Summary: Do We Need Better Cybersecurity

Improved Essays
Do we Need Better CyberSecurity?

A targeted cyber attack on government servers can cause a lot of nations secrets to be reveled which may lead to destruction of nation's foreign relations. Internet is the backbone infrastructure of todays government. Every country is developing and using Internet technology for voting ,education,security and banking . Today almost all government offices are connected by it. A recent example of cyber espionage is breach of the federal government’s background-check database - the office of personal management (OPM) where hackers stole information of 21.5 million people which has information of people applying for security clearances. The data also included fingerprints of 1.1 million Americans,Social Security numbers, phone numbers and addresses of 4.2 million
…show more content…
The victims in that attack included several members of Congress .This is not the only case of data breaches in 2009, the Chinese hackers breached Google's corporate servers gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government. This information can be used by spies. In 2009, Barack Obama stated that “cybersecurity is one of the most serious economic and national security challenges we face as a nation.” Introducing his new Comprehensive National Cybersecurity Initiative (CNCI), he declared that the U.S. digital infrastructure – “the backbone that underpins a prosperous economy and a strong military and an open and efficient government” – will be treated as “a national strategic asset” and that, “protecting this infrastructure

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    After the attacks of 9/11, nearly 263 government agencies were reorganized as well as the creation of the Department of Homeland security, which nearly doubled the intelligence budget from 2001 (Freedman, 2011). Much of the technology used in surveillance efforts is off-the-shelf and is lacking in innovation. Moreover, the technological boom in the private sector has afforded the Government many avenues in which to collect information on private citizen including social media, cell phone records, GPS information, financial records, medical information and other third-party services that are capable of storing gigabytes of information on an individual (Shamsi & Abado, 2011). This notion leads to the issues of that information’s security…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Edward Snowden Fed Up

    • 711 Words
    • 3 Pages

    Since the 9/11 Terrorist Attacks and the creation of the Patriot Act the United States government has been intruding in the personal lives of its’ citizens. The government barges in on large companies like Verizon to obtain personal information from our daily lives. The claim is that this inform ation that the government is collecting is for our safety, but what are they really keeping us safe from if terrorist attacks are still happening, domestic and nondomestic. How does the information of innocent citizens help find or determine future crimes? CitizenFour documents Edward Snowden’s perspective on the NSA spying scandal in which information of the government’s massive covert-surveillance programs was leaked.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Senate Finance Committee Chairman Ron Wyden Democrat from Oregon held a conference with tech giants Microsoft Google and others to gather information concerning the financial loss of those companies because to the their customer to understand that government forced them to turn over their private information causing many people to change their ways their information is given to those companies. The economic stability of the tech industry was compromised by the NSA and its…

    • 765 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    ¨Usually law enforcement agencies collect data on a suspect after they have been identified. This often resulted in missed opportunities, lost lives, just paving the way for only more destruction. But what if data could be collected in advance, before the suspect was even known? What if just the act of collecting data could result in the identification of completely new suspects? More than a few have pondered this question, just days after the Sept. 11th attacks on New York and the Pentagon, John Yoo, the Justice Department lawyer at the time, wrote an internal memo that argued that the government should use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies…

    • 806 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Jacob Klingbeil Mrs. Foust Honors English 12 12/5/2017 Motives and Methods of Terrorism In the past decade, terrorism has increasingly become more of a problem. With advances in technology, terrorists have found new ways to strike fear.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There are quite a few government and intelligence agencies including the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and also state and local law enforcement agencies. With modern day technology becoming so advanced, agencies must find new ways to stay ahead and on top of the security for the nation. The National Security Agency’s mass surveillance has expanded in the years since September 11, 2001. Many people happen to be against government monitoring only because they are unaware of how data is retrieved, analyzed, and stored by the government networks. The process is more than just collecting information from phone calls, emails, and other online communications.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    The permeation and diffusion of cyber responsibilities across different government agencies is to be expected based on the technological development of cyber. Cyber technology exponentially spread through every aspect and sector of society and government agencies were forced to integrate and assume cyber responsibilities just by the nature of the domain. This has resulted in several government agencies responsible to multiple title authorities having cyber under their…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    For example, as Obama is describing how 9/11 produce the issue that encounters how the U.S can defend the nation while ensuring people their civil liberties, he states, “Digital information and powerful supercomputers offers intelligence agencies the possibility of sifting through massive amounts of bulk data to identify patterns or pursue leads that may thwart impending threats” ( Obama ). By allowing…

    • 1264 Words
    • 6 Pages
    Superior Essays