Preview

cyber security vulnerabilities

Best Essays
Open Document
Open Document
4737 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cyber security vulnerabilities
Cybersecurity Vulnerabilities Facing IT Managers Today

Darin Swan
University of Maryland University College
Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.
- Robert A. Miller and Daniel T. Kuehl

Connectivity in the Modern World
Today, computers connect us to our finances through online banking, mutual fund management, stock trading services, and a variety of other online applications that provide access to accounts twenty four hours a day. Beyond financial services, we have the ability to connect to a wide variety of information, including social media content such as Facebook, YouTube, and Twitter, as well as magazines, video games, and other Web 2.0 content. The interconnectivity of such systems has not only provided individuals with access to a wide variety of data, but now businesses have the ability to leverage the Internet as a part of their day-to-day operations. Whether it be human resources management, email and coordinated calendar systems, or sales tracking systems, the cloud offers opportunity to businesses for quicker, streamlined processes and potential cost savings. Furthermore, the government uses interconnected computer systems to manage public services such as energy systems, coordinate public transportation logistics, synchronize emergency services, run water treatment facilities, and



References: 2011 state of security survey. (2011, August 31). Symantec. Retrieved from http://www.symantec.com/connect/blogs/2011-state-security-survey Ashford, W Chen, T. & Walsh, P. J. (2009). Guarding Against Network Intrusions. In J. R. Vacca Computer and Information Security Handbook. Amsterdam: Elsevier. Cliff, A. (2001, July 3). Intrusion detection systems terminology, part one: A – H. Symantec. Retrieved from http://www.symantec.com/connect/articles/intrusion-detection-systems-terminology-part-one-h Coleman, K The Comprehensive National Cybersecurity Initiative. (n.d.) The White House, President Barack Obama. Retrieved from http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative Dhamankar, R., et al (2009, September) Efrati, A and Gorman, S. (2011, June 2). Google mail hack blamed on China. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052702303657404576359770243517568.html FBI says hackers hit key services in three US cities Gottlieb, P. J. B., CDR. (2010). Cyberspace vs. cyber strategy. American Intelligence Journal, 28 (2), 18-25. Granger, S Gregg, M. (2006, June 9). Certified Ethical Hacker Exam Prep: Understanding Footprinting and Scanning. Pearson IT Certification. Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. Indianapolis, Indiana: John Wiley and Sons. Hassell, J. (2006, June 8). The top five ways to prevent IP spoofing. Computer World. Retrieved from http://www.computerworld.com/s/article/9001021/The_top_five_ways_to_prevent_IP_spoofing Hess, M Ispitzner. (2011, February 7). Book review – Social engineering. SANS (Securing the Human). Retrieved from http://www.securingthehuman.org/blog/2011/02/07/book-review-social-engineering-2 Jackson, D Kim, J. (2012, January 19). Many security breaches go unreported. Fierce Compliance IT. Retrieved from http://www.fiercecomplianceit.com/story/many-security-breaches-go-unreported/2012-01-19 Knickerbocker, B Lohrmann, D. (2012, January 4). 2012 Cybersecurity trends to watch in government. Government Technology. Retrieved from http://www.govtech.com/blogs/lohrmann-on-cybersecurity/2012-Cybersecurity-Trends-to-010412.html Libicki, M Libicki, M. C. (2009). The information environment. In America’s Security Role in a Changing World: Global Strategic Assessment 2009, 53-55. Lynn, III, W. J. (2010, September/October). Defending a new domain: The Pentagon 's cyberstrategy. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain Mallery, J Mateti, P. (2006). TCP/IP Suite. In Bidgoli, H. (Ed.), Handbook of Information Security. Bakersfield, California: John Wile & Sons, Inc. Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R Mick, J. (2011, June 19). Reports: Hackers use stolen RSA information to hack Lockheed Martin. Daily Tech. Retrieved from http://www.dailytech.com/Reports+Hackers+Use+Stolen+RSA+Information+to+Hack+Lockheed+Martin/article21757.htm Milevski, L McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill. Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R. & Murukan, A. (2003, June). Threats and countermeasures. Microsoft. Retrieved from http://msdn.microsoft.com/en-us/library/ff648641.aspx Montalbano, E Moore, R. (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. Security trumps secrecy in cyber fight-prosecutor (2012, January 12). Reuters. Retrieved from http://newsandinsight.thomsonreuters.com/Legal/News/2012/01_-_January/Security_trumps_secrecy_in_cyber_fight-prosecutor/ Sternstein, A Tanase, M. (2003, March 11). IP spoofing: An introduction. Symantec. Retrieved from http://www.symantec.com/connect/articles/ip-spoofing-introduction Editor Vacca, J Valacich, J. & Schneider, C. (2012). Information Systems Today: Managing in the Digital Word. Boston: Prentice Hall. Velasco, V. (2000, November 21). Introduction to IP spoofing. SANS (SysAdmin, Audit, Network, Security) Institute. Retreieved from ttp://www.sans.org/reading_room/whitepapers/threats/introduction-ip-spoofing_959

