CYBER SECURITY: AN ANALYSIS OF THE METHODS 2
Cyber Security
An Analysis of the Methods to Prevent a Cyber Attacks by Public Organizations
Submitted by
Pierrechrist Ekue-Hettah
GPA 8061, Hamline University
Chris Owens, Instructor
24, April 2016
Abstract
Since 2000, internet use has rapidly increased to more than 2.4 billion users worldwide, with 70% of those users using the World Wide Web every day (The Culturist, 2013).These days it simply takes minutes for news to travel around the globe. In the twenty first century, cyber security is an international topic. The threat of cyber warfare is existent and would be devastating beyond any weapon imaginable. With the entire world becoming more interconnected, a cyber-attack could: control information access, ground airplanes, hijack nuclear facilities, and perhaps most importantly, bring the global economy to a stop, creating mayhem from Wall Street to China, London, and Paris. What is different and challenging about cyber security is that it is not only relevant to just one nation like national defense or economic policy may be, but somewhat a global concern that requires a global response.
This paper will investigate the significance and threat of cyber security locally and will give recommendations on how public organizations can prevent such attacks to sensitive data. This paper will address the important steps necessary for public organizations to develop and strengthen current cyber network security to 21st
With cyber war, nations are able to skip the battlefield. Gone are the days where troops line up across from each other hoping to do damage to the other. Clarke explains that people, industries, governments, companies and organizations can be possible targets and are vulnerable to these attacks. Keeping that in mind should help these targets become defensive minded and shield off attacks before they happen. As we all know, the prevention is better than the
When considering the technological advances over the past 50 years, the Internet has undoubtedly had the greatest impact on everyday life of developed economies and its citizens. The world has become smaller, societies interconnected, and the pace of global integration dramatically increased since the introduction of the Internet. With the world connected, cyber actors represent a very real and often underestimated threat to the United States’ ability to defend national security, protect industrial innovation, and secure privacy information. As a result of globalization, the foreign cyber actors represent the most imminent threat to national security, corporate innovation, and citizen privacy rights.
Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem
As a nation, today’s society must invest in cyber security to execute military power, protect citizens information, and safeguard businesses.
Today however, a new type of warfare has emerged and occurs when outside entities conduct an attack on a power grid, network, or both with the intent of causing damage. This type of warfare is called cyber warfare. In the United States computers control everything. It is no secret that hostile countries and terrorist organizations are cognizant and they know our economy, security, and infrastructure can be crippled by a successful cyber-attack. Examples of potential targets for cyber terrorists include military bases, water systems, banking facilities, air traffic control centers and power plants. Even the Commander in Chief, President Obama has stated the threat of a cyber war is real and we must prepare for it and increase our security measures. First, this paper will discuss cyberterrorism and cyber-attacks as they pose a direct threat to national security and the economy. Then, we will review cyber-attacks against the U.S. from China, Iran, and Russia along with the impact and possible ramifications from those attacks. Finally, this paper discusses U.S. strategies to minimize the impact of cyber-attacks.
Times have changed what was known as organized crime has been replaced by Cybercrimes (Heists: Cybercrimes with Ben Hammersley). Cybercrimes have risen dramatically in recent years and have become a major issue the United States and company’s face today jeopardizing as well as threatening the critical infrastructure of America (Cyberwar Threat, 2005). Sadly, the status quo of cyber security is very unstable with the advancements and growth which has put most individuals and businesses into an enormous threat (Agustina, 2015).
The article “Defending America in Cyberspace” in the journal The National Interest authored by Keith Alexander, Emily Goldman, and Michael Warner taught me much about how the Department of Homeland Security handles America’s cyber threats. The Department of Security is the lead agency in protecting America from domestic cybersecurity incidents. It stated how America fights Cyber crime and security threats. In this day and age, countries are very vulnerable to skilled hackers. Some of them not even under the age 18.
