Preview

Mutually Assured Destruction Pros And Cons

Good Essays
Open Document
Open Document
505 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mutually Assured Destruction Pros And Cons
Mutually Assured Destruction, or MAD, was originally based on the premise that two countries would agree not to use nuclear weapons upon each other as the result would be catastrophic. That has now expanded to the world of cyber as nation-states are transitioning to means of cyberweapons as opposed to kinetic attacks. This transition is taking place for a number of reasons: it is cheaper to obtain, easier to deploy, and the perpetrator is harder to detect by way of IP spoofing, masking and other sophisticated means.
The United States critical infrastructure sectors are at a higher risk of compromise due to cyberwarfare. The risk of any of these sectors in the United States either being comprised or destroyed will have a serious and lasting effect on the operations of the country as we know it. It can effectively cripple the nation if an adversary is successful in disabling just three or four sectors. “The cost-benefit ratio “levels the playing field,” especially in favor of Third World countries which lack considerable leverage in terms of exercising traditional military power;…” (Eun & Aßmann, 2014).
…show more content…
Imagine a day where a person cannot withdraw money from an ATM to pay for their groceries or rent; a hospital record destroyed or rendered in accessible and a patient is given medicine that they are allergic to; the electric grid in a medium sized leaving a great number of people without electricity, putting people who are on life support at risk. All of these scenarios may very well become a reality if a cyberattack were to target the financial, healthcare and public health, and energy critical infrastructure sectors. The 16 sectors are displayed below in Table

You May Also Find These Documents Helpful

  • Best Essays

    Sarbane-Oxley Act of 2002

    • 3019 Words
    • 11 Pages

    Kochems, Alane. “Who’s on First? A Strategy for Protection Critical Infrastructure. May 5, 2005. Accessed April 9, 2009 from: The Hertiage Foundation website at http://www.heritage.org/research/homelandsecurity/bg1851.cfm.…

    • 3019 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Eo 13636 Summary

    • 334 Words
    • 2 Pages

    The EO 13636 despite its early criticisms has accomplished a lot over the past two years considering the monumental task it was designed to undertake. The criticism that mandated solutions will inevitably be too slow to effectively respond is still true, but as the EO gains ground with the cooperation of private industry by sharing information to help coordinate efforts to enhance cybersecurity and providing liability protection, it seems that a mass solution is taking shape. One can only imagine how long it will actually take and how well it will be able to be managed and regulated. But one also hopes that a serious attack to our infrastructure does not take place before we at least get something in place that is flexible and can be improved…

    • 334 Words
    • 2 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Crj 410

    • 443 Words
    • 2 Pages

    Many U. S. CI/KR assets, systems, and networks are interconnected with a global infrastructure that has evolved to support modern economies. Each of the CI/KR sectors is linked in varying degrees to global energy, transportation, communications, information technology, and other infrastructure sectors. This global system creates benefits and efficiencies, but also brings interdependencies, vulnerabilities, and challenges in the context of CI/ KR protection. Because disruptions in the globulin…

    • 443 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Electric grids, power plants, hospitals, etc., rely largely on computers and the internet to store and access data. If the security to these facilities are breached, skewed data and power outages are a real possibility. Therefore, it could lead to serious economic problems, and possibly, even death. With all that said, cyberwarfare is not something to be taken lightly, in fact, the dangers are extremely significant. Additionally, since technology is so prominent, it is a convenient method of…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the earliest part of the cold war the United States enjoyed a clearly superior nuclear force to the Soviet Union but eventually nuclear parity was achieved and a new phase of the cold war had started. Realizing their vulnerability each side began producing nuclear weapons at a furious rate in an attempt to stay ahead of the other. The United States adopted a policy called Mutual Assured Destruction, a.k.a. MAD where protection for the population was achieved by ensuring the capability to utterly destroy the attacker if attacked. (Wilde)…

    • 249 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The nuclear bomb is dangerous and scary weapon that really should have never been thought of or invented. Nuclear bombs have been the focal point of every country's scientists ever since World War II when the U.S. dropped them on Japan. Just seeing the death and destruction a nuclear bomb can cause to people and the environment just proves my point. Not one person should have the power to just be able to push a button and have the ability to tear another country to shreds.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    The United States safety and wellbeing relies on a resilient critical infrastructure, which is the assets, systems and networks that underpin American society. There are three different categories of threats. Natural threats, human- cause and accidental/technical threat. “Natural threats include weather problems in both hot and cold climates and also geological hazards like earthquakes, tsunamis, 18 International Journal of Control and Automation land shifting and volcanic eruption.” (Robles, Choi, Cho, Kim, G Park, Lee) The human caused threats are referred to as terrorism. “This may include cyber-attacks, rioting, product tampering, explosions and bombing.” (Robles, Choi, Cho, Kim, G Park, Lee) Technological threats are completely different;…

    • 887 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays