Cyber Security In The Millitary Essay

1155 words - 5 pages

We as Americans tend to think that because we have the best military, the most money, and the strongest defense organizations (nsa, ect) that we somehow have a natural advantage in cyber space.the world of cyber relations is dominated by offence. We have far more divided territory to defend than any other country. And not enough trained personnel to defend it. While we have yet to encounter a full scale Cyber war,we have been in some sense at war on a cyber-front since the early 2000’s. Chinese and Russian hackers have penetrated our most secured networks and gained access to some of our most precious secrets. They did this for the most part by clever social engineering and phishing attacks ...view middle of the document...

From a military standpoint 1,100 people are officially staffed with creating the tools and the policies to protect the networks of over 316 million Americans when a cyber-war occurs. When you take into account the volume off attacks that America has on its networks per year you realize that 1,100 people is just not enough. Us-cert received 48,562 reports of cyber-attacks on federal agencies in the year 2012. These attacks included sql injection, xss scripting, denial of service and many others. It is almost guaranteed that the number has grown since then. The fact of the matter is that when these numbers were reported we were not at war. In the event of a cyber war those numbers would only go higher and the list of types of attacks would also go higher. But understaffing isn’t our only problem our

One of the major beliefs of the military is discipline without it the American military would not be as effective as it is today.. in America the vulnerable Joel Brenner tells the story of “John smith” a fictitious corporal working for the 902nd military intelligence group. On his job John has access to the internet and 3 very high level systems. NIRPANET(the pentagons unclassified system), SIPRNET(the connection to the pentagon’s secret system), and JWICS(the pentagon’s top secret system). The systems are accessed via four different computers. The systems are supposed to be “air gapped” which means there is no way to move information electronically from one network to the other. John’s superior calls him via the SIPRNET requesting some information that john can only find on the internet. Instead of following policy, John decides to transfer the information using his newly bought flash drive. He puts the flash drive into the internet to download the information and then onto the SIRPANET to send it to his SO. What john doesn’t know is that the flash drive he is using has been poisoned with malware. Inserting the drive into the SIRPANET releases a virus that steals information and from that point on whenever john places the flash drive back onto the machine attached to the internet it sends some top secret information to the Russian military. While this is just a story used to illustrate the point that following policy is important it can also be used to show...

Find Another Essay On cyber security in the millitary

The Necessary Inclusion of Cyber-bullying Legislation in Canada

2421 words - 10 pages In Canada, the emergence of bullying has risen to new heights as advancements in technology have allowed almost anybody to conduct harmful acts against another person while maintaining vast amounts of anonymity (Shariff, Cyber-Bullying: Issues and solutions for the school, the classroom and the home, 2008; Li, Cyberbullying in Schools: A Research of Gender Differences, 2006; Shariff & Jaishankar, Cyber Bullying: A Transnational Perspective, 2009

Security in the Computer World Essay

1434 words - 6 pages INTRODUCTION The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual. There are closed networks and open networks. The closed networks are available for a person who

A Case Study on the cyber-attack in cloud computing

2545 words - 10 pages cybercriminals. In addition, we have carried out the detailed study on the industries which are targeted and the method employed by the cybercriminals to target these industries. This work will be extremely helpful to researchers and enterprises to know the type of cyber attack occurring in this newly evolved paradigm and to evolve the new methods to counter them. Keywords Cyber security, cloud attack, cybercrime, resource protection 1

Security in the Business Environment

1919 words - 8 pages Standards Organization (ISO) 17799:2000 and the IT Infrastructure Library (ITIL) Best Practice in Security Management. Introduction This service management function (SMF) provides information about security management for organizations that have deployed, or are considering deploying, Microsoft or other technologies in a data center or other enterprise-level computing environment. The guide assumes that the reader is familiar with the

Freedom of Speech in the Era of Cyber Bullying

2091 words - 9 pages Freedom of Speech in the Era of Cyber Bullying Jameson Marquis POL 210 April 6, 2014 As we are living in the age of technology, we are seeing our youth being victimized by a new phenomenon of bullying, called cyberbullying. Cyberbullying is defined as the use of information and communication technologies such as email, cell phones and pager text messages, instant messaging, defamatory personal Web sites, and defamatory