You May Also Find These Documents Helpful

  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Kerr, D. (2012, August 7). Amazon addresses security exploit after journalist hack. Retrieved from http://news.cnet.com/8301-1009_3-57488759-83/amazon-addresses-security-exploit-after-journalist-hack/…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    |Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.…

    • 109 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    External cyber-attacks are on the rise and have become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to protect itself from external cyber-attacks.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Best Essays

    5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Good Essays

    The growth of e-commerce has been astronomical and its relevance to many businesses c=has increased. According to Forrester, e-commerce in the United States is going to reach $279 billion by 2015 (Indvik, 2011). This includes all electronic financial transactions. A 12.6% increase to $176 billion in 2010 has been fueled by an increase in Internet connected devices such as smartphones, tablets, combined with new e-commerce models—such as NetFlix, Groupon, etc. The consumer appears to be the driving force behind the financial boom of e-commerce.…

    • 6545 Words
    • 27 Pages
    Good Essays
  • Powerful Essays

    US Department of National Security. (2006). The National Security Strategy of the United States of America. Washington DC: USDOS.…

    • 1546 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Cyber Warfare

    • 896 Words
    • 4 Pages

    Cyber warfare is thought of by some as, “actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption,” (Clarke, 2010). Cyber warfare has also been called, “the fifth domain of warfare,”(Cyberwar: War in the Fifth Domain, 2012). Cyber warfare is a scary and unsettling situation for all nations around the world. The Pentagon even formally declared this type of warfare to be just as critical to our nation’s defense as any land, sea, air, or space operations.…

    • 896 Words
    • 4 Pages
    Better Essays
  • Good Essays

    spam and cyber attacks

    • 972 Words
    • 4 Pages

    United Nations , Internet , Internet Governance Forum , Cyberattack , Cyberbunker ,Spam , Spamhaus , Technology News…

    • 972 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Threats

    • 641 Words
    • 3 Pages

    References: Cyber terrorism Testimony Before the Special Oversight Panel on Terrorism, Committee on Armed Services, U.S. House of Representatives by Dorothy E. Denning of Georgetown University - May 23, 2000 - http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html…

    • 641 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    web 2.0

    • 7126 Words
    • 29 Pages

    Butterfield, S. (2003). An article complaining about ‘social software’. Retrieved November 5, 2010, from http://www.…

    • 7126 Words
    • 29 Pages
    Powerful Essays
  • Best Essays

    E Dominic Rushe (2011) ' FBI fights back against cybercrime’ 24/8 {online} (Accessed: 30/6/2013) available at…

    • 4912 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Information Security

    • 11954 Words
    • 48 Pages

    References: Cho, A. (2008). University hackers test the right to expose security concerns. 322(5906):p.1322–1323. Science,…

    • 11954 Words
    • 48 Pages
    Good Essays