Free

Cyber attacks - Essay Example

Comments (0) Cite this document
Summary
Dreazen and Siobhan Gorman reveals that the US cyber infrastructure is vulnerable to attacks. The truth is “it is struggling to keep pace with the growing number of attacks on its computer networks, potentially leaving key military and civilian…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Cyber attacks
Read TextPreview

Extract of sample "Cyber attacks"

Cyber Attacks Cyber attacks have become a potential menace to internal security of United s in today’s era of globalization. Today, USA is heavily dependent on “Information Infrastructure”,
this includes information systems, networks, and communication systems. Since information
infrastructure is increasingly critical to daily affairs, it has become a growing target for
disruption and destruction by terrorsist movements and adversaries of USA. Various literatures
have documented the issue of security threat through cyber attacks.
An article written by Yochi J. Dreazen and Siobhan Gorman reveals that the US cyber infrastructure is vulnerable to attacks. The truth is “it is struggling to keep pace with the growing number of attacks on its computer networks, potentially leaving key military and civilian systems vulnerable to overseas hackers” (Gorman, 2009). The armed forces also aired that the cyber defenses of the country are being challenged by sophisticated and well-organized efforts to steal classified information. Military men agree to US’ vulnerability to cyber attacks. Army Lt. Gen. Keith Alexander, who runs the National Security Agency said "Id like to say that our networks are secure but that would not be correct. We have vulnerabilities." (Gorman, 2009).
Cynthia G Wagner, in her article “Countering Cyber Attacks”, reveals that the
“information infrastructure” is at risk because it is so extensively networked; meaning that
damage in one spot launches a chain reaction of problems everywhere. And networked
computers are so integrated into every aspectof our lives that the damage would be felt almost
instantaneously.Specific likely targets include the energy sector, emergency response and
preparedness systems, financial services,telecommunications, and agriculture. She also
highlighted the fact that University of New Hampshire has initiated a new project of “The Cyber
Threat Calculator” for the U.S. Departmentof Defense that will surely help identify potential
threats to cyber infrastructure and assess the level of danger they pose. The Cyber Threat
Calculator uses data entered for a particular organization, with values assigned to variables that
measure a potential attacker s intent and technological capability. The higher the number that the
calculator assigns to a possible attacker, the greater the threat. (Cynthia, 2007)
Since 2008, the effort of the government has been on building a culture of preparedness.
Government has focused on preparing effective strategies that could help in countering Cyber
Terrorism or Cyber Attacks from hackers of nation-states such as Russia and China that have a
mission to attain maximum know-how of US information infrastructure. (Anonymous, 2009)
The U.S government has also already designated a special military unit to address the threat of cyber attack. This unit is called Cyber Command (USCYBERCOM). This “is primarily responsible for the protection of the defense and civilian networks of the United States and can also be deployed to mount an information warfare attack on its enemies” (Trends Updates).
Works cited
Bellavita, C. (2009). Changing Homeland Security: The Year in Review — 2008. Homeland Security Affairs , 5.
France-Presse, A. (2009, October 19). U.S. Gen. Urges More Effort Against Cyber Attacks. Defense News .
Gorman, Y. J. (2009, May 6). U.S. Cyber Infrastructure Vulnerable to Attacks. The Wall Street Journal .
Griggs, B. (2008, August 18). U.S. at risk of cyberattacks, experts say. Retrieved October 22, 2009, from http://www.cnn.com/2008/TECH/08/18/cyber.warfare/index.html
Trends Updates. (n.d.). RAND Suggests U.S To Stick To Cyber Attacks Defense. Retrieved October 22, 2009, from http://trendsupdates.com: http://trendsupdates.com/rand-suggests-u-s-to-stick-to-cyber-attacks-defense/
Lynne Rudasill, & Jessica Moyer. (2004). Cyber-security, cyber-attack, and the development of governmental response: the librarians view. New Library World, 105(7/8), 248-255.
Cynthia G Wagner.  (2007). Countering Cyber Attacks. The Futurist, 41(3), 16.
Anonymous. Cyber Attacks on U.S. Government Rise. (2009). Information Management Journal, 43(4), 7.  Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber attacks Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1558723-cyber-attacks
(Cyber Attacks Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/miscellaneous/1558723-cyber-attacks.
“Cyber Attacks Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1558723-cyber-attacks.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber attacks

CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING SOCIAL ENGINEERING FOR CYBER ATTACKS

...? Can Alertness of Employees Save Organisations from Hackers Using Social Engineering for Cyber Attacks? By of 4930 Words [Date] Introduction People often wonder how hackers use social engineering to compromise or disable their targets by way of cyber-attacks. Among the main social engineering techniques identified by anti-virus providers such as McAfee and Avira as the methods for disabling target networks include 'spear phishing' emails, which are customized to appear as if from trustworthy sources (Kiountouzis & Kokolakis, 2011). In their actions, hackers in the contemporary society use the most sophisticated of malware to attack information systems...
24 Pages(6000 words)Essay

