Cyber Attacks Research Paper

Great Essays
Chapter One
Introduction
As the information era takes a new shape with introduction of network and digital platforms of communication and mode of doing things, which has been adopted into many sectors such as our personal lives, military, business and even the government, this means that there is an abundance of information available right at our fingertips. But this however faces a serious and more deadly enemy which revolves around hackers that are increasingly posing threats to the digital networks. Warfare is also changing drastically as new and more modern forms of fighting war are been seen without necessarily engaging into the battlefield. For example, the recent American fighting tactics were by use of modern and remote viewing gadgets
…show more content…
in his research Cyber-Attacks: The New Front of Warfare a Growing Threat to U.S. Security 2011, says that cyber-attacks that have happened in the current days and those foreseeable in the future are an indication of the threat we face in regards to cyber systems vulnerability. Some of the allies associated with the U.S. such as in 2007 when Estonia was attacked could also very well indirectly have an outward effect on the national security of the U.S. Successive attacks on other countries leading to disruption either financially or in the national security may result in an explosive and negative effect towards the economy or might cause a shift in power balance from a global perspective. That is why the U.S. is taking initiative to assist countries attacked both from a military aid perspective and also financial aid because it is aware of the potential threat results. Since they U.S. has been quite dominant in the military sector over the years, it may see a shift in the way future warfare is conducted and this is one area that it is truly lacking. That is why the U.S. continues to modify it military presence to adapt to changing times thus enable it to defend its allies and itself against future threats and if recent events are anything to go by, then the art of warfare is truly becoming a more complex and dangerous …show more content…
in his A Short History of Computer Viruses and Attacks 2003, said that hacking activities of computer systems started as early as late 1970s which followed into the 80s as computer viruses and worms were developed that could attack computers and result in crashing of systems and softwares. In the 80s also saw the fast rise of hackers into the world as many would infiltrate computer networks and they would successfully code through security. It is reported that during the 80s and most specifically 1983 saw cyber hackers crack through government networks in the U.S. and they were reportedly using home based computers. It was in 1998, that over 500 computers belonging to the U.S. government and military sectors were taken over by hackers where this event was later known as “Solar Sunrise.” The attack was an indication to the government particularly the Department of Defense of the extent to which an attack could be executed by adversaries having better resources and skills. This was particularly worrying to the government because it showed how hackers could easily control and manipulate the country’s control and command center and if used together with military assault, this would be very disastrous. Fortunately for them, the attack was carried out by two citizens from the U.S. mainly teenagers and thus, were glad it was an inexpensive lesson on the relevance of cyber security to a

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    According to the Zertag video the three classes of cyber-attacks are intellectual property theft, attacks that disrupt our way of life and attacks that threaten the military’s ability to defend itself. The effects of intellectual property theft are that it will degrade our economic competitiveness. The effect of attacks that disrupt our way of life is attacked that disrupt our infrastructure like 9/11. After 9/11 Americans were shaken and the government cracked down on airport security, immigration, and the war of terrorism. The effect of attacks that threaten the military's ability to defend itself is that it will leave us vulnerable to other attacks, other countries, and more deaths of…

    • 111 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Carl Von Clausewitz

    • 541 Words
    • 3 Pages

    Carl Von Clausewitz’s definition of an act of war substantiates particular state sponsored cyber-attacks as acts of war. Clausewitz’s definition requires cyber-attacks to meet three elements to elevate to the level of an act of war. Categorization of the perpetrator to determine the intent and nature of their attack is imperative in determining whether a cyber-attack meets Clausewitz’s definition. John Stone correctly advocated in “Cyber War Will Take Place!” that an act of force isn’t necessarily an act of violence when determining whether a cyber-attack is an act of war.…

    • 541 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    (U) This is an analysis of how the Revolutionary People's Liberation Front (DHKP-C) can conduct cyber attacks on the United States or US interests. DHKP-C has the ability to conduct cyber terrorism on US interests. In 1978 the group was created with Marxist-Leninist ideologies. DHKP-C is a terrorist organization located in Turkey.…

    • 661 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    What is Cyber Terrorism? (Consumer View) When you say terrorism many people think of bombing and physical actions taken towards other people. You usually don?t think of the internet. Cyber terrorism is one of the largest points of attack in America, simply because people don?t think of their computer as a device that can physically harm them. But computers are the main way of taking care of sensitive documents that the government thinks are important to national security.…

    • 330 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Hacking Epidemic The U.S. shouldn’t retaliate in the cyber war because the people that try and retaliate may get hurt or blackmailed by the hackers. Another reason the U.S. shouldn’t retaliate is that it would be hard to live normally because a disaster would fall. Also they shouldn’t retaliate because the war could get so bad that families would have to move out of the U.S. I have one reason the U.S. should retaliate is because is a hacker helped you try and fix something like your computer or any other electronics you have that person could get all your information and could hack you. Some measures you can take at home to prevent someone from hacking in your computer is you can update your software.…

    • 161 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Attack Scenario • Goals: 1. Shadow brokers sought to gain monetary compensation by extorting governments and individuals 2. Sought to bring attention to the abuse of power it perceived the United States National Security Agency (NSA) was developing for spying on other nations. 3. Obtain notoriety on a global scale • Resources required: • Skills and/or training- 1.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Some organizations still use outdated machines because they cannot afford to upgrade. It is not in their budget, so Microsoft systems that run 2003??? May still be infected with the Conficker virus. Conficker affected Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems. It then patched the “hole” at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012).…

    • 1330 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Since the creation of the internet in the late 1960’s, it has expanded even more than it creators could have thought. What was once just used by the government and researcher to share information across the world has now become the driving force of society worldwide, we depended upon it daily. With this expansion we have also seen it become a growing concern for law enforcement agencies around the world; the reason being that criminals have moved their operations from the traditional forms of crime into crime that is based in the cyber world (cybercrime). One of these cybercrimes is hacking, since it has become a massive threat not just to the public and private sectors, but also to national security. With hacking becoming such a threat to…

    • 2201 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    The advent of the so-called “Internet of Everything” has dramatically changed the concepts of information, knowledge, and, most importantly, security. Security has been defined in primarily militaristic terms by the prominent realist theorists of the past. However, the issue of cyber security must be considered to fully understand the contemporary era of security. Furthermore, there is a distinct gender gap in the field of cyber security, which is relevant in the context of standpoint feminism, constructivism, realism. First of all, the security of states is usually thought to be concerned with material resources, military strength, and self-protection.…

    • 1064 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays