Preview

Mutually Assured Destruction Pros And Cons

Good Essays
Open Document
Open Document
505 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mutually Assured Destruction Pros And Cons
Mutually Assured Destruction, or MAD, was originally based on the premise that two countries would agree not to use nuclear weapons upon each other as the result would be catastrophic. That has now expanded to the world of cyber as nation-states are transitioning to means of cyberweapons as opposed to kinetic attacks. This transition is taking place for a number of reasons: it is cheaper to obtain, easier to deploy, and the perpetrator is harder to detect by way of IP spoofing, masking and other sophisticated means.
The United States critical infrastructure sectors are at a higher risk of compromise due to cyberwarfare. The risk of any of these sectors in the United States either being comprised or destroyed will have a serious and lasting effect on the operations of the country as we know it. It can effectively cripple the nation if an adversary is successful in disabling just three or four sectors. “The cost-benefit ratio “levels the playing field,” especially in favor of Third World countries which lack considerable leverage in terms of exercising traditional military power;…” (Eun & Aßmann, 2014).
…show more content…
Imagine a day where a person cannot withdraw money from an ATM to pay for their groceries or rent; a hospital record destroyed or rendered in accessible and a patient is given medicine that they are allergic to; the electric grid in a medium sized leaving a great number of people without electricity, putting people who are on life support at risk. All of these scenarios may very well become a reality if a cyberattack were to target the financial, healthcare and public health, and energy critical infrastructure sectors. The 16 sectors are displayed below in Table

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Sarbane-Oxley Act of 2002

    • 3019 Words
    • 11 Pages

    Kochems, Alane. “Who’s on First? A Strategy for Protection Critical Infrastructure. May 5, 2005. Accessed April 9, 2009 from: The Hertiage Foundation website at http://www.heritage.org/research/homelandsecurity/bg1851.cfm.…

    • 3019 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Eo 13636 Summary

    • 334 Words
    • 2 Pages

    The EO 13636 despite its early criticisms has accomplished a lot over the past two years considering the monumental task it was designed to undertake. The criticism that mandated solutions will inevitably be too slow to effectively respond is still true, but as the EO gains ground with the cooperation of private industry by sharing information to help coordinate efforts to enhance cybersecurity and providing liability protection, it seems that a mass solution is taking shape. One can only imagine how long it will actually take and how well it will be able to be managed and regulated. But one also hopes that a serious attack to our infrastructure does not take place before we at least get something in place that is flexible and can be improved…

    • 334 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Before the ratification of the 14th and 15th amendments African Americans had almost no rights, and not to long before the 14th and 15 amendments were passed they were slaves. Even after the African American’s were freed they still had almost no rights, and in the south almost nobody recognized the few rights that African Americans did have. It was not until the 14th and 15th amendments were passed that African Americans started getting basic rights that all people should have. Before the 14th and 15ty amendments were passed African Americans had no rights, but when the amendments were passed they were granted full equality but then began to battle the oppression placed upon them by the state governments. The 13th amendment which freed all…

    • 779 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Crj 410

    • 443 Words
    • 2 Pages

    The national Infrastructure Protection Plan (NIPP) brings a new focus to international security cooperation and provides a risk- based framework for collaborative engagement with international partners and for measuring the effectiveness of international critical infrastructure and key resources protection activities. The NIPP provides the mechanisms, processes, key initiatives, and milestones necessary to enable the Department of Homeland Security (DHS), the Department of State, the Sector- Specific Agencies (SSAs), and other security partners to address international implications and requirements related to CI/KR protection. The NIPP and associated Sector-Specific Plans (SSPs) recognize that protection measures do not stop at a facility’s fence line or national borders.…

    • 443 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In the earliest part of the cold war the United States enjoyed a clearly superior nuclear force to the Soviet Union but eventually nuclear parity was achieved and a new phase of the cold war had started. Realizing their vulnerability each side began producing nuclear weapons at a furious rate in an attempt to stay ahead of the other. The United States adopted a policy called Mutual Assured Destruction, a.k.a. MAD where protection for the population was achieved by ensuring the capability to utterly destroy the attacker if attacked. (Wilde)…

    • 249 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The nuclear bomb is dangerous and scary weapon that really should have never been thought of or invented. Nuclear bombs have been the focal point of every country's scientists ever since World War II when the U.S. dropped them on Japan. Just seeing the death and destruction a nuclear bomb can cause to people and the environment just proves my point. Not one person should have the power to just be able to push a button and have the ability to tear another country to shreds.…

    • 399 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Willy Death Of A Salesman

    • 1069 Words
    • 5 Pages

    Throughout the years many have tried to analyze and interpret Arthur Miller's character Willy in the novel Death of a salesman, attempting to establish his real influences and manipulation of the plot and fellow character's outcome. After my studying of the novel I have come to the conclusion that Willy's character is both a victimizer and a victim. Willy's action influences his family's lives in various ways such as brainwashing his son Happy into pursuing his competitive and destructive desire to be "well-liked" and attain the "American dream", while he has a bipolar relationship with his other son Biff. Willy is a very dominate character in the play and although he desperately relies on his wife Linda, he is emotionally unavailable to…

    • 1069 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Jones, Joseph. "The Raven" And "The Raven": Another Source Of Poe's Poem." American Literature 30.2 (1958): 185. MasterFILE Complete. Web. 21 July 2015.…

    • 1048 Words
    • 5 Pages
    Powerful Essays