Preview

network security

Powerful Essays
Open Document
Open Document
4081 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
network security
The Future of Anti-Terrorism Technologies ABSTRACT

The global war on terrorism, much like the Cold War, will be a long, protracted conflict because, despite the preponderance of power held by the nations united in their commitment to combat terrorism, we will not be able to come directly to grips with the enemy. Developing technologies that leap ahead of the terrorists requires vision and strategy, and a good strategy requires hard choices. It begins by establishing criteria for selecting the most crucial technological investments. The obstacles to creating counter terrorism technologies that are practical and affordable and overmatch the threat of 21st century terrorism are daunting. Creating a vision of these future technologies, implementing initiatives that broaden the market and make it more predictable and dependable, and developing policies that will help to overcome the barriers to innovation are essential steps to harnessing technology to the future needs of law enforcement. For most of the 20th century, counter terrorism and technology coexisted in a one-sided relationship. In large part, law enforcement and the military adapted the technologies that were commercially available to their needs. That relationship may simply be inadequate for addressing the challenges of the 21st century. Meeting the test of terrorism will likely require a more proactive approach to technological innovation—betting on the future: formulating clear requirements, prioritizing needs, establishing cooperative means to foster the development of technologies, and building the human and financial capital programs necessary to transition and sustain them as effective anti-terrorism tools. In our paper, we want to list “big bets” for the future—six technologies that we believe offer the greatest promise for providing significant advantages in combating terrorism—and address as well the challenge to turning the potential of technology into concrete capabilities.

The



References: 1. www.informit.com 2. www.idsuperstore.com 3. www.schneier.com 4. www.cs.purdue.edu 5. www.nano.org. 6. www.nanoforum.org 7. www.nist.gov 8. www.nanowerk.com

You May Also Find These Documents Helpful

  • Good Essays

    White, J. R. (2009). Terrorism and Homeland Security (6th ed.). [Adobe Digital Edition]. doi: 1009-0001-15E7-000015E8…

    • 873 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    While terrorism is not a new phenomenon to the human race, the past ten years have ushered in a previously unfamiliar rise in terrorism attacks on U.S. domestic soil. This problem has posed a significant challenge to U.S. national security which both government and commercial entities have so far struggled to adequately address and prevent.…

    • 17193 Words
    • 69 Pages
    Powerful Essays
  • Good Essays

    Network Hardening

    • 287 Words
    • 2 Pages

    It is very important to go through the process of hardening. Hardening is where you change the hardware and software configurations to make computers and devices as secure as possible. I picked the network layout 1-the workgroup . First with the workstations and laptops you need to shut down the unneeded services or programs or even uninstall them. I would also have some good anti-virus software on the workstations. You also need a hardened image for all of your workstations. To do this you need to install a new copy of the operating system and then harden it. After you have one good hardened workstation you can use it as a model for all other workstations and also laptops. For the router you definitely need to protect it from unauthorized access. The router needs to be password protected and you should periodically change that password. For the cable modem you should keep all unwanted ports closed. I would also schedule a regular scan of all the systems. Now for some of these next things I am talking about they will apply to all devices . Disable remote administration. Administration of your router / access point should be "local only", namely, there is no reason to let people from another country access to your network hardware. If you need to make changes, you should be local to the device. Update the firmware. Believe it or not, consumer network hardware needs to be patched also. Check the support site of the vendor of the device when you get it and check for an update. Sign up for e-mail alerts for updates, if available, or check back on a regular basis for…

    • 287 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    “We are now faced with a combination of new and traditional actors, a widened set of motivations and tactics, organizational structures and principles, as well as a wider range of threats along the technological spectrum, especially with the increased potential for the terrorists use of weapons of mass destruction. Counter terrorism must deal with a wider range of threats…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Since 2005, the Islamic group has exceeded doubling and the account of terrorism from this group has almost tripled. This growing terrorist army known as the Islamic State of Iraq and al-Sham, ISIS, is becoming a threat not only to the east but to the American homeland as well. While approximately ninety percent of Americans “... view ISIS as a serious threat to U.S. national security, there remains confusion over the degree to which the group directly threatens the American homeland” (Gottlieb 2). As technology advances, terrorists are able to assimilate into our systems which can become a hazard to our people. There are both immediate and long-term risks to our country, military improvements being one of them.…

