Preview

Cyber Terrorism

Good Essays
Open Document
Open Document
571 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Terrorism
Johnny A. Reese
SOS-110-OL
Written Assignment 3

The greater threat to our nation is not the cyber crimes against individuals such as identify theft but the potential terrorist cyber attacks on national institutions. Whereas, security theft, credit fraud and other cyber crimes against individuals have had devastating impact to our society and as pointed out by Anne Bordon (2007) the annual cost in the United States is estimated to be a staggering 500 million. Although, a notably significant amount this figure does not compare to the possible damages a cyber terrorist attack would impose to our country’s vital infrastructures. The many systems that Americans relay upon daily for banking, transportation, energy and national defense would have a devastating negative impact if subjected to a successful cyber attack. “Cyberwar would not be as lethal as atomic war, nor as visibility drastic but if a single large American bank were successfully attacked it could have an order-of-magnitude greater impact on the global economy than the Sept. 11, 2001, attacks” (Sanger, Markoff, and Shanker). Cyberwar and the constant cyber threats caused by the United States potential adversaries has caused for concerns to protect these system’s vulnerabilities. Our government and Department of Defense (DoD) are constantly implementing ways to increase their network defenses to prevent compromise to these systems through cyber attacks.

The ability for government and DOD to protect its vital infrastructures and prevent the control systems of major national systems against cyber attacks must be diligently supported to prevent what happened on the Baltic nation of Estonia. The government was subjected to cyber attacks that penetrated their system causing shutdown and loss of major government websites. As a result Rebecca Wright (2007) pointed out, WEB WAR I demonstrated to the world exactly what a successful organized cyber attack could do to a national institutions computer



References: Borden, A, The Cost of Credit Fraud (2010 Oct) http://www.lawyersandsettlements.com/features/credit-card-fraud.html Rebecca.G, Victory in Cyberspace, Air Force Association Special Report, October 2007 (Arlington, VA: Air Force Association, 2007), http://www.afa.org/media/reports/victorycyberspace.pdf. Sanger. D, Markoff. J, and Shanker.T, (2010 Oct) "U.S. Steps Up Effort on Digital Defenses," New York Times, April 28, 2009, http://www.nytimes.com/2009/04/28/us/28cyber.html.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This week I read “The Silent War”, which is an article written by James Bamford. This article is about the cyberwar that the US has been preparing for years. The articles states the resources available now to win the war, and what has been done so far to protect US interests. With the boom of the internet, the digitalization of the sensitive information, the increase of electronic communication, and the electronic monitoring of nuclear weapons, it becomes available to launch different types of cyberattacks. An example is given in the story about a cyberattack against the Iranian nuclear system with the collaboration of the Israeli. Also, the story gives a biography of the general Keith Alexander who led the National Security Agency (NSA) for…

    • 189 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Arguments Against Kaplan

    • 940 Words
    • 4 Pages

    Robert Kaplan makes a compelling argument in his book, “The Coming Anarchy,” that global environmental and social factors such as resource depletion, overpopulation, crime, and tribalism are the most pressing national security issues in the 21st century. He cites numerous examples of crime, war, and destitution in failing states of West Africa as well as protracted conflicts in the Balkans, and Central Asia. However, the environmental and social factors described by Kaplan are not security threats, per se, rather the fertile ground from which security threats arise. Resource depletion, overpopulation, tribalism, or combinations thereof are not sufficient conditions for security threats. Kaplan himself makes perhaps the best argument for this in his description of the Turkish culture and the people of a shanty town called Golden Mountain. Despite having many unfavorable…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The US should come forth with an efficient policy discussing the matter directly and including its future uses of cyber-intelligence. Presently, cyber-attacks are uncommon; however they still pose a risk in the future of war and security of a nation. Every country should take measures in ensuring they will be ready for an attack. Because of this extraordinary hazard, the US should make considerable ventures in organizing methods to secure itself and its nation against it.…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Stuxnet