Cases of cyber attacks

...? Cases of Cyber Attacks Cases of Cyber Attacks The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another. Instead of bullets and guns, critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power. In this paper, a comparison of three cases of cyber terrorism would be discussed to enable people understand the nature, power and threat caused by cyber attacks. Likewise, the governments’ initiatives to response to similar threats in the future are also...
4 Pages(1000 words)Case Study

Cyber Attacks and Security

...?Cyber Attacks In the current age of advanced technology and the advance of the Internet, security issues have continued to emerge to organizations. Terrorism has evolved from the conventional form to include terrorism that is perpetuated over the Internet. One example of this nuisance is the use of cyber-attacks, which refers to the intentional compromise of a computer system through the Internet or the intentional tracking of a user on the net (Lewis, 2011). This means that cyber-attack has two broad definitions, the first definition being the unauthorized gathering of information about a user. This type of cyber...
4 Pages(1000 words)Research Paper

Cyber -Attacks on America

...? Cyber Attacks on America Introduction The 11 September terrorist attack on the US exposed the vulnerability of the country to foreign attack in a way not witnessed in a long time. Since then, the public, media and even the federal government have been on alert to avert any future attacks by undertaking appropriate precautionary measures. In addition to these physical attacks, the US now faces another form of attack, cyber-attacks, against computer networks that crucially serve the economy and security of the nation. Attackers target organizations across the various sectors of the economy including both private and government institutions (Sanger & Perlroth, 2013). These include voice communication systems, financial institutions... and...
10 Pages(2500 words)Essay

Cyber Attacks on Financial and Energy Sector

...Cyber Attacks on Financial and Energy Sector Introduction No organization in today’s world is immune to cyber attacks, whether they are government, non-government or business. It is not affordable to risk the security and stability of an organization’s financial and operating systems, or its intellectual property, by being unaware or by a lack of initiative. Safeguarding computer systems, preserving confidential data, and making that data available when needed are vital to modern day economy. Information security is all about this. However, the more our systems are getting dependent on technology, the more they are vulnerable to cyber...
3 Pages(750 words)Thesis

CYBER ATTACKS ON ENERGY AND FINANCIAL SECTOR

...US Financial and Energy Sector are vulnerable say a group of former US officials indicating the weaknesses of the system due to lack of proper legislations and inability of US to handle such cyber attacks in appropriate manner1. This lack of preparedness and vulnerability of the communication networks therefore can create significant security risks. One such aspect of security risk is the cyber attacks on the energy and financial sector of the United States as both these sectors play very crucial role in the development and sustainability of the economic performance. US Financial sector is largest in the world and billions of dollars are transacted through this system not...
2 Pages(500 words)Thesis Proposal

Cyber attacks

...Technology has been evolved with new research and reinventions facilitating the critical infrastructure computerized. On the other side, vulnerabilities also emerged causing disruption to the critical infrastructure impacting in several ways. Although there are many vulnerabilities, cyber attacks are the most prominent one. Cyber attacks approach the target in a non traditional way. Due to inequity in the military strengths, hackers attack this critical infrastructure affecting both the economy as well as the military sector of the country (SANS: Critical infrastructure protection). It could be operated by the government or the private sector, both...
10 Pages(2500 words)Research Paper

What Approaches Can be Made to Conducting Cyber Intelligence and Restricting Cyber Attacks on Organizations

...What approaches can be made to conducting cyber intelligence and restricting cyber attacks on organizations? It is a worldwide fact that cyber attacks are being seen as very dangerous as they have affected the societies in a very bad way. They have played their negative role at bringing down government hierarchies and thus the business corporations have also been severely hurt. The cyber attacks are being seen as very risky considering there is a lot at stake within the business concerns. The top managements within these organizations are considering how to solve the problem of cyber...
12 Pages(3000 words)Essay

Cyber Attacks

...of technology, terrorism continues to pose a threat to the global citizenry. Laws have identified cyber-attacks in perpetration of high-tech crimes, which include terrorism. Cyber-attacks fall under three categories namely, unauthorized intrusion, destructive worms as well as viruses, and denial of service related threats. Unauthorized intrusion entails use of illegal means to access through hacking or cracking of another person’s computer (Wible, 2003). Destructive worms and viruses distribute across various sharing platforms upon which they disrupt the integrity of the computer system by destruction and impairment. Denial of service entails use of deliberate...
12 Pages(3000 words)Term Paper

Cyber Attacks and Politics from a technological and security perspectives

...Cyber Attacks and Politics Cyber Attacks and Politics Introduction Cyber attack refers to an act of exploitation that is deliberately done by a person to either the computer systems or to the networks of those enterprises that solely depend on the technology use. Those responsible for the Cyber attacks acts uses codes that are maliciously generated to alter the computer code, the logic or even the data contained therein. Such acts results into destruction of the normal operations of the computer systems or the company networks. Eventually, this leads to the data being compromised or even the cybercrimes...
4 Pages(1000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cyber attacks for FREE!

Contact Us