Preview

Why Computer Scientists Should Care About Cybersecurity?

Satisfactory Essays
Open Document
Open Document
356 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Why Computer Scientists Should Care About Cybersecurity?
Lin, H. (2012). Why computer scientists should care about cyber conflict and U.S. national security policy. Communications of the ACM; Vol. 55 Issue 6, p41-43, 3p. DOI: 10.1145/2184319.2184334
This article discusses why computer scientists should be aware of cyberconflict and U.S. National Security policies regarding cyberconflict. It presents information on cyberterrorism, espionage, and the cyberattacks reported by Computer Network Emergency Response Coordination Centers in order to attribute the importance of cybersecurity. Herbert Lin has published many articles on cyberconflict with the majority published in scholarly journals. The authors' recommendation seems unbiased on the topic and presents the notion that voice of computer scientists can help policymakers make more informed decisions.
This article was found in Business Source Complete.
Power, R. (2000). Tangled Web : Tales of Digital Crime From the Shadows of Cyberspace. Que.
Denning, P. J., & Denning, D. E. (2010). The Profession of IT Discussing Cyber Attack. Communications Of The ACM, 53(9), 29-31. doi:10.1145/1810891.1810904
This article was found in Business Source Complete.
LUKASIK, S. J. (2011). Protecting Users of the Cyber Commons. Communications Of The ACM, 54(9), 54-61. doi:10.1145/1995376.1995393
This article was found in Computers & Applied Sciences Complete.
Ayofe, A., & Irwin, B. (2010). CYBER SECURITY: CHALLENGES AND THE WAY FORWARD. Computer Science & Telecommunications, 29(6), 56-69.
This article was found in Social Sciences Citation Index.
Lin, H. (2012). A virtual necessity: Some modest steps toward greater cybersecurity. Bulletin Of The Atomic Scientists, 68(5), 75-87. DOI: 10.1177/0096340212459039
This article discusses the two cyber operations: offensive and defensive involved in cyberattacks over critical infrastructure. It reveals several approaches to mitigate cyberthreats over critical infrastructure and information technology targets. The author, Herbert Lin, has

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Csia 301 - Syllabus

    • 4678 Words
    • 19 Pages

    Welcome to Foundations of Cybersecurity CSIA 301, a hybrid course. My name is Professor Nancy M. Landreville and I have been teaching here at the University of Maryland, University College since February 2007. My phone number is (301) 401-0144. You may contact me by phone any evening during the week (Monday - Friday) from 7:00pm - 9:00pm. You may email me at any time at nancy.landreville@faculty.umuc.edu . I encourage you to use the private messaging area rather than the faculty email address. This will facilitate faster response to your course questions. I will respond to your email within 24 hours from receipt of your email. Please place the name of the course in the subject line so I know the email is from one of my students. I check email every day from my students. I encourage you to contact me with any questions about the course, require that you contact me for extenuating circumstances for late work, and meet with me online for any required conferences that are held during the course. We will meet in the online chat room at least once this semester to discuss the midterm and once this semester to discuss your final assignment. This is in addition to your required face-to-face attendance each week for eight weeks.…

    • 4678 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…

    • 299 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Throughout Mark Twain’s Adventures of Huckleberry Finn, the reader is given glimpses of Southern society along the banks of the Mississippi. Huck’s experiences of Southern life vary greatly depending on his trip ashore, but one theme that is apparent is desperation and poverty contrasted with the aristocracy of rich plantation owners. Huck witnