Preview

cyber security vulnerabilities

Best Essays
Open Document
Open Document
4737 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cyber security vulnerabilities
Cybersecurity Vulnerabilities Facing IT Managers Today

Darin Swan
University of Maryland University College
Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.
- Robert A. Miller and Daniel T. Kuehl

Connectivity in the Modern World
Today, computers connect us to our finances through online banking, mutual fund management, stock trading services, and a variety of other online applications that provide access to accounts twenty four hours a day. Beyond financial services, we have the ability to connect to a wide variety of information, including social media content such as Facebook, YouTube, and Twitter, as well as magazines, video games, and other Web 2.0 content. The interconnectivity of such systems has not only provided individuals with access to a wide variety of data, but now businesses have the ability to leverage the Internet as a part of their day-to-day operations. Whether it be human resources management, email and coordinated calendar systems, or sales tracking systems, the cloud offers opportunity to businesses for quicker, streamlined processes and potential cost savings. Furthermore, the government uses interconnected computer systems to manage public services such as energy systems, coordinate public transportation logistics, synchronize emergency services, run water treatment facilities, and



References: 2011 state of security survey. (2011, August 31). Symantec. Retrieved from http://www.symantec.com/connect/blogs/2011-state-security-survey Ashford, W Chen, T. & Walsh, P. J. (2009). Guarding Against Network Intrusions. In J. R. Vacca Computer and Information Security Handbook. Amsterdam: Elsevier. Cliff, A. (2001, July 3). Intrusion detection systems terminology, part one: A – H. Symantec. Retrieved from http://www.symantec.com/connect/articles/intrusion-detection-systems-terminology-part-one-h Coleman, K The Comprehensive National Cybersecurity Initiative. (n.d.) The White House, President Barack Obama. Retrieved from http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative Dhamankar, R., et al (2009, September) Efrati, A and Gorman, S. (2011, June 2). Google mail hack blamed on China. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052702303657404576359770243517568.html FBI says hackers hit key services in three US cities Gottlieb, P. J. B., CDR. (2010). Cyberspace vs. cyber strategy. American Intelligence Journal, 28 (2), 18-25. Granger, S Gregg, M. (2006, June 9). Certified Ethical Hacker Exam Prep: Understanding Footprinting and Scanning. Pearson IT Certification. Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. Indianapolis, Indiana: John Wiley and Sons. Hassell, J. (2006, June 8). The top five ways to prevent IP spoofing. Computer World. Retrieved from http://www.computerworld.com/s/article/9001021/The_top_five_ways_to_prevent_IP_spoofing Hess, M Ispitzner. (2011, February 7). Book review – Social engineering. SANS (Securing the Human). Retrieved from http://www.securingthehuman.org/blog/2011/02/07/book-review-social-engineering-2 Jackson, D Kim, J. (2012, January 19). Many security breaches go unreported. Fierce Compliance IT. Retrieved from http://www.fiercecomplianceit.com/story/many-security-breaches-go-unreported/2012-01-19 Knickerbocker, B Lohrmann, D. (2012, January 4). 2012 Cybersecurity trends to watch in government. Government Technology. Retrieved from http://www.govtech.com/blogs/lohrmann-on-cybersecurity/2012-Cybersecurity-Trends-to-010412.html Libicki, M Libicki, M. C. (2009). The information environment. In America’s Security Role in a Changing World: Global Strategic Assessment 2009, 53-55. Lynn, III, W. J. (2010, September/October). Defending a new domain: The Pentagon 's cyberstrategy. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain Mallery, J Mateti, P. (2006). TCP/IP Suite. In Bidgoli, H. (Ed.), Handbook of Information Security. Bakersfield, California: John Wile & Sons, Inc. Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R Mick, J. (2011, June 19). Reports: Hackers use stolen RSA information to hack Lockheed Martin. Daily Tech. Retrieved from http://www.dailytech.com/Reports+Hackers+Use+Stolen+RSA+Information+to+Hack+Lockheed+Martin/article21757.htm Milevski, L McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill. Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R. & Murukan, A. (2003, June). Threats and countermeasures. Microsoft. Retrieved from http://msdn.microsoft.com/en-us/library/ff648641.aspx Montalbano, E Moore, R. (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. Security trumps secrecy in cyber fight-prosecutor (2012, January 12). Reuters. Retrieved from http://newsandinsight.thomsonreuters.com/Legal/News/2012/01_-_January/Security_trumps_secrecy_in_cyber_fight-prosecutor/ Sternstein, A Tanase, M. (2003, March 11). IP spoofing: An introduction. Symantec. Retrieved from http://www.symantec.com/connect/articles/ip-spoofing-introduction Editor Vacca, J Valacich, J. & Schneider, C. (2012). Information Systems Today: Managing in the Digital Word. Boston: Prentice Hall. Velasco, V. (2000, November 21). Introduction to IP spoofing. SANS (SysAdmin, Audit, Network, Security) Institute. Retreieved from ttp://www.sans.org/reading_room/whitepapers/threats/introduction-ip-spoofing_959

