Cybersecurity Gets Dumber Each Day Essay

600 words - 2 pages

And so the redundant headlines emblazoned my screen "The accounts targeted reportedly included those of senior U.S. government officials as well as Chinese activists and journalists." There is nothing new or unique her however, I am now beginning to question the mind-state of politicians who would use GMail or any other free email service for any kind of sensitive or even mission critical US data. Is it just me or are some of these politicians missing some marbles?

Unless US government officials have been living under a rock, they might not have seen or heard about Sarah Palin's account being hacked [2], Weinergate [3], or those cloned RSA ID tokens [4]. It is becoming disgusting and I don't mean the security state of affairs but the fact that those in government should know better.

When it comes to the technical side of the arena, there is only so much that can be expected of non-tech-savvy individuals. Not many are aware of the attack vectors and this is understandable however, when it comes to mission critical, sensitive information, why are government officials using anything outside of vetted networks, connections, and or software. This is not only puzzling but borders on outright stupidity and negligence.

More puzzling is, not only the overall claim that "China's Government is Hacking" as that can be debunked [5]. While it is simple to point the finger at China, the reality is that, it is more complex to outright prove this because of the complexities involved with spoofing. Not to mention, every blackhat from here to Montezuma knows that China is the first choice to use when pivoting attacks. Better to attack from China as the likelihood of being caught is so low and with potential for escalation from a "cyber war" to full-fledged war on the horizon [6], I choose to question the United States' negligence on "getting hacked."

Imagine for a moment I live in a bad neighborhood. Knowing I live in this bad neighborhood, I see news reports warning me about potential break-ins and choose to...

Find Another Essay On Cybersecurity Gets Dumber Each Day

Cybersecurity Essay

1243 words - 5 pages personal data and using it to gain access to your accounts. In fact, there are many different ways thieves are threatening your safety in cyberspace. Each of these threats is serious in nature and one should act upon it immediately before more damage is done. One type of threat people have to deal with is the annoying malevolent code, better known to most of us as malware and spyware. This type of threat goes through the security system of the

Aldous Huxley's Brave New World Essay

771 words - 3 pages civilization, and becomes more disgusted with each day that goes by. Lenina grows an infatuated passion for John, and constantly seeks him out. John thinks of Lenina very highly until she makes advances at him that are against his morals. He gets extremely upset one evening when Lenina makes a sexual advance towards him. "The savage pushed her away with such force that she staggered and fell." John's mother dies shortly after his violent

Marijuana Effects Teens and Their Mind

781 words - 3 pages high school (War on Drugs, 116). One Million teenagers start smoking and doing drugs each year, 3,000 a day, despite the fact they aren’t old enough to purchase these things (Teen Addiction, 18). A survey reported that teenagers that go to religious services are less likely to smoke cigarettes or use marijuana or spend time with people that do. Most teens start using marijuana because of their friends, siblings, or if older “cool” people do

Assessing the Impact of the Clinger-Cohen Act on CIO-related Issues at the National Center for Telehealth and Technology

2490 words - 10 pages processes, acquisition processes, strategic plans, and proper execution of IT funds processes in going forward (Moe, 2014). These processes will change some during use, but it is the new “norm” at T2 after a 30-day pause of the entire organization’s operations to become compliant (R. Campise, personal communication, May 17, 2014). Now the hard work begins to follow the intent of the CCA through new processes and change the culture. Below are the

Controversy Surfaces Towards Modern-day Sitcoms

2305 words - 9 pages modern-day comedy sitcoms too controversial? I still stand strong by that! Modern-day sitcoms are very controversial. The racy subjects that are discussed such as religion, race, abortion, and many more are too provocative. These subjects can easily offend a person. Either sitcom needs to change their outlook or many people are going to be offended. Offending the society is not a good factor, because if one gets offended that person might stop

Advantages of Using Internet

712 words - 3 pages with several members of the society in a single go. Nowadays, the world we used to know has changed. People are not anymore spending time at libraries, reading books and scanning papers, but passing their time surfing the internet looking for some new knowledge to acquire during the day. It became obvious that the human brain can process and fathom surplus amount of data in very less time. Besides, internet technology is not making humans dumber

A Security Plan for Businesses by Virtual Protectors

1757 words - 7 pages Today business is moving faster than it ever has before. With the Internet and e-commerce, even brick and mortar businesses are now open twenty-four hours a day and seven days a week. However, there are security threats that linger with this new age of business that need to be mitigated. According to a survey by the National Cyber Security Alliance (NCSA) and Symantec, a company that offers security solutions, seventy-seven percent of small

"To Play or Not to Play... God?" This is a satirical essay that argues against using genetics to create human beings (through cloning, etc)

848 words - 3 pages creation of a perfect person. We could actually make ourselves a modern day Renaissance Man like the ones from - well, from the Renaissance. Piece by piece we could put together a well-rounded, possibly intelligent, human being that would match Da Vinci's anatomical drawings to a 'T', or more precisely, to an 'eye'. Humanity, of course, would be astounded by the outcome. We would create a Martin Luther; a Galileo; hell, why not a Jesus? And we would

power and politics

2030 words - 8 pages . Groups can choose to work together or against each other to achieve results or gain resources. When it comes to resources, if one group gets more another will automatically get less. Within an organization, these groups and alliances often use power as avenue to achieve their goals and get what they want. This will often result in a political power struggle.      To conclude the topic of power and politics, the story of

Humor of South Park

1939 words - 8 pages South Park Elementary School in South Park, Colorado. While much of the humor in South Park is scatological in nature, the show is well known for its political satire. That is, “no matter how nasty and scatological [South Park] gets, it’s never just dumb and dumber. Besides all the bathroom humor, the show is built on clever, equal-opportunity satire” (Johnson-Woods 25). Strauss 1 Jeffery Weinstock asserts in his book Taking South Park Seriously

The Case for and against Social Networking

1106 words - 5 pages playing a mindless game. At least if one is on Facebook while "wasting time" one can be contributing to a conversation or be reading about a current event happening in the world. Social media has made people more knowledgeable about the world around them. On Facebook, a lot of people post statuses about "_________ awareness day", ex: human trafficking awareness day. On February 27th, national human trafficking awareness day, newsfeeds on

Similar Essays

Importance Of Cyber Security Essay

2012 words - 8 pages , “The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.” (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified as national assets upon which the administration will orchestrate integrated cybersecurity policies without infringing upon and protecting privacy

Ia2b Essay

960 words - 4 pages priorities for our nation’s cybersecurity. No single agency has authority to match the scope of this challenge, it's a partnership. After 9/11, security heightened, during the Bush-era several policies (including the CNCI) were implemented, as such, DHS was established. When Obama took office, a 60-day review of earlier administrative policy took place, concluding bottom-down alignment and reassigning the Whitehouse in charge of cybersecurity. All

Critical Infrastructure Protection Explained Essay

1361 words - 6 pages to be logically motorized and more interlinked. Having a tendency to these vulnerabilities requires more top notch flexibility, an immense evolutionary approach that compasses both open and private ranges, securing both nearby and worldwide financing. Each one extension and association of chose, state and neighborhood governments are liable for securing their specific infrastructure; each segment and office should just have measures ensuring that

User Vulnerability In Cybesecurity Essay

1863 words - 7 pages reduce the impact of incidents that do happen. This idea becomes even more appealing when the timespan of events related to breach response is considered, see Figure 1 (Verizon RISK Team & United States Secret Service, 2010, p. 46). There are two different approaches—each tailored to the group of vulnerabilities—that may be used to reduce and mitigate associated risks. Works Cited CERT. (2010, January 25). 2010 Cybersecurity Watch Survey