State and Non-state Actors that Pose the Greatest Cyber Threat to the United States

1669 Words4 Pages

3. IDENTIFY THE STATE AND NON-STATE ACTORS THAT POSE THE GREATEST CYBER THREAT TO THE UNITED STATES
External global threats are on the rise. Cyber-attacks against the U.S. government are notably targeted for intrusions focusing on exfiltration information some of which are attributed to the Chinese government military (Kirk, 2013). Stolen information by China may be valuable for defense and technology, U.S. policy makers in China, and military planners. (Kirk, 2013). It’s noted that Cyber warfare abilities may intercept military response operations by limiting the communication and commercial activities of an adversary. (Kirk, 2013). The DoD reports that Russia and China are playing a disruptive role within international mediums at building transparency in cyberspace, essentially because each has the technology to do so. Furthermore, both nations are pushing an Information Code of Conduct giving both governments authority over content and information over the internet, an effort that is scrutinized. (Kirk, 2013).
The private sector owns approximately 85-90% of our cyber infrastructure, there’s need for a cohesive private-government partnership to enforce security. Individuals (whether internal to the organization or agency), political groups, religious groups, and organized crime groups pose threat to the United States and considered as a cyber-threat. To assess overall threat level, one must assess intent and technological capabilities unequivocally insider threats foster great risk. Surveillance of data handling brings about questions how employees may steal data, i.e. someone can put it on a USB stick, or does e-mail contain PII information and leave the company externally? (Geer, 2013). Although pedagogical strate...

... middle of paper ...

...http://www.dhs.gov/xlibrary/assets/nipp-ssp-banking.pdf

United States. Department of Homeland Security. (2009). National Infrastructure Protection Plan. Retrieved from http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf

United States. Executive Office of the President. (1998, May 22). Presidential Decision Directives / NSC-63. Retrieved from http://www.fas.org/irp/offdocs/pdd/pdd-63.htm

United States. Sandia National Laboratories. (2012, April 24). National Supervisory Control And Data Acquisition (SCADA). Retrieved from http://energy.sandia.gov/?page_id=859

United States. Sandia National Laboratories. (2012, April 24). History of SCADA. Retrieved from http://energy.sandia.gov/?page_id=6972
Wilson, C. (2007). Information Operations, Electronic Warfare, And Cyberwar: Capabilities And Related Policy Issues. Retrieved from http://www.fas.org/sgp/crs/natsec/RL31787.pdf

More about State and Non-state Actors that Pose the Greatest Cyber Threat to the United States

Open Document