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    |Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.…

    • 109 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    External cyber-attacks are on the rise and have become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to protect itself from external cyber-attacks.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Best Essays

    5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    US Department of National Security. (2006). The National Security Strategy of the United States of America. Washington DC: USDOS.…

    • 1546 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The growth of e-commerce has been astronomical and its relevance to many businesses c=has increased. According to Forrester, e-commerce in the United States is going to reach $279 billion by 2015 (Indvik, 2011). This includes all electronic financial transactions. A 12.6% increase to $176 billion in 2010 has been fueled by an increase in Internet connected devices such as smartphones, tablets, combined with new e-commerce models—such as NetFlix, Groupon, etc. The consumer appears to be the driving force behind the financial boom of e-commerce.…

    • 6545 Words
    • 27 Pages
    Good Essays
  • Good Essays

    spam and cyber attacks

    • 972 Words
    • 4 Pages

    United Nations , Internet , Internet Governance Forum , Cyberattack , Cyberbunker ,Spam , Spamhaus , Technology News…

    • 972 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cyber Warfare

    • 896 Words
    • 4 Pages

    “Cyber warfare is a term used to describe the use of the Internet to wage war in the virtual world, often with real effects in the physical world,” (McGuigan). In the past recent years, cyber warfare has become a pertinent issue among the major nations on the planet; this issue has forced militaries, all over the world, to incorporate a new branch that is devoted to both conducting and protecting against cyber warfare. Cyber warfare is also used to define attacks amongst corporations, form radical organizations, and/or attacks by hackers, who are perceived as being warlike in their intent. Most situations pertaining to cyber warfare are attacks from one “sovereign state,” to another virtually in cyberspace (McGuigan).…

    • 896 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Cyber Threats

    • 641 Words
    • 3 Pages

    References: Cyber terrorism Testimony Before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives by Dorothy E. Denning of Georgetown University - May 23, 2000 - http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    web 2.0

    • 7126 Words
    • 29 Pages

    Butterfield, S. (2003). An article complaining about ‘social software’. Retrieved November 5, 2010, from http://www.…

    • 7126 Words
    • 29 Pages
    Powerful Essays
  • Good Essays

    Information Security

    • 11954 Words
    • 48 Pages

    This document is the result of a series of discussions about the best shape, form and content of a national research agenda in line with the National Cyber Security Strategy (NCSS). It formulates, in concrete terms, common thoughts and promising directions for a research agenda in cyber security. While all contributors firmly believe that a realisation of the agenda requires ambitious funding, as well as solid governance and embedding, this document addresses only the research directions. Acknowledgments This document has been edited under the coordination of the ICT Innovatie Platform Veilig Verbonden, with a broad involvement of researchers from various disciplines (computer science, law, public administration, cyber crime sciences and police studies) and from several universities and research centres (RU Nijmegen, VU Amsterdam, TU Eindhoven, University of Twente, TU Delft, Tilburg University, TNO, Novay). Discussions have extensively involved experts from the industry as well as from (semi-)government organizations.…

    • 11954 Words
    • 48 Pages
    Good Essays
  • Best Essays

    E Dominic Rushe (2011) ' FBI fights back against cybercrime’ 24/8 {online} (Accessed: 30/6/2013) available at…

    • 4912 Words
    • 20 Pages
    Best Essays