Preview

Redistan Cyber Attack

Best Essays
Open Document
Open Document
2339 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Redistan Cyber Attack
Cyber Policy

Student’s Name
Course Title
Instructor’s Name
Date

Redistan Cyber Attack
The botnet type of cyber-attack that targeted the US defense firm is espionage. The attack did not result in any physical damage but compromised significant technological secrets about a new surveillance. The features of this damage relate to espionage where a perpetrator gains unauthorized access to confidential information of government or another individual. The absence of tangible physical damage and casualties in the attack informs the decision that it was espionage1.
Response of US The first quick response of the US in this attack is to identify the sources of the attack quickly. They should shut down the system to audit the level of damage and prevent the attackers from accessing more information. After the identification of the attackers, they should impose financial sanctions against the perpetrators such as freezing their assets or prohibiting commercial trade. They should then audit their systems to detect the vulnerabilities to prevent future attacks2.
US Defense Against Cyber Attacks
The severity of the cyber-attacks on the US presents serious challenges, especially when the criminals stop operations and access the secrets of the homeland security. The attacks target key private and public institutions where most workers have limited information about cyber security. There is also significant difficulty interagency information sharing. The private companies and many informational infrastructures have weak protection against cyber-attacks. For the US to prevent future attacks such as espionage, it has to take the following measures.
Increase Public Awareness
Cybercrimes often occur because people are ignorant about how to detect them and take appropriate action to combat their negative effects. The national government should partner with educators to conduct public awareness of the risks associated with online activities and educate them how to combat



References: Forsyth, James W. “What Great Powers Make of It: International Order and the Logic of Cooperation in Cyberspace.” Strategic Studies Quarterly 7:1 (2013) http://www.au.af.mil/au/ssq/digital/pdf/spring_13/forsyth.pdf (accessed 13 May 2013) Hurwitz, Roger Libicki, Martin C., Cyberdeterrence and Cyberwar, RAND Report, Santa Monica: Rand Corp., 2009, http://www.rand.org/pubs/monographs/2009/RAND_MG877.pdf. (accessed 13 May 2013). Libicki, Martin C. “Cyberspace is Not a Warfighting Domain.” I/S A Journal of Law and Policy for the Information Society 8:2 (2012): 325-40, http://moritzlaw.osu.edu/students/groups/is/files/2012/02/4.Libicki.pdf (accessed 13 May 2013). Libicki, Martin C. “The Spectre of Non-Obvious Warfare.” Strategic Studies Quarterly 6:3 (2012): 88 - 101 http://www.au.af.mil/au/ssq/2012/fall/fall12.pdf (accessed 13 May 2013) Lin, Herbert Mandiant, APT1: Exposing One of China’s Cyber Espionage Units, (2013) http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf (accessed 13 May 2013) Michael N White House, International Strategy for Cyber Space: Prosperity, Security and Openness in a Networked World (May 2011) ONLINE http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cybe rspace.pdf (accessed 13 May 2013). White House, Cyberspace Policy Review ONLINE http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf (accessed 13 May 2013). White House, The Comprehensive National Cybersecurity Initiative ONLINE http://www.whitehouse.gov/sites/default/files/cybersecurity.pdf (accessed 13 May 2013).

You May Also Find These Documents Helpful

  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Career Advancement Opportunities for Cybersecurity Professionals. (2013, January 1). Retrieved January 1, 2015, from https://missioncriticalinstitute.org/cybersecurity-professionals/…

    • 1485 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Best Essays

    In the aftermath of the terrorist attacks of 9/11, securing the country has become a national priority. The events of 9/11 were the first attacks on the United States (U.S.) since Pearl Harbor which catapulted the U.S. into World War II. As of the writing of this paper, the U.S. has been engaged in the War on Terrorism for 13 years. During this period of time the U.S. has been kept free from terrorist attacks by changes to laws, technology, and investigative methods to combat terrorism internationally. Although there have been a number of changes to U.S. law and American citizens have been kept safe, the threat of terrorism has not abated. With the continued threat of terrorism to the U.S. and its citizens, there is a high probability that the U.S. will suffer another 9/11 type of event.…

