Preview

U.S. Plans for Cyber Attack Prevention

Good Essays
Open Document
Open Document
816 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
U.S. Plans for Cyber Attack Prevention
U.S. Plans for Cyber Attack Prevention
CMGT 441

U.S. Plans for Cyber Attack Prevention
Introduction
The improvements being done in technology touted to make lives and work easier also makes it easier for cyber-criminals to perform his or her nefarious deeds. Some of the most vulnerable and potentially damaging targets are critical infrastructures such as the energy grid and nuclear-power plants. To help combat this, the U.S. Government is launching a program dubbed “Perfect Citizen” to help safeguard those critical infrastructures as well as private companies. In this paper I will discuss the Wall Street Journal article on the Perfect Citizen project posted on the Wall Street Journal website.
Article
The Wall Street Journal (2010) website states “The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.” This program would be deployed and monitored by the U.S. Governments eavesdropping specialists, the National Security Agency (NSA). The NSA will rely on a series of sensors that will be deployed in high risk computer networks and that will be triggered by unusual activity that may be a prelude to cyber attack. The NSA will not, however, monitor the system on a persistent basis. The program is the brainchild of defense contractor Raytheon Corporation which recently won the classified contract estimated to be worth up to $100 million. This contract is said to be for the initial phase of the surveillance project. The Wall Street Journal (2010) website is quoted as saying “Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs, while others say it is an important program to combat an emerging security threat that only the NSA is



References: Gorman, S. (2010). U.S. Plans Cyber Shield for Utilities, Companies. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052748704545004575352983850463108.html

You May Also Find These Documents Helpful

  • Good Essays

    America's Privacy

    • 1205 Words
    • 5 Pages

    In the wake of the 9/11 terrorist attacks, a U.S. law called the Patriot Act was passed under the Bush administration. The goal of passing this law was to strengthen domestic security and broaden the powers of law-enforcement agencies with regards to identifying and stopping terrorists (Grabianowski). The privacy of the American public was first questioned in 2006 when USA Today reported that the NSA had “been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth” and was “using the data to analyze calling patterns in an effort to detect terrorist activity” (Greenwald). This article referred to a secret…

    • 1205 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Alexander, then director of the National Security Agency (NSA), told Congress more than 50 potential terrorist attacks had been thwarted by two controversial programs tracking more than a billion phone calls and vast swaths of Internet data each day. Additionally, the attacks on would-be targets such as the New York Stock Exchange were prevented by consuming telephone and Internet information from millions of Americans since September 11, 2001. In testimony, General Alexander said, "In recent years, these programs, together with other intelligence, have protected the U.S and our allies from terrorist threats across the globe to include helping prevent the potential terrorist events over 50 times since…

    • 861 Words
    • 4 Pages
    Better Essays
  • Better Essays

    1984 and Privacy

    • 893 Words
    • 4 Pages

    The National Security Agency, or NSA, is a top-secret agency believed to have the most advanced information vacuuming technology available, similar to the technology used to monitor people in 1984. "In the past, intercepting communications meant just that--copying a telegram mid-route, steaming open an envelope, or attaching alligator clips to the copper wires that connected every phone in the world."(Fordahl) These became extinct as we moved into the digital age; it is now easier than ever to access mass amounts of data. Many people fear that this is turning out to be a fast path to mass surveillance.…

    • 893 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    References: Department of Veterans Affairs. (2007). VA Handbook 6500. Washington, DC: US Government Printing Office. Retrieved February 20, 2013, from http://www.va.gov/vapubs/viewPublication.asp?Pub_ID=56…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Everything is now online, from banking to travel to social media. From the creation of these things, the NSA has also created new possibilities of following you and intruding in your life. For example, The NSA is now allowed to collect images and videos and subject them to facial recognition that is able to put a name to almost any face. There were laws that once prevented the NSA from accessing private company info but large companies have now allowed the government to access this information. The incorporation of better cameras and fingerprinting onto smartphones has also allowed the NSA to put unique biological traits to a person for identification. This is called biometrics. One of the worlds largest know biometric collections belongs to the department of the state. It is believed to have over 75 million photographs of Americans and foreigners with a growing rate of over 35,000 photographs per day. With all these records, the NSA and other agencies are developing ways of storing the data. Such storage is cheap and has wiped out the era of old clunky file cabinets and the use of…

    • 482 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The DHS set up the National Cybersecurity Protection System (NCPS) to detect and monitor potential malicious activity across federal agencies network systems. The NCPS is not meeting the systems objective of intrusions or deviations of abnormal network behavior. This system is not addressing the common security vulnerabilities of unknown signatures across the network. The NCPS is also failing at preventing intrusions in blocked e-mail domains. The DHS plans to deliver a new Cybersecurity System in…

    • 831 Words
    • 4 Pages
    Good Essays
  • Better Essays

    NSA's invasion of privacy

    • 1397 Words
    • 6 Pages

    Whether it is calling someone on your phone or online shopping on the computer, people are more connected than ever to the internet. However, a person might be oblivious to the fact that they are being watched using these technologies. The NSA (National Security Agency) is an intelligence organization for the U.S. to protect information systems and foreign intelligence information. Recently the NSA has been accused of invading personal privacy through web encryption, tracking, and using personal information for their own uses and without permission. The surveillance of the NSA produces unlawful invasion of privacy causing an unsecure nation.…

    • 1397 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The FBI has identified the most significant cyber threats to our nation as those with high intent and high capability to inflict damage or death in the U.S., to illicitly acquire assets, or to illegally obtain sensitive or classified U.S. military, intelligence, or economic information.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Argument Against NSA

    • 1450 Words
    • 6 Pages

    In 2005, government contractor, Edward J. Snowden, leaked classified documents to the public, revealing a classified government surveillance program headed by our own National Security Agency. This leakage confirmed that the NSA has stolen trillions of U.S. citizens’ emails, phone calls, and other information from both the Internet and our phones. It is understood that the collection and analysis of all information is part of the NSA’s mission to keep the United States safe, however, it’s troubling that our own government has to sneak around us. Regardless of whether or not U.S. citizens’ are committing illegal crimes, we should be concerned that the government and NSA steal our private information without our consent. As the government…

    • 1450 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…

    • 5724 Words
    • 23 Pages
    Better Essays
  • Good Essays

    Eo 13636 Summary

    • 334 Words
    • 2 Pages

    The EO 13636 despite its early criticisms has accomplished a lot over the past two years considering the monumental task it was designed to undertake. The criticism that mandated solutions will inevitably be too slow to effectively respond is still true, but as the EO gains ground with the cooperation of private industry by sharing information to help coordinate efforts to enhance cybersecurity and providing liability protection, it seems that a mass solution is taking shape. One can only imagine how long it will actually take and how well it will be able to be managed and regulated. But one also hopes that a serious attack to our infrastructure does not take place before we at least get something in place that is flexible and can be improved…

    • 334 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Private Sector Response

    • 551 Words
    • 3 Pages

    Even though the government is expected to ensure that the critical systems, which hold classified information, are secure and to respond to any damage, the private sector’s assistance is still needed. Working together with threat monitoring and detection, incident response, and active defense strategies will provide a more secure system. Therefore, the collaboration with the private sector will enhance significantly to protect valuable data and communications systems and to secure networks. In case of the information breach, the government will work with the private sectors to immediately contain the damage and prevent it from spreading, for example, by recovering records and shutting down the…

    • 551 Words
    • 3 Pages
    Good Essays