StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Attacks in the United States - Essay Example

Cite this document
Summary
The paper "Cyber Attacks in the United States" describes that cyber attacks have become a potential menace to the internal security of the United States in today’s era of globalization. Today, the USA is heavily dependent on “Information Infrastructure”…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Cyber Attacks in the United States
Read Text Preview

Extract of sample "Cyber Attacks in the United States"

The truth is “it is struggling to keep pace with the growing number of attacks on its computer networks, potentially leaving the key military and civilian systems vulnerable to overseas hackers” (Gorman, 2009). The armed forces also aired that the cyber defenses of the country are being challenged by sophisticated and well-organized efforts to steal classified information. Military men agree to US’ vulnerability to cyber attacks. Army Lt. Gen. Keith Alexander, who runs the National Security Agency said "I'd like to say that our networks are secure but that would not be correct. We have vulnerabilities." (Gorman, 2009).

Cynthia G Wagner, in her article “Countering Cyber Attacks”, reveals that the “information infrastructure” is at risk because it is so extensively networked; meaning that damage in one spot launches a chain reaction of problems everywhere. And networked computers are so integrated into every aspect of our lives that the damage would be felt almost instantaneously. Specific likely targets include the energy sector, emergency response and preparedness systems, financial services, telecommunications, and agriculture. She also highlighted the fact that the University of New Hampshire has initiated a new project “The Cyber Threat Calculator” for the U.S. Department of Defense that will surely help identify potential threats to cyberinfrastructure and assess the level of danger they pose. The Cyber Threat Calculator uses data entered for a particular organization, with values assigned to variables that measure a potential attacker's intent and technological capability. The higher the number that the calculator assigns to a possible attacker, the greater the threat. (Cynthia, 2007). Since 2008, the effort of the government has been on building a culture of preparedness. The government has focused on preparing effective strategies that could help in countering Cyber Terrorism or Cyber Attacks from hackers of nation-states such as Russia and China that have a mission to attain maximum know-how of US information infrastructure. (Anonymous, 2009)

The U.S. government has also already designated a special military unit to address the threat of cyber attacks. This unit is called Cyber Command (USCYBERCOM). This “is primarily responsible for the protection of the defense and civilian networks of the United States and can also be deployed to mount an information warfare attack on its enemies”. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber attacks Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1558723-cyber-attacks
(Cyber Attacks Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/miscellaneous/1558723-cyber-attacks.
“Cyber Attacks Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1558723-cyber-attacks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Attacks in the United States

Enhancing Cyber Situational Awareness through Active Defence

Dynamic Risk Assessment for Mission Assurance However, Cyber Situation Awareness is still considered a new field of research that made its mark with Denning's (1987, 2002) pioneering work on using expert systems to detect computer attacks in 1987, followed by a plethora of experiments thereafter.... It focused solely on data management to prevent cyber attacks.... This paper ''Enhancing cyber Situational Awareness through Active Defence'' tells that Situation Awareness Research Initiative has the primary objective of collaborating to advance research and technology in relation to cyber functionality, security, efficiency, dependability, reliability and security situations awareness....
7 Pages (1750 words) Research Proposal

Political and Legal Influences of Cyber Wars

For example, on June 1, 2012, David Sanger of the New York Times reported that the united states together with Israel had developed the Stuxnet computer worm that was used to attack Iran's uranium enrichment facilities.... Most specifically, the united states and Iran have been enemy states for quite some time due to Iran's links with terrorist activities and this may have been the most probable reason for the attack.... This led to the speculation that again it might have been the united states that propagated this virus....
6 Pages (1500 words) Research Paper

Sony Attacked y Cyber Criminals

Once such attack is the one that was experienced by Sony Corporation, a division of Sony that deals with electronics in the united states of America with headquarters in San Francisco.... Cyber crimes, which are the attacks in companies or government websites, which compromises the data in those websites for personal fulfillment of hackers or profits, have been rising day by day and they have caused huge losses to organizations that have experienced them.... In the recent past attacks have been launched to websites that belong to US, Israel and Uganda governments and in organizations like MasterCard, Visa PayPal and Sony among others....
6 Pages (1500 words) Term Paper

A factual cyber atack

s per the FBI reports, the united states military networks were penetrated by the Chinese hackers in 2004.... These attacks were supposed to be supported by the Chinese government but no particular evidence showed the fact, and Chinese government neglected the charge.... However, these attacks enabled the US troops to be ready for such attacks and to maintain networks with more stealth (Thornburgh).... yber attacks were considered as fatal, as these attacks were kept secret and were planned diligently and intelligently; sometimes, government networks were their targets....
2 Pages (500 words) Essay

Cyber Techniques and International Tensions

Even though this thought may be good, cyber threats are often not kinetic in nature as compared to other threats taking place in most countries such as the united states.... This has recently been a cause of significant tension between the united states and China with the former accusing the latter of being responsible for stealing the trade secrets of various American companies in order to use these secrets to gain economic leverage.... The tension between these two countries was further increased as a result of the united states declaring and showing the pictures of those individuals in the cyber warfare unit of the Chinese army who was responsible for the hacking....
11 Pages (2750 words) Essay

Enhancing Cyber Situational Awareness through Active Defense

They include:However, Cyber Situation Awareness is still considered a new field of research that made its mark with Denning's (1987, 2002) pioneering work on using expert systems to detect computer attacks in 1987, followed by a plethora of experiments thereafter.... It focused solely on data management to prevent cyber attacks.... The paper "Enhancing Cyber Situational Awareness through Active Defense" states that effective cyber situation awareness involves taking initiatives that integrate a number of factors such as metrics, mission assurance, dynamic risk assessment, and visualization of the general architecture....
7 Pages (1750 words) Research Paper

Political and Legal Influences of Cyber Wars

For example, on June 1, 2012, David Sanger of the New York Times reported that the united states together with Israel had developed the Stuxnet computer worm that was used to attack Iran's uranium enrichment facilities.... Most specifically, the united states and Iran have been enemy states for quite some time due to Iran's links with terrorist activities and this may have been the most probable reason for the attack.... This led to the speculation that again it might have been the united states that propagated this virus....
6 Pages (1500 words) Essay

Treatise on International Criminal Law

The researcher of the following paper states that in both civilian and military applications, the term computer network operation has been extensively used.... It states that in ancient warfare, the establishment of a blockade on access routes was to cut out the essential supplies to enemies with an aim of weakening them for an eventual defeat.... It is referred to as cyber wars or armed conflicts according to international conventions.... This paper examines three notions about international armed cyber conflicts....
13 Pages (3250 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us