Security in The Grand Inquisitor

1415 words - 6 pages Think back to your childhood. Was it one filled with happy memories? The majority of us can say yes to this question. Most of us grew up in a innocent, carefree world. Being free of adult responsibilities, we could play all day without having to deal with the issues of the adult world. Back then, we had the security of our parents. They were always there making our decisions for us. We were told when to go to bed, what to wear, and what to eat

Bullying in the Digital Age: Electronic or Cyber Bullying

735 words - 3 pages In the last few years, traditional bullying and cyber bullying have become two communal problems of our society owing to the major advances in technology and communicative devices. In spite of the fact that they can not be eradicated completely, the lack of action and initiatives will exacerbate the situation even more. Therefore, recent researches have passionately suggested that education, which is considered of crucial importance, and

Computers - Do we Live in the Cyber Reality?

910 words - 4 pages have worked their way into just about every aspect of our everyday lives. From waking up in the morning and checking our email inboxes, to watching a relaxing movie after a harrowing day after a harrowing day at the university, computers have influenced the way we live and will continue to do so for a foreseeable future. At the very end of my presentation, let me quote what an American author, Nicholas Stein put - "The internet and computers will affect our society in such a dramatic way that humans cannot preper or predict." Can we call our reality a cyber one - the question remains open for discussion.Bibliography:F. Hoque, e-Enterprise, Cambridge University Press, 2000

Social Security In The Future? Maybe Not

2275 words - 9 pages Social Security In the Future? Maybe Not      It was early spring in the year 2048 and my bithday was coming up this August 26. I would be turning 70 years and retirring. I am not looking forward to it as much as I thought. My whole life I dreamed of moving to Florida and living on the beach when I retired. I planned on traveling a lot seeing the great sites the country has to offer. All of these plans have changed

Terrorism: Changing Security in the United States

1216 words - 5 pages In the past few decades, there have been various terrorist attacks throughout the world. Most importantly, countless acts of terrorism have been committed in the United States of America, that have gradually influenced the way the American security system and security at public buildings, public places, are run. Because of this act of terror, the American government has made protecting its citizens and country a top priority. These attacks, and

Crisis in the Social Security Administration

2354 words - 9 pages As an advocate for the Social Security Administration (SSA), I would like to suggest the following proposal for your examination and potential action. The SSA, one of Americas leading organization that serves to the benefit of the public, is undergoing a series of crises. The agency functions through a top-down system of authority. Although, at first this may seem as the best method of running such a large entity, in reality it creates a

Similar Essays

Crime In The Cyber Realm Essay

1032 words - 5 pages , which bans websites and content that are illegal in China. According to Paul Wiseman of USA Today, “If an Internet user in China searches for the word ‘persecution,’ he or she is likely to come up with a link to a blank screen that says ‘page cannot be displayed’” (n.d.). The Code theory of cyber crime allows for a multifaceted approach to cyber security, where each involved entity maintains its own relevant level of cybersecurity. In practice

Rule Of Law In Cyberspace As A Means And Way To Cyber Security

1066 words - 5 pages During the last some decades we can find out a significant increasing of crimes committed through the Internet. The most dramatic thing is that such kind of crimes normally cover some countries and therefore international, unified way of prevention and investigation of cyber crimes is needed. There are numerous theories and ways to prevent cyber crimes, to ensure cyber security, but I would focus on some basic directions. There are two basic

It's War In The Cyber World Essay

1887 words - 8 pages , but they don’t mind doing it to others. This is what mainly the SOPA and PIPA acts use in order to promote their validity: protection and security against the possible damage that the freedom of the internet could cause. "The bills are intended to strengthen protections against copyright infringement and intellectual property theft…" (Condon, 2012:1). However in reality, those bills attack the sites where unauthorized content is displayed and

Security In The Cloud Essay

1724 words - 7 pages Rahul Shah Paper #1 Digital Hardware Basics Security in the cloud Hackers have gotten there way into every technological gadget out there. Something simple as browsing the web can give hackers information about the people’s data. Before Cloud computing, hackers were stealing data from the physical hard drive by implementing a virus that would open a back door and send the data straight to the hacker’s server. As security measure