Preview

United States Policy Toward Cyber-Warfare

Good Essays
Open Document
Open Document
794 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
United States Policy Toward Cyber-Warfare
Cyber-war, the use of computers and the internet in conducting warfare in cyberspace, has been introduced as both an effective offense and defense towards modern warfare. Presently many countries have developed a policy towards cyber-warfare. The US, although a strong influence to the world, has yet to step up and create an effective policy towards warfare. One that should state what the military would do to respond to a cyber-attack, what defines a cyber-attack and what the government will do to take effective measures against a catastrophic attack. Along with that, what advantages does this new type of warfare have against modern warfare and is it worth the massive amounts of training and investments. Also, in what circumstances should a …show more content…

The US should come forth with an efficient policy discussing the matter directly and including its future uses of cyber-intelligence. Presently, cyber-attacks are uncommon; however they still pose a risk in the future of war and security of a nation. Every country should take measures in ensuring they will be ready for an attack. Because of this extraordinary hazard, the US should make considerable ventures in organizing methods to secure itself and its nation against it.
Three cyber security experts say, “US policies toward defending against cyber-warfare need to take a different approach than the government has against other forms of attack.” It would be difficult for the US to have a fight in cyber-warfare as it is “difficult to identify attackers, especially when some nations appear to be sponsoring private attackers.” If the US were to follow other nations with using private assailants, other nations could possibly see this as unethical and even malicious. As a nation, the US is presented as the country some look up to. Its image has to stay clean, or it could cause uproar with other nations. One problem that not only the US but other countries face is that there is no strict definition of a cyber-attack. Martin Libicki, a senior management scientist specializing in cyber-security said, “One problem with a cyber-warfare policy is the lack of definition of what constitutes an act of cyber


You May Also Find These Documents Helpful

  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The NMS serves to focus the Armed Forces on maintaining US leadership in a global community that is challenged on many fronts – from countering the threat of global terrorism to fostering emerging democracies. In this environment, US presence and commitment to partners are essential. Our Armed Forces, operating at home and abroad, in peace and war, will continue to serve as a constant, visible reminder of the United States role to protect common interests. "Our dedication to security and stability ensures that the United States is viewed as an indispensable partner, encouraging other nations to join us in helping make the world not just safer, but…

    • 1070 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Career Advancement Opportunities for Cybersecurity Professionals. (2013, January 1). Retrieved January 1, 2015, from https://missioncriticalinstitute.org/cybersecurity-professionals/…

    • 1485 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The terrorist attacks on September 11, 2001, were acts of terrorism against the United States and its allies. These attacks killed thousands of people, and left the United States in disbelief. Compared to previous history, international terrorism is different in many ways. We cannot win a war solely on military might. United States must fight terrorist organizations, networks, and anyone who wishes to put fear in people around the world. However, the United States must be prepared to respond and fight malicious acts and beliefs that threaten and destroy our American ways of life. In this paper, I will discuss how counter terrorism policy program works, implementation of laws and regulations, and logic diagram. Nevertheless, counter terrorism…

    • 330 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    In the aftermath of the terrorist attacks of 9/11, securing the country has become a national priority. The events of 9/11 were the first attacks on the United States (U.S.) since Pearl Harbor which catapulted the U.S. into World War II. As of the writing of this paper, the U.S. has been engaged in the War on Terrorism for 13 years. During this period of time the U.S. has been kept free from terrorist attacks by changes to laws, technology, and investigative methods to combat terrorism internationally. Although there have been a number of changes to U.S. law and American citizens have been kept safe, the threat of terrorism has not abated. With the continued threat of terrorism to the U.S. and its citizens, there is a high probability that the U.S. will suffer another 9/11 type of event.…

    • 3080 Words
    • 13 Pages
    Best Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    American Government

    • 328 Words
    • 2 Pages

    Contention 2) Cyber attacks are dilemmas that can be prohibited. Subpoint A: There are many ways for the United States to be attacked by terrorists other than the bombings itself, they are called Cyber Attacks. Cyber Attacks are an attempt by hackers to damage or destroy a computer network or system. These are attacks that can affect us deeply because Americans today are becoming more and more dependent on the internet. Though the government of America has much of it’s private information recorded on paper, yes but much is saved on the Internet as backup. With this, terrorist groups hire hackers or even study about computers to be able to launch a Cyber Attack that would help them steal and even look through the information to give them an advantage. With them knowing the key aspects of the government that would help them to bring even more danger upon not only the government but also the Citizens and other individuals that live here in our country. With cyber attacks it would lead to Cyber Warfare. Cyber warfare can be like any other war, just because it isn’t being fought face to face or weapons being involved it is of high danger either way. With this,the enemies can find ways to hurt us as a country, cause damage that would take years to recovers just like 9/11.Which would cause wars amongst the nations/countries. As Martin C. Libicki from the RAND corporation states “ Because much of what goes on in cyberspace is invisible, what one state perceives as normal operating procedure, another could perceive as just about anything.” With this he means even if one self may think what they put on the internet even with high security, others can use it for anything even if the person may think it’s harmful. The U.S. has been receiving cyber attacks from china which has leaded us to enormous losses to U.S. jobs states Senator Brown…

    • 328 Words
    • 2 Pages
    Satisfactory Essays