Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The impact of cyber warfare in the united states
Cyber terrorism in the united states
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The impact of cyber warfare in the united states
The greatest threat America faces is the threat of terrorism on our national institutions. The paper
utilizes two contributive articles and one supportive article, each having varying angles of discussion
regarding vulnerabilities with respect to cyber issues. In 2013, the President of the United States
(POTUS) and multiple Secretaries of Defense public acknowledged our nation’s vulnerabilities to
attacks from our adversaries (Alexander, Goldman, & Warner, 2013). These vulnerabilities include
potential cyber-attacks against municipal and federal infrastructure, such as industrial control systems
which impact water and sewage systems as well as the military (Brenner, 2013, p.16). The United
States (U.S.) has to ensure that
…show more content…
There are threats that pose
great risk to our institutions from a federal, state and local level. Potential at-risk systems are those that
can be connected to the internet such as: energy sources, electric grids, water and sewer systems,
manufacturing, banks, transportation and communication networks (Brenner, 2013, p.15). The fall-out
from a cyber-attack in any of these areas would be harmful at every level of our nation’s institutions. By
attacking the United States’ infrastructure there would be significant economic damage levied as a result
of these criminal actions. Finding the origination of attacks (terrorist source) by utilizing our system of
layered protection is critical in keeping America safe before the terrorist action can be perpetrated.
In order to maintain order and to protect the public from the impact of such dangerous attacks,
the government has had to organize a layered system of structure and responsibilities to maintain a
watchful eye on adversarial behavior. On the domestic front, the Department of Homeland
…show more content…
al., 2013, p.21).
Prosecution efforts are led by the Department of Justice (DOJ). The nation is defended against
cyber-attacks by the Department of Defense (DOD). The NSA is the driving force behind the nation’s
oversight of cyber activity through the USCYBERCOM, based in Fort Meade, Maryland. The NSA is
responsible for the oversight of the nation’s cyber-defense activity, but the NSA is not the sole entity for
strategic responsibility. Coordination across all entities (DHS, DOJ, DOD, and NSA) is required in
order to meet the nation’s strategic initiatives (Alexander, et. al., 2013, p.22). On the world stage, the
U.S. government must work with other governments to enforce criminal cyber activity by disrupting
criminal business models and creating international deterrence (Filshtinskiy, 2013, p.28). The U.S. must
lead the effort with our vast resources to ensure our allies are adequate protected against cyber threats.
THE GREAT THREAT OF CYBER-ATTACKS IN AMERICA 4
Based on the information provided in the articles, the U.S. faces a collective threat is
Jeffrey David Simon, The Terrorist Trap: America's Experience with Terrorism, 2nd ed. (Bloomington, IN: Indiana University Press, 2001), 188-89.
... of the government to meet an evolving terror threat actually ends up masking the far more important government responsibility for overall national preparedness, not just guarding against terrorism. The billions of dollars and staggering amount of effort spent on crafting the mushrooming homeland defense/homeland security enterprise certainly helped plug some existing holes, but the rampant inefficiency continues to be a point of contention today. The overly broad notions of counter-terrorism and homeland defense means “any expense can be justified” as proven by the decade long rise in DHS budgets and numerous instances of wasteful spending. The headfirst plunge into the world of homeland security was a uniquely American undertaking. No other nation possessed the fiscal means to enact such drastic measures on so many levels, and in such a short amount of time.
and their use. In Committee on Deterring Cyber attacks: Informing Strategies and Developing Options (Ed.), Proceedings of a Workshop on Deterring Cyber attacks: Informing Strategies and Developing Options for U.S. Policy. Washington, D.C.: National Academies Press.
With the introduction of the internet being a relatively new phenomenon, the act of cyber espionage is not something that has been properly acknowledged by society. The American Government has done a stand up job of keeping its methods in the shadows and away from the eyes of its people since its documented domestic surveillance began on October 4th, 2001; Twenty three days after the Twin Towers fell President George Bush signed an order to begin a secret domestic eavesdropping operation, an operation which was so sensitive that even many of the country's senior national security officials with the...