    • 3080 Words
    • 13 Pages
    Best Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Homeland Security

    • 1096 Words
    • 4 Pages

    In the years since 9/11, homeland security has turn out to be frequently and generally identified as both a word and as a Federal department. However, a large amount has been learned since 9/11 concerning the array of further challenges we face. Hurricane Katrina strongly illustrates the general impact of weak preparedness and response in the face of severe natural disasters. Widespread international cyber attacks from some of the most sophisticated denial-of-service efforts to persistent and rising attacks on U.S. Government cyber systems reflect the increasing importance of securing the information systems that are the very lifeblood of so much of our critical energy, financial, health, commerce, and transportation infrastructure (U.S. Department of Homeland Security, 2010). Global criminal groups that have made stretching efforts to cross our borders with prohibited goods, currency, and trafficked persons which signifies an increasing threat to the prosperity, security, and quality of life to U.S. citizens at home and abroad. As we have seen with H1N1 influenza, the express worldwide spread of infectious diseases can produce great disruptions at home. Stopping these and further risks from threatening our nation has come to be essential to homeland security.…

    • 1096 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Americans are becoming more and more codependent on technology. The vast majority of homes in the United States have at least one home personal computer (PC) that is connected to the internet. Americans have gotten accustom to being able to access the internet from their homes. Banking, social media, video teleconferencing and business ventures are all examples of how the internet is being used. The availability of the internet and computers in homes have simplified lives in the United States, however this allows cyber-terrorist to have direct access to the most personal of information. Much like the attacks that took place on September 11th the average American is completely unaware of the vulnerabilities that lye waiting around every corner of cyberspace. Cyber-terrorism not only affects individuals, it can also affect the entire nation. The United States critical infrastructures are becoming more dependent on computer networks for there operations. If security is not stepped up terrorist may be able to disrupt or shut down critical support systems. Americans and American companies must educate themselves on the vulnerabilities that cyber-terrorism presents and begin to work toward securing our networks in the same manner as we do our borders.…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Digital security….the term is almost a paradox in that there is no such thing as security when it comes to secure computing. At best, threats to digital security can be lessened and sometimes prevented but there is no such thing as an impenetrable defense. Corporations are constantly plagued by computer viruses and hacker attacks are on the rise leaving corporate networks vulnerable. It is estimated that 90% of all businesses every year are affected by security breaches to the tune of some $17 billion. Beyond the enormous costs that can easily wipe out a company’s IT budget, there are far-reaching business repercussions. Day-to-day business operations can be disrupted, customers alienated and a Company’s once good reputation tarnished. With the emerging security threats from a Company’s insiders to the sophisticated cyber terrorist, security breaches are clearly on the rise.…

    • 1133 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Controversy Over Internet

    • 560 Words
    • 3 Pages

    We believe that exposure to all of this crime and issues is subjective to how much you get caught up in it. Most of these issues are easily avoidable considering the numerous ways to surf the internet in a safe manner. Schooling has provided class that which teach you the basics avoiding spam and scams. Some may argue that it is the responsibility of the government to control unsafe and disconcerting material online, but the fact of the matter is, it is the responsibility of the user to…

    • 560 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When we stand back and look at the various cyber threats that are currently being employed in the world, and attempt to prioritize those threats, you will quickly see that the most serious threat seems to emanate from a family of viruses called Advanced Persistent Threat; it is this virus type which seems to poses the greatest risk towards the United State. This is the type of threat that is currently being used against the United States by hostile governments around the world. However this is also the class of virus that it being used by the United States to conduct cyber operations against nations that pose a threat to the United States or its allies.…

    • 7229 Words
    • 29 Pages
    Good Essays
  • Good Essays

    Information Security

    • 11954 Words
    • 48 Pages

    References: Cho, A. (2008). University hackers test the right to expose security concerns. 322(5906):p.1322–1323. Science,…

    • 11954 Words
    • 48 Pages
    Good Essays