    • 933 Words
    • 4 Pages

    The discovery in June 2010 that a cyber worm dubbed ‘Stuxnet’ had struck the Iranian nuclear facility at Natanz suggested that, for cyber war, the future is now. Yet more important is the political and strategic context in which new cyber threats are emerging, and the effects the worm has generated in this respect. Perhaps most striking is the confluence between cyber crime and state action. States are capitalizing on technology whose development is driven by cyber crime, and perhaps outsourcing cyber attacks to non-attributable third parties, including criminal organizations. Cyber offers great potential for striking at enemies with less risk than using traditional military means. It is unclear how much the Stuxnet program cost, but it was almost certainly less than the cost of single fighter-bomber. Yet if damage from cyber attacks can be quickly repaired, careful strategic thought is required in comparing the cost and benefits of cyber versus traditional military attack. One important benefit of cyber attack may be its greater opportunity to achieve goals such as retarding the Iranian nuclear program without causing the loss of life or injury to innocent civilians that air strikes would seem more likely to inflict. Nevertheless, cyber attacks do carry a risk of collateral damage, with a risk of political blowback if the attacking parties are identified. Difficulty in identifying a cyber attacker presents multiple headaches for responding. A key strategic risk in cyber attack, finally, lies in potential escalatory responses. Strategies for using cyber weapons like Stuxnet need to take into account that adversaries may attempt to turn them back against us.…

    • 933 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Some of the global threats included cyber, counterintelligence, terrorism, weapons of mass destruction and proliferation, space and counter space, transnational organized crimes, economic, natural resources, and human security. According to the 2015 National intelligence estimate report, there is an ever-increasing cyber threat. Such cyber threats can come in several different forms and can affect American citizens and the economy alike. For example, Attackers successfully compromised U.S. Department of Energy computer systems more than 150 times between 2010 and 2014 (usatoday.com). According to the report, although the cyber threat is imminent, catastrophic cyber attacks against the U.S. is unlikely. Some of the nations that have the highest risks of launching a cyber attack against the U.S. are china, Russia, Iran and North Korea (dni.gov). The U.S. defense system against cyber attack cannot eliminate the threat the systemic interdependencies between different critical infrastructure sectors (dni.gov). The cyber threat actors are motivated by different factors and all pose a different threat to the national security of the United States. According to the national security estimates, Russia military is establishing a cyber security division and its main objective is to implement cyber attacks against other states. Those attacks can include propaganda, and inserting malware into a country command system and network operations (dni.gov). According to the report, Russia’s cyber division has been proven to be successful at implementing malware into other countries website and the likelihood of such attack on the U.S. is coming. Another country that continuously poses a cybersecurity threat is China. The Chinese government has always been trying to get an economic advantage against the U.S. The report assert that in order to…

    • 501 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The Internet has become a daily ritual for Americans. So many people rely on technology and computers to do their shopping, banking, and communications. Where most of this used to be done in face-to-face communications, the ability to do it online has become increasingly popular because of the ease of use, but it is also putting fear in people as to whether their personal information is protected or not, and if our information is protected what does that exactly mean and who has access to it and how? This paper will examine cyber terrorism and information warfare, what has happened in past years and what needs to be done to not only protect our country, but us as citizens.…

    • 2227 Words
    • 9 Pages
    Good Essays
  • Good Essays

    “People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy Mexican food, weapons of mass destruction, and cyber-attacks.” - Dutch Ruppersberger. In other words cyber-attacks and war fare has the potential to have the save destruction as WMDs. We need to pay attention towards cyber warfare because it is the way of the future. Fight has gone from bow and arrows to drone airplanes and now cyberspace. Cyber warfare is simple and inexpensive; all a terrorist needs is a computer and a connection. That is why terrorists are leaning towards cyber-attacks. Cyber terrorism has a huge impact on many lives across the globe. In order to end cyber warfare countries must find why they are being attacked and how they are being attacked. The primary reason for cyber warfare is the lack of sophisticated army encrypted security on public and…

    • 519 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Every day millions of people are at risk by cyberterrorism. Cyberterrorism is known for the merging of cyberspace and terrorism. This is where people illegally hack into computers and networks to simply still people’s information, such as; their identity (Weimann, 2004, p.1). These hacks or attacks result in violence of the society. Cyberterrorism simply cause harm that causes fear in society. People struggling with cyberterrorism has not only become an extremely debated issue, but also has become a pleasing one. It has become a pleasing one because of an entire business wanting to take action in dealing with the threat of the cyberterrorism. With that one business taking action has caused many other businesses wanting to also take action to…

    • 1017 Words
    • 5 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays