This website uses cookies to ensure you have the best experience. Learn more

Cyberspace: Cyber Security Essay

1131 words - 5 pages

In this day and age, Cyberspace touches almost every part of our daily lives. There are few activities and places that we approach that are not in one way or another tied into cyberspace. On a small scale, matters such as your home, work, hospitals, schools and even a lot of restaurants are tied into cyberspace. On a much larger scale, matters such as the power grids that bring us power every day, nuclear power plants , military information and most of the intelligence the US government has ever collected are accessible in cyberspace. Knowing this information brings me to a few questions. How well is this information protected? How does this affect the average person?
This is where cyber security comes into to play. Cyber security, in a nut shell, is the attempt to stop any individual from attaining information via cyberspace that they are not supposed to have access to. Cyber security professionals’ work day after day trying to combat these threats against our information and in some cases our lives. The biggest issue with Cyber security is that it is always evolving. As soon as one issue is fixed, another individual finds a different way to exploit the codes and protocols that make up the vast entity of cyberspace. Also, the attackers can range vastly in knowledge levels; anywhere from engineers that are experts at code and how the protocols work to kids that use scripts (premade strings of code that are programmed to automatically execute a given function). These scripts are usually made by professional coders and are fairly easily accessed over the internet.
Recently it was discovered that there is a flaw in a very common internet protocol that protects your personal information when you shop online. Anyone that was ever bought anything online or that has done banking online has come in contact with this protocol. When you go to Amazon, for example, and click purchase, a little box pops up that contains a picture that represents a pad lock; this pad lock has a few meanings. One meaning is to let you know that you are now on a secure connection that jumbles your information (such as credit card info, name and address and any other information that the company needs to send you an item) so it is harder for someone that may stumble across your information to know what it says. This information is not randomly jumbled; it goes through a mathematical sequencing programming that encrypts it. The computer in which you are purchasing your order from then contacts the server and exchanges a key that will allow the server to read the encrypted information.
This entire process is known as SSL or secure socket layer. However, as secure as this may sound, the flaw in the protocol allowed anyone with a little bit of knowledge on the SSL to bypass the encryption and gain access to your information. Since the discovery of this flaw a few weeks ago, programmers have fixed the protocol that will allow it to function the way it was intended too. At this...

Find Another Essay On Cyberspace: Cyber Security

Military Cyber: An Evolution In Command Relationships

1693 words - 7 pages United States Cyber Command is less than four years old. The merger and stand down of the Joint Functional Component Command for Network Warfare (JFCC-NW) and the Joint task Force for Global Network Operations (JTF-GNO) formed the bulk of the new organization. 9 This new construct integrated offensive and defensive cyber capabilities in one organization resulting in efficient and effective planning and execution of cyberspace operations

Cyberspace: The Asymmetric Battlefield of the Future

2164 words - 9 pages they present have forced the U.S. to remain vigilant and prepared to react instantly to limit the effectiveness of a successfully implemented cyber-attack. This has created an environment that requires developed strategies to ensure the protection of U.S. national security. The DOD has taken a number of steps to strengthen is capabilities in cyberspace by mounting the five strategic initiatives that complement the cyberspace policy initiatives

Examples of War in Cyberspace

2881 words - 12 pages of propaganda. On the other hand, war in cyberspace has an element of physical destruction in the tangible world. The war in Afghanistan and Gulf war I and II are famous examples of how cyberspace can be used to launch missile attacks on the tangible world. Infrastructure attacks by state military and ‘cyber terrorist’ on electricity generators, waters supplies and transport systems will have a disastrous effect on

Computer Crime

1796 words - 8 pages A major part of the world today revolves around technology and cyberspace. Almost every day one will use a type of computer in some way, whether it is work related or if it is for personal use such as social networking. Another thing occurring on a daily basis is criminals committing either trivial or major crimes; so it is not hard to imagine that these two actions would start to syndicate into one. Cyber-crime is defined as “unauthorized use

The Republic of India

936 words - 4 pages India’s weakness to the menace of cyber-attacks will become greater. Critical infrastructures and sensitive computer systems in India have been become targets for crackers. They’ve been successful at compromising them and in many cases their compromise hasn’t also not identified for a considerable period of time. Several obvious cyber security problems exist in India to the extent that they require urgent attention on a priority basis. Example: A

The Internent Grows More Dangerous

986 words - 4 pages each new cyber attack and make themselves aware of the consequences each attack can create. This paper will discuss the new cyber attacks that are increasing and how individuals and businesses are affected. Internet Grows More Dangerous Cyberspace fraud has been increasing vastly with new technological advances in cyber security. With these new advances the internet has become vulnerable to various kinds of e-commerce fraud. New ways to

What is Cyber Security?

