Cyber Security Departments Essay

2823 words - 11 pages

As the use of technology has increased drastically over the last two decades, so has our need for technology. Technology has become a part about our everyday life and we can find technology being used nearly everywhere. Most systems in today’s countries and societies rely on technological infrastructure; these systems include transport systems, factory systems, power plant systems and water sanitation systems. This brings on the question of to what extent have governments developed their cyber security departments, what evidence is there of governmental involvement in malware attacks and why should governments be concerned about cyber security. Since these systems rely heavily on technology, governments have to consider them as high-risk targets not only for physical attacks, but also for computer malware attacks. Due to the fact that the risk exists governments have to focus not only on defending their borders, but they need to focus on defending their technological systems.
Early Malware
The growth of technology and the ability technology has to perform automated tasks more efficiently than humans. With the growth of technology society has become increasingly dependent on it and society would not function without technology. Most companies that are critical to society use technology, for example banks rely on mainframes to be able to handle several transaction at once , Power companies use PLC’s (Programmable Logic Controller) to manage electricity flow , etc. The use of technology in these systems brings on the question that What if these systems were attacked. The fact is that if these systems were compromised the whole society would be deemed as nonfunctional. Governments received a wakeup call when the Slammer virus managed to make a large amount of critical systems fail. The slammer virus was a worm that was designed to spread as fast as possible on Microsoft Server 2000 systems . The slammer virus managed to disable the emergency call system, the air traffic control system at some airports in the USA and the bank of America’s ATM network among other things.
Cyber treats of the 21st century
Computer Viruses are increasingly becoming more common, currently 148,000 computers are infected every day and the World Economic Forum predicts that there is a 10% chance for critical infrastructure being damaged in the next 5 years . As mentioned earlier most of the critical infrastructure like power plants and water treatment facilities rely on computer systems, but more specifically PLC’s (Programmable Logic Controllers) 2 and SCADA (Supervisory Control and Data Acquisitions System) . These control systems have a major drawback, which is that they are susceptible to attacks by hackers if they are not configured in the correct way. There have been several examples of systems being compromised. The ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) responded to 198 cyber incidents reported by power plants, water treatment plants...

Find Another Essay On Cyber Security Departments

Dof VA Essay

953 words - 4 pages information in the VA Handbook 6500 follows DHS procedures. The proposal grants DHS formal oversight of cyber security operations within civilian federal agencies, but DHS has done this already. Formal incident reporting requires VA to report security incidents to the United States-Computer Emergency Readiness Team (US-CERT) within a specified time frame. DHS and VA are US Departments and each follows the wishes of our Commander-in-Chief, the

Cyberspace: The Asymmetric Battlefield of the Future

2164 words - 9 pages . Whether the goal is monetary, proprietary information, or simple disruption of public and private networks, cyber-attacks have created an extremely complex and critical challenge for U.S. national security (International Security, 2011). Not all cyber threats originate from outside threats. The insider threat is a very real and dangerous possibility. Foreign governments, terror organizations, criminal networks, or simply personal initiative can

Department of Defense Strategy for Operating in Cyberspace

2042 words - 8 pages have created an extremely complex and critical challenge for U.S. national security (International Security, 2011). Not all cyber threats originate from outside threats. The insider threat is a very real and dangerous possibility. Foreign governments, terror organizations, criminal networks, or simply personal initiative can motivate authorized users to exploit their access to secured networks. The action of insiders, regardless if they are

Cyber Security: A Necessity Nowadays

1557 words - 7 pages computerized. All the transactions and important information are in computers. Cyber Security is now one of the biggest necessities of the world, because our lives resolve around computers, the cyber-attacks are dramatically increasing in number every day, and the cyber attackers are becoming more expert. We are addicted to technology. Americans ages 18-64 who use social networks say they spend an average of 3.2 hours per day doing so(Vacca, 10)The