The NSA helps to supply the military with weapons and supplies. The NSA also helps protect citizens by providing high tech security. Some of which are approving standards, techniques, systems, and equipment related to the security of National Security Systems (NSA.gov). In addition, the NSA also provides “end-to-end insights into malicious cyber activity, the activities of hostile foreign powers, and cyber best practices” (NSA.gov). Another thing the NSA does is partner with other departments, countries, and companies to help reach goals and provide a good outcome in any circumstance (NSA.gov). Terrorism and cyber threats are big problems towards the United States as well. When the NSA hears or reports any terrorism threats they communicate with national leaders, military, law enforcement and policymakers to discuss solutions. There always is a group of National Security Act workers monitoring surveillance twenty- four seven(NSA.gov).This always ensures extra protection and is always
Terrorism represents a continuing threat to the United States. It is the most significant threat to our national security. Terrorist attacks have definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism.
Americans have considered terrorism as a horror that occurs in other countries and not as a real threat to America itself. As the recent terrorist attacks on our nation shows, this opinion was gravely incorrect. There are several policies in both the private sector and our government, which contributed to our vulnerability to terrorism.
...the nation’s critical infrastructure. With the creation of the DHS the government has shown that they are investing money and resources into protecting our nation’s infrastructure.
It is unrealistic to imagine that the copious amount of departments responsible for cybersecurity are able to adequately protect the country; therefore, the government needs to form one department that can be responsible for all cybersecurity problems and cyberattacks. When forming this new department, resources from other groups that currently share responsibility can be moved in order to decrease the amount of resources needed for the new group. But, it is also unfathomable for the government to be responsible for all cybersecurity as “... the reality is that while the lion’s share of the cybersecurity expertise lies in the federal government, more than 90 percent of the physical infrastructure of the Web is owned by private industry” (McConnell 4). Therefore the government must collaborate with the private sector. This cooperation can be utilized to help form the new government group as “there is also an opportunity for the new agency to be formed in a more deliberate way, drawing on leadership from the private economy to promote efficiency and cost-effectiveness” (Cohen 2). By working with the private sector, the new agency can reduce costs of personnel and equipment, increase performance, and maintain diverse cybersecurity plans. Once a
Cybersecurity is a government institution implemented by Homeland Security. According to the website for Homeland Security, cybersecurity is operated by a team of skilled professionals who will recognize cyber vulnerability and respond as quickly as possible. The security was mainly built for United States defense reasons, but lately has also dealt with issues within the country. Of course its main purpose is to protect the United States and it will continue to do that. It just recently has taken steps to advance to national security as well as personal security. In 2010 the cybersecurity act that was passed was intended to integrate the private and public sector of cybersecurity for optimal use. Hacking int...
Paisley. "The Impact of a Cyber War." Defense Tech RSS. N.p., 16 Jan. 2008. Web. 21 Nov. 2013. (Source H)
...tecting America from a cyber attack should be our nation’s highest priority. It is true that poverty, illegal immigration, and a poor economy are problems in America. There are other problems also that have people concerned. Computer power is important to America, however, because it controls our country’s operations on a massive scale. If it is jeopardized, not only could it be impossible to communicate or travel, our food and water supplies may be unfit to eat and drink. If that is not bad enough, if our defense computer systems are compromised then our country is at risk immediately of attack from any country, anywhere in the world, including within our own. It is important to protect our country from obvious problems, but we need computer experts working around the clock to make sure our computer systems notice immediately if our infrastructures are attacked.
The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy. While protecting our infrastructure, personal privacy, and civil liberties, we have to keep in mind the private sector owns and operates the majority of our critical and digital infrastructure.
Thomas, Teka. "Cyber defense: Who 's in charge?" National Defense July 2015: 21+. War and Terrorism Collection. Web. 28 Oct.
The threats to security from the United States Department of Defense, the national power grid and the Chamber of Commerce are very real and omnipresent. The Defense Department made an admission of the first major cyber attack upon its systems in August 2010. It was revealed that the attack actually took place in 2008 and was accomplished by placing a malicious code into the flash drive of a U.S. military laptop. “The code spread undetected on both classified and unclassified systems, establishing what amounted to a digital breachhead.” (2) This quote, attributed to then Deputy Defense Secretary William J. Lynn III, is just part of the shocking revelations that were disclosed in his speech made on July 14, 2011.