1085 words - 5 pages , cybersecurity was pushed closer into the light and was referred in the National Strategy for Homeland Security as a national concern and a “central component of the National Security” to cyberspace. Cybersecurity and cyber terrorism were concerns of the private sector and government agencies followed by the military and FBI, since the 1980’s (Bullock 284). In the Introduction to Homeland Security: Principles of All-Hazards Risk Management

Finland Should be a Cyber Connector

912 words - 4 pages regarding its opportuni- ties to conduct cyber surveillance, but other countries are racing to develop their own security, surveil- lance and espionage capabilities. Some countries, such as Brazil and Germany, are reacting to this US dominance by looking at how their citizens’ online information can be stored on domestic servers. Besides being expensive and technically dif- ficult, these efforts may lead to the “Balkanization” of cyberspace. Many cyber

Role of the National Cyberspace for American National Security

3032 words - 12 pages governments that attacked the United States government through cyberspace were identified as Russia and China. In order to further protect government computer systems, United States President Barack Obama appointed Melissia Hathaway to head a cyber security initiative that will conduct a 60-day review of federal cyber security programs.Some examples of some of the biggest cyber attacks against the United States are known as Code Red and W32 Nimda. Code

Cyber-Warfare: The Importance of the New Digital Battlefield

2258 words - 9 pages . Academic Search Complete, EBSCOhost (accessed March 21, 2011). Thomas C. Wingfield, 2000 “The Law of Information Conflict: National Security” Law in Cyberspace 17 (Aegis Research Coqj). Thornburgh, Nathan. “The Invasion of the Chinese Cyberspies - TIME.” http://www.time.com/time/magazine/article/0,9171,1098961,00.html. Trias, Eric D., and Bryan M. Bell. 2010. "Cyber This, Cyber That ... So What?." Air & Space Power Journal 24, no. 1: 90-100. Academic Search Complete, EBSCOhost (accessed March 21, 2011).

Cyber Security Controls As a Public Good

2486 words - 10 pages cyber security controls. Technology advances at a rapid pace and laws, policies, and regulations must move at an equal pace. The current structure for passing and enacting laws is not conducive to ever-changing environments and cyberspace changes on a daily basis. The government is challenged with creating laws that are general enough to apply to many cases, yet clear enough to keep cyber criminals from falling through the cracks. Conclusion

Similar Essays

Rule Of Law In Cyberspace As A Means And Way To Cyber Security

1066 words - 5 pages During the last some decades we can find out a significant increasing of crimes committed through the Internet. The most dramatic thing is that such kind of crimes normally cover some countries and therefore international, unified way of prevention and investigation of cyber crimes is needed. There are numerous theories and ways to prevent cyber crimes, to ensure cyber security, but I would focus on some basic directions. There are two basic

Cyber Security Essay

1295 words - 5 pages . Cyber terrorism is one of the major treat to all sensitive information in cyberspace. Cyber terrorism can be defined as the use of computers and technology to cause server disruption or widespread fear in society. Through cyber terrorism data that is sensitive to major corporation and government alike are in danger of being hacked then used against them. Cyber security helps defend against cyber-attacks by tracking the attackers back to the source

Cyber Warfare: Defending Against A New Form Of Terrorism

972 words - 4 pages Introduction Cyber warfare is a new type of terrorism is the United States. The United States National Security Team is responsible for handling computer warfare battles against hackers. The government should invest more money and resources in cyber warfare defense to protect our nation’s economy and infrastructure that is heavily dependent on technology. Imminent Threat The threat of a cyber-attack on our nation’s infrastructure is now viewed

Department Of Defense Strategy For Operating In Cyberspace

2042 words - 8 pages successfully implemented cyber-attack. This has created an environment that requires developed strategies to ensure the protection of U.S. national security. The DOD has taken a number of steps to strengthen is capabilities in cyberspace by mounting the five strategic initiatives that complement the cyberspace policy initiatives outlined by both President Obama’s 2010 National Security Strategy and the 2010 Quadrennial Defense Review. The first