The United States houses more than 15 critical infrastructures, all of which implement information and communication technologies (ICT) systems, making the risk of a cyberwar a constant possibility. In order to
For years, it was widely believed that the next World War would be centered on the use of nuclear weaponry. However, the development of viruses has furthered cyberwarfare, and in recent years the attention has shifted from a nuclear threat to a cyber one. Having the ability to completely, dismantle another country’s entire infrastructure without leaving your desk is clearly much simpler than using nuclear weapons. “The treat of a cyberattack is a clear and present danger to America and is more likely than a nuclear attack.” (The Hill) Even higher ranking defense officials are realizing that the focus must shift to cyberwar, instead of the traditional nuclear missiles. Additionally, the cost for cyberwarfare is significantly less than the cost of nuclear
Adam Segal’s “The Hacked World Order” reveals many prevalent issues in today’s technologically centered society. Starting at Year Zero, June 2012 to June 2013, the battle over cyberspace witnessed world-changing cyberattacks. This was accomplished due to the fact that nearly 75% of the world’s population has easy access to a mobile phone, and the Internet connects nearly 40% of the total human population, which is nearly 2.7 billion people. With that being said, cyberattacks are becoming a more realistic form of terror.
When considering the technological advances over the past 50 years, the Internet has undoubtedly had the greatest impact on everyday life of developed economies and its citizens. The world has become smaller, societies interconnected, and the pace of global integration dramatically increased since the introduction of the Internet. As people and information become increasingly integrated around the world, physical borders between nations are no longer sufficient to restrict access to information and sensitive data. This integrated world allows for malicious cyber actors to advance strategic
In government businesses and agencies today, the architecture within their networks are rapidly changing and becoming more complex with new services, applications, servers, devices and connections. With the increase of vulnerabilities that can be exploited associated with the changes in the network architecture, data protection is a high priority. The government made the decision that private companies would build and own the key communication, transportation, and energy networks. Although, the networks are owned by the private sector, there is a need for the United States to protect their people from malicious attacks which include identify attack, cyber espionage and cyber acts of war. It is the government responsibility to protect the confidentially, availability, and integrity of all the data that relates to the U.S. and its people. In order to do this, the government believes they have to partake in ensuring the private sector networks are safe from unauthorized users. In this paper, I will discuss the positives and negatives of the government regulating how private industries organize or improve their cybersecurity and how they justify it.
In this modern world, Information Technology forms the integral part of any kind of business. In the 21st century, countries across the globe have come to rely on complex computer networks that form the infrastructural backbone of even the most basic necessities of life, including electric power grids, global finance, food distribution, medical care, clean drinking water, petroleum production, and most types of communication. The protection of such networks, known as cyber security, is among the highest priorities in the civilized world, alongside planning and operations for major contingencies, including antiterrorism and land warfare. (Al-Saud, 2012:75).In Middle East region, the IT industry is dynamically growing along
The threat of cyber –attack is not only likely to target the military and government institutions but also poses a potential risk to private companies as well. The major private firms that are potentially at high risk of being attacked are the private companies that are given the functions of monitoring critical infrastructure particularly in the United States and the telecommunications sector is one of those industries that lies within the mercies of cyber criminals. Communications in any country is considered a very crucial and important infrastructure that is necessary to efficient and effective relay of information within the country, this is so because in a situation where disaster strikes, keeping communication lines open is very crucial in order to coordinate activities appropriately. This case study is based on a telecommunications company where information is derived from an interview with an Information Security Analyst.
Cybercrime has become a fast growing concern for the 21st century as businesses, institutions and individuals grow into an interconnected web of computer networks. Online business transactions, along with the sharing of personal information, are vulnerable to a host of disasters that can reap economic and social havoc. Some sources say that today, cybercrime costs more than $1.0 trillion to society--Global Industry Analysts, Inc. forecasted the world cyber security market to reach $80 billion by 2017 (Gale, 2011).