2,007
13
Essay, 3 pages (550 words)

Cyber attacks

Cyber Attacks Cyber attacks have become a potential menace to internal security of United s in today’s era of globalization. Today, USA is heavily dependent on “ Information Infrastructure”,
this includes information systems, networks, and communication systems. Since information
infrastructure is increasingly critical to daily affairs, it has become a growing target for
disruption and destruction by terrorsist movements and adversaries of USA. Various literatures
have documented the issue of security threat through cyber attacks.
An article written by Yochi J. Dreazen and Siobhan Gorman reveals that the US cyber infrastructure is vulnerable to attacks. The truth is “ it is struggling to keep pace with the growing number of attacks on its computer networks, potentially leaving key military and civilian systems vulnerable to overseas hackers” (Gorman, 2009). The armed forces also aired that the cyber defenses of the country are being challenged by sophisticated and well-organized efforts to steal classified information. Military men agree to US’ vulnerability to cyber attacks. Army Lt. Gen. Keith Alexander, who runs the National Security Agency said ” Id like to say that our networks are secure but that would not be correct. We have vulnerabilities.” (Gorman, 2009).
Cynthia G Wagner, in her article “ Countering Cyber Attacks”, reveals that the
“ information infrastructure” is at risk because it is so extensively networked; meaning that
damage in one spot launches a chain reaction of problems everywhere. And networked
computers are so integrated into every aspectof our lives that the damage would be felt almost
instantaneously. Specific likely targets include the energy sector, emergency response and
preparedness systems, financial services, telecommunications, and agriculture. She also
highlighted the fact that University of New Hampshire has initiated a new project of “ The Cyber
Threat Calculator” for the U. S. Departmentof Defense that will surely help identify potential
threats to cyber infrastructure and assess the level of danger they pose. The Cyber Threat
Calculator uses data entered for a particular organization, with values assigned to variables that
measure a potential attacker s intent and technological capability. The higher the number that the
calculator assigns to a possible attacker, the greater the threat. (Cynthia, 2007)
Since 2008, the effort of the government has been on building a culture of preparedness.
Government has focused on preparing effective strategies that could help in countering Cyber
Terrorism or Cyber Attacks from hackers of nation-states such as Russia and China that have a
mission to attain maximum know-how of US information infrastructure. (Anonymous, 2009)
The U. S government has also already designated a special military unit to address the threat of cyber attack. This unit is called Cyber Command (USCYBERCOM). This “ is primarily responsible for the protection of the defense and civilian networks of the United States and can also be deployed to mount an information warfare attack on its enemies” (Trends Updates).
Works cited
Bellavita, C. (2009). Changing Homeland Security: The Year in Review — 2008. Homeland Security Affairs , 5.
France-Presse, A. (2009, October 19). U. S. Gen. Urges More Effort Against Cyber Attacks. Defense News .
Gorman, Y. J. (2009, May 6). U. S. Cyber Infrastructure Vulnerable to Attacks. The Wall Street Journal .
Griggs, B. (2008, August 18). U. S. at risk of cyberattacks, experts say. Retrieved October 22, 2009, from http://www. cnn. com/2008/TECH/08/18/cyber. warfare/index. html
Trends Updates. (n. d.). RAND Suggests U. S To Stick To Cyber Attacks Defense. Retrieved October 22, 2009, from http://trendsupdates. com: http://trendsupdates. com/rand-suggests-u-s-to-stick-to-cyber-attacks-defense/
Lynne Rudasill, & Jessica Moyer. (2004). Cyber-security, cyber-attack, and the development of governmental response: the librarians view. New Library World, 105(7/8), 248-255.
Cynthia G Wagner.  (2007). Countering Cyber Attacks. The Futurist, 41(3), 16.
Anonymous. Cyber Attacks on U. S. Government Rise. (2009). Information Management Journal, 43(4), 7.

Thank's for Your Vote!
Cyber attacks. Page 1
Cyber attacks. Page 2
Cyber attacks. Page 3
Cyber attacks. Page 4

This work, titled "Cyber attacks" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Cyber attacks'. 23 December.

Reference

AssignBuster. (2021, December 23). Cyber attacks. Retrieved from https://assignbuster.com/cyber-attacks/

References

AssignBuster. 2021. "Cyber attacks." December 23, 2021. https://assignbuster.com/cyber-attacks/.

1. AssignBuster. "Cyber attacks." December 23, 2021. https://assignbuster.com/cyber-attacks/.


Bibliography


AssignBuster. "Cyber attacks." December 23, 2021. https://assignbuster.com/cyber-attacks/.

Work Cited

"Cyber attacks." AssignBuster, 23 Dec. 2021, assignbuster.com/cyber-attacks/.

Get in Touch

Please, let us know if you have any ideas on improving Cyber attacks, or our service. We will be happy to hear what you think: [email protected]