How Do Cyber Attacks Affect The Military

Improved Essays
According to the Zertag video the three classes of cyber-attacks are intellectual property theft, attacks that disrupt our way of life and attacks that threaten the military’s ability to defend itself. The effects of intellectual property theft are that it will degrade our economic competitiveness. The effect of attacks that disrupt our way of life is attacked that disrupt our infrastructure like 9/11. After 9/11 Americans were shaken and the government cracked down on airport security, immigration, and the war of terrorism. The effect of attacks that threaten the military's ability to defend itself is that it will leave us vulnerable to other attacks, other countries, and more deaths of

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Jonathan, I liked that Professor Rosenzweig has brought up a few excellent points to make us think critically, rather than jump to conlclusions or provide us with his own opinon. His comparison of Stuxnet to the first nuclear bomb is a good example for this lecture. The unknown damages, consequnces, and fear are only a few of many concerns that spread around world when the nuclear bomb was tested. In Stuxnet's case, it is difficult to try and build a defense against something that is difficult to discover, trace, and stop, therefore the best defense is to highly protect the computer system and anything that is attached to…

    • 109 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    I agree that the comparison of the cybersecurity to the healthcare system is a great analogy, although not perfect. Professor provided examples where a cybersecurity breach and healthcare system are similar and could be treated in a similar way to stop or prevent a different outbreak. Even though most cyber-attacks are minor, there will time when all the information gathered from those small attacks that could be formulated into recipe of a major attack. Also, you pointed out that it is important to realize that it is impossible to prevent all and any cyberattacks, and that they evolve at a fast rate.…

    • 157 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    How Military Affects Us

    • 421 Words
    • 2 Pages

    The military protects us in numerous ways. Brave men and women give us freedom from oppression, protection, and a valiant effort to stop the war on terror. Now in more detail I’ll show you how the military provides for and protects us. Often times the militaries of countries are meant to oppress and rule nations.…

    • 421 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Bush administration was faced with a national security as the attack demonstrated how vulnerable to modern technology and the ability of some individual can inflict and cause fear and damage to America (Duelfer,…

    • 486 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Organizations will be left scrambling to throw bodies at problems. Those “bodies” won’t fare well, security will become even more insecure in corporate networks, and organizations will become revolving cyberdoors. Anyone daring to use the word “cyber” in any resume or social capacity will become pariahs. Corporate America and beyond, you created this mayhem. There is plenty of bodies able, capable, and willing of solving problems with regards to security, but you have become so blindly by shiny marketing…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    The aforementioned Stuxnet worm that delayed Iran’s nuclear capabilities by two years is used to support this claim. The author also supports this claim by claiming a cyber attack could potentially cripple an economy. Simply deleting data from banking systems could result in economic crisis. Harris cites an instance where the military planned to attack Iraq’s banking system prior to the 2003 invasion, however the military called off this plan because they feared the attack may accidentally spread to France’s banking system. This shows the nature of digital warfare is similar to that of physical warfare; an attack can have accidental effects on unintended targets.…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays