition, the NSA also provides “end-to-end insights into malicious cyber activity, the activities of hostile foreign powers, and cyber best practices” (NSA.gov). Another thing the NSA does is partner with other departments, countries, and companies to help reach goals and provide a good outcome in any circumstance (NSA.gov). Terrorism and cyber threats are big problems towards the United States as well. When the NSA hears or reports any terrorism threats they communicate with national leaders, military, law enforcement and policymakers to discuss solutions. There always is a group of National Security Act workers monitoring surveillance twenty- four seven(NSA.gov).This always ensures extra protection and is always
The United States has endured numerous security breaches and high security threats over the past two decades. After the attacks on 9/11, the office of Intelligence became a vital source in retrieving sensitive data and tracking down potential terrorists and their networks which could pose a threat to the American people and then forwarding that vital information to the Department of Homeland Security and other government agencies. Intelligence became a key role in “assessing threats to critical American infrastructures, bio-and nuclear terrorism, pandemic diseases, threats to the borders to the nation, and radicalization within American society” (Randol, 2009, p. 7). The sharing of homeland security intelligence has become a precedence for Congress and the government. Our nation must be one step ahead of any potential terrorists that want to harm our turf. Within this text the capabilities and limitations of both domestic and foreign intelligence in supporting homeland security efforts will be explained;
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
President Obama has realized the seriousness of the upcoming threats and turned the government focus more toward defending the information and communications infrastructure and In May 2009, he issued a request from top to bottom review of the current situation. The report titled the Cyberspace Policy Review includes strategy, policy, and standards regarding the security of and operations in cyberspace. According the white house’s cybersecurity foreign policy, the Cyberspace Policy Review highlighted two objectives and ten near-term actions to support the cybersecurity strategy.
Cyber security is like trying to box while being blindfolded.. Cyber instability may cause massive panic in citizens of the United States. Government surveillance is one of the platforms of cyber security and it started to erupt after the 9/11 incident. The main ways the government watches people today is with cell phone, social media, and email surveillance. Should they be able to invade our privacy? Maybe. Many crimes are committed on computers everyday whether it be credit card hacks, stolen identities, or even social media accounts taken. Cyber attacks may lead people to distrust the cyber community and the people behind cyber protection.
In recent years, many possible plans to enact government regulation to improve cybersecurity have been suggested. Most recently, in 2017, then U.S. president Barack Obama implemented the Cybersecurity National Action Plan (CNAP). The plan would have invested $19 billion in cybersecurity by gathering experts to make recommendations in regards to cyber security, help secure the government IT group, and encourage more advanced security measures (Daniel 1). However, while CNAP does present a way to solve the problem, it just adds another program that attempts to enhance cybersecurity: “It is the multiplicity of programs and division of responsibility that diminishes their effectiveness. At least eleven federal agencies bear significant responsibility for cybersecurity” (Cohen 1). Every so often, another cybersecurity program will be established, but former plans are seldom removed. This leads to a large amount of departments to share responsibility, which creates general confusion and limits each department’s power. Furthermore, widespread government regulation may weaken cybersecurity. Many fear that any regulation would not be flexible enough and would instead allow easier hacking (Ridge 3). If every system in the entire nation had the same security measures, it would be much easier to break into as by breaking into one system, a hacker a could break into everything.
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
Many nations in the world - the United States, China, Russia, Iran, Germany, and more- use cyber warfare as a method of conducting sabotage and espionage. Nations, such as China and Russia, use espionage in order to prevent their economy and their military technology from falling behind by stealing advanced nations’ technology. Other nations, including Israel and Iran, focus on sabotaging other nations to cripple them, by sending malwares that destroy important data on the system, from advancing their technology and costing them a decent amount of money due to repairs. Another popular cyber attack used, mainly with hacktivist, government- sympathetic groups not owned by the government, and nations less advanced in technology, is Denial-of-service, or DoS. DoS is used to hinder the target’s website and other things that are maintained by computers by making it unavailable to intended users. People argue there are no benefits for cyber warfare due to its potential destructive powers and instant process of destruction. While other people-looking from a different view find that cyber warfare does have its benefits. They argue that an important benefit is that cyber warfare takes place in cyber space meaning that it does not physically harm people. They also argue that cyber warfare draws the awareness of the nation on the ever increasing dangers of cyber warfare and forces the government to set up stronger cyber security to fend off international attacks, which also help protect the government from internal hackers. It also creates more jobs for hackers, who use their knowledge to increase the security instead of harm it. Although cyber warfare produces damaging effects on a nation, in the long run, it crea...
It is asserted in an article the battlefield of cyber space: the inevitable new military branch-the cyber force by Natasha Solce. In this article she has analyzed cyberspace as future battlefield she stressed on the need of plans which include amendments in constitution, establishing a cyber-force and strictked security measures to tackle cyber terrorism. She points out different events which held only because of the mismanagement by security institutions. She investigated that 8th US Air force was designed as the most modern operational force against the cyber terrorist. She concludes that terrorist may instigate more vulnerable attacks in future if they are not dealt with priority (Solce, 2008).
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Olender, Michael. “Keeping Pace with Cyber Power, Defense, and Warfare.” Journal of International and Global Studies 6.2 (2015): 55+. Academic OneFile. Web. 5 Oct. 2015.
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer
There are different groups, from law enforcement agencies to the U.S. Secret Service, that are attempting to combat the problem through cooperation and preemptive efforts. If these groups combined with the public to protect themselves and the country from criminals that commit cybercrime, the nation’s network and technology servers would be much safer for technology users. Clearly, cybercrime is a problem because it puts internet users at risk of being taken advantage of or harmed. The advantages of technology and the internet have led more criminals to use cyberspace to commit crimes. The threat of cybercrime is increasing as globalization continues to spread across the world.