Cyber Security

2115 words - 9 pages President Obama has declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cybersecurity.” Cyber security is more important than ever; more people are using remote access instead of travelling to the office. Hard drives both mechanical and solid state are being replaced by “cloud computing/storage. A

Internet and Public Management

1000 words - 4 pages one of them. Public Management is defined as using management techniques from the private sector and implementing those techniques in the public sector in order to improve the functionality of the public sector and deliver better governance (Bower & Christenson, 1978). With the rapid increase of popularity of the internet, governments were forced to take advantage of it, correct the social issues that emerged and tighten security measures to combat


1665 words - 7 pages States. This new technology is being called Cyber Terrorism, and is used by a variety of people. Many radical Rebel groups, and other terrorist groups are using the World Wide Web to preach propaganda, and some U.S. officials believe they are also sending encrypted e-mails detailing when there next attack will be. The Columbian Rebel Group ELN is one of the many terrorist groups known to have a web page on the Internet. The ELN is known mainly

Digital Crime and Terrorism Case Study

1506 words - 6 pages related to digital crime and how law enforcement agencies can come with strategies to combat these crimes. Forecast 1: The need for allocating law enforcement agencies more resources to combat cyber crimes The forecast highlights the need for a shift in law enforcement and justice agencies across all jurisdictions to make officers who serve under such departments well equipped to eliminate digital crimes. One of the key areas under such a

Social Control of Cyber Space

2352 words - 9 pages Delaware faced its first experience of cyber crime with nearly 2,000 students' and professors' passwords were compromised and had to be changed. This matter was reported to C.E.R.T. security specialists and it was later discovered these attacks were part of a larger pool of experienced online vandals, which involved other computers around the country terrorizing databases and fragile unsecured networked computer systems. Now, not only the schools

White Paper

1019 words - 5 pages -winning Government Contractor with 12 contract vehicles providing a wide-range of support to Civilian and Defense agencies. Our services include Development, Integration, Operations & Maintenance, Cyber Security, Geographic Information Systems (GIS), Technical Consulting and Business Operations Support. We bring customers a strong experience base with depth and breadth gained from over 45 current government contracts. With our customer-centric

Computer Crime Final

1847 words - 8 pages learn about the cyber criminal’s knowledge of network and security in order to help us improve our own security or programs. This would help decrease the amount of crime happening and the frequently to let to the people know that their things are safe and they don’t need to worry (McCourt). Also, with making more jobs for active partnerships with ISP this could really help for the solution to become successful the more people know about the

Similar Essays

Cyber Security Essay

1953 words - 8 pages operational elements involved in cybersecurity and communications reliance are coordinated and integrated. United States Computer Emergency Readiness Team Us-Cert US-CERT operates the National Cybersecurity Protection System (NCPS), which provides intrusion detection and prevention capabilities to covered federal departments and agencies. The diagram below illustrates the key players in the United States cyber security division and how they are

Information Security Essay

574 words - 3 pages access by cyber criminals. The indian government spoke to media in 2010 that they were attacked by cyber criminals whose IP address when tracked revealed that they were from Pakistan and china .India eventually cut off the internet access of those departments in order to cut off the transmission towards those countries. Therefore the above three objectives of information security deal with data loss, cyber security and development of an

Cyber Crime And Terrorism Essay

1058 words - 4 pages clients to feel unsafe with them, but are in fact hurting themselves as well as our country by doing this. In summary there are many problems that currently affect the response to cyber crime and cyber terrorism. We need to collectively address this problem more seriously, and begin training our security departments thoroughly, as well as establish diplomatic boundaries and international laws about cyber terrorism threats in an aid to keep terrorist groups at bay. Knowledge is power, and the more educated the American people are about cyber threats, the safer our great country will be.

Cyber Security Essay

752 words - 3 pages In contemporary context of global information era, the issue of cyber security is considered to be one of the key elements, which determine overall company's performance, competitive advantage, and image. From the critical point of view, the major controversy of cyber security is embedded between methods of control and monitoring, in particular its centralized or decentralized regulation. Practically, opinions of the specialists in regard to