    • 1223 Words
    • 5 Pages
    Good Essays
  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Bibliography: Byman, Dan. "Fighting the War on Terrorism: A Better Approach." Www.tobinproject.org. N.p., 2006. Web. 11 Dec. 2013.…

    • 2016 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Better technology and training to detect terrorist are important steps to reduce terrorist attacks. To achieve this objective, government must authorize national and local leaders to design programs, training, and funding. Thus, high priority should be given to developing programs to detect and prevent intended attacks before they occur.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    In the aftermath of the terrorist attacks of 9/11, securing the country has become a national priority. The events of 9/11 were the first attacks on the United States (U.S.) since Pearl Harbor which catapulted the U.S. into World War II. As of the writing of this paper, the U.S. has been engaged in the War on Terrorism for 13 years. During this period of time the U.S. has been kept free from terrorist attacks by changes to laws, technology, and investigative methods to combat terrorism internationally. Although there have been a number of changes to U.S. law and American citizens have been kept safe, the threat of terrorism has not abated. With the continued threat of terrorism to the U.S. and its citizens, there is a high probability that the U.S. will suffer another 9/11 type of event.…

    • 3080 Words
    • 13 Pages
    Best Essays
  • Best Essays

    Interrogations

    • 3230 Words
    • 12 Pages

    United States. Army. Training and Doctrine Command. A Military Guide to Terrorism in the Twenty-first Century: TRADOC G2 Handbook(s). Vol. 1.06. Fort Leavenworth, Kan.: Command, 2008. Print.…

    • 3230 Words
    • 12 Pages
    Best Essays
  • Best Essays

    As the United States wages a war on terror many people will argue that we are creating more terrorists. My hypothesis is that our tactics since September 11, 2001 are actually acting as a deterrent to future terroristic activity. Throughout this paper there are descriptions of how terrorist cells are disrupted by the Global War on Terrorism (GWOT). This disruption of abilities is brought on by a number of agencies with the coordinated intelligence of the National Counter-Terrorism Center (NCTC) established through recommendations made in the 9/11 commission report. The establishment of a central intelligence pool to be analyzed by experts from all of the major agencies was a seismic shift that allowed forces to be directed properly.…

    • 1941 Words
    • 8 Pages
    Best Essays
  • Good Essays

    The threat to national security of the United States is more intricate and complex than ever. The evolution of terrorism has maintained the key component of fear but the infiltration and application of how the fear is perpetrated has transformed. From the dismay of nuclear threats and espionage during the Cold War with the Soviet Union to the highly trained militants that crafted the attacks of the World Trade Center buildings in 2001 advancing to home grown radicalized terrorist that are educated and socialized by foreign extremist as the Islamic State of Iraq (ISIS), terror now has a new face with a cloud of unknown miscreant. At the forefront the United States intelligence community is fusing the efforts of local, state and federal law enforcement counterintelligence skill and competence to deter, apprehend and foil any threats to national security.…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    “Policing in America today is at a crossroads as it looks towards the future, the old policing strategies are no longer suited to address the emerging threats and growth of electronic crimes arising from out of the growth and popularity of the Internet, these crimes include: online fraud, child pornography, embezzlement, economic espionage, privacy violations, computer intrusions, cyber--stalking or any other offences that occur in an electronic environment for the express purpose of economic gain or with the intend to destroy or inflict harm to another person or institution.” …

    • 2169 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Patriot Act

    • 1920 Words
    • 8 Pages

    With today’s society of advanced technology, it has become imperative for the United States to develop new laws to keep up with emerging threats and to combat illegal activities within the country as well as abroad. Without the ability to monitor communications and information, the War on Terrorism becomes an unsymmetrical battle that is detrimental to the American way of life. Devoid of such significant laws, federal authorities would be at a disadvantage to terrorists as well as criminals. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) has helped turn the tables in the War on Terrorism and is essential to the defense of the United States.…

    • 1920 Words
    • 8 Pages
    Powerful Essays