Essay On Zero Day

Great Essays
Many years ago, much of society may have envisioned a future with flying cars and robots that shared the Earth with humans. While this has yet to occur, technology is leaps and bounds beyond what it was imagined to be at this point. With technological advancement comes a necessity to secure it; and for some, exploit it. Zero day exploits employed for economic or military advantage; cyber crime, cyber terrorism and threats to SCADA systems; meta-data collected and used by the private sector and public sector; and vulnerability assessments for mobile devices in the BYOD environment may seem to have little in common. However, each comes with security issues, policy controls to be implemented, and human factors that influence the recommended policies. With so many aspects requiring security, the challenge is to recognize important issues, implement effective and comprehensive policies, and be mindful of how those policies are affected.
2. Zero Day Exploits Employed For Economic or Military Advantage
A zero-day exploit describes an attack that exploits a previously unknown vulnerability before a defense is launched or created (Porter, 2007). Such attacks can be of significant
…show more content…
Ensuring the security of the information systems associated with vital national infrastructure such as SCADA systems is of great importance to national security. The rapid rate in which technology is advancing creates a conundrum. As technology advances, it produces greater accessibility to information and increases efficiencies at home, as well as in SCADA associated organizations. Outdated policies and an organizational culture that does not limit the usage of technology such as removable devices, tablets, and mobile smart phones puts the SCADA organizations charged with protecting the nation’s essential services at great

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    John Parachini Case Study

    • 790 Words
    • 4 Pages

    This paper will also relate the threat of this type of attack with the risk management perspectives…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Physical access control, audit review: Unauthorized access to sensitive facilities could occur without challenge, during which time a malicious party may directly connect to the supervisory control and data acquisition (SCADA) system and potentially set up a more permanent and remote connection for ongoing unauthorized access at a later time. Physical access to organizational facilities is a security vulnerability if not control as unauthorized personnel may access critical or sensitive areas. 5. Audit review, analysis and reporting: Without formalized review and validation of logs, unauthorized users, applications, or other unauthorized events may be present in the system and operate in the industrial control systems network without detection. 6.…

    • 301 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    9/11 Day Essay

    • 685 Words
    • 3 Pages

    Tuesday, September,11,2001 for many this was a normal old Tuesday. But this wasn't any old Tuesday this was marked as one of the worst tragedy on American soil since the attacks on Peral Harbor. This day also shaped the way on how American respond to terrorist attacks by creating two new organizations Homeland Security an also the creation of the TSA and also this marked the day that American Troops being sent to Afghanistan an Iraq. On this Day a group of Al-Qade terrorists hijacked four planes with two of those planes were heading right to the World Trade Center in New York City in the business district of New York. These planes were all based at Logan Airport in Boston, Massachusetts.…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Unit 1 Assignment

    • 783 Words
    • 4 Pages

    COMPUTER ARCHITECTURE AND IMPLEMENTATION Assignment 1 Name: Bhargavi Bussu Student Id: 10000126759 Professor: Paul Wang 1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book. In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Annotated Bibliography: Mobile Telecommunications in the U.S. Kenny Anyikude March 16, 2017 Bowie State University In the area of mobile telecommunications, I’ve discovered growth trends, which will have an impact on the development of the telecommunications industry. These trends will impact the present and future development of mobile telecommunications. Security threats have become a growing trend; cybercriminals have evolved into new and dangerous forms to stay relevant (Olavsrud, 2015). Another trend I have come across is power line networking, which is wired network with hidden wires (Evans, 2014).…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Today's technology is evolving at an unprecedented rate making the use, and misuse, of cyberspace easily accessible to anyone with access to a computer, smartphone, and the internet. Many governments realize how invaluable of an asset the internet is and have integrated it as an integral part of their nation's infrastructure and society. Unfortunately, whether it be by way of an individual person or a national institution, it is not uncommon to have enemies' attempting to exploit weaknesses. Having an accumulated 18 years of service in the military; and seeing first-hand the integration of the internet for military communication and coordination, I have witnessed numerous cyber-attacks on our nation and individuals over the span of my military…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Too much investment on high technology can lead to failure to invest in other necessities such as military training, military police and linguists (37). Linguists are needed as a way to communicate with people of countries where a power has military presence such as the United States in Afghanistan. Hard power used in cyber information can do damage to physical targets in another country destroying the soft power that cyber information can create to attract citizens to that country. An example of this is when malicious software is used by modern companies to shut down processes such as the Stuxnet worm virus inserted into Supervisory Control And Data Acquisition (SCADA) systems that instructed Iranian nuclear facilities to shut down in 2010…

    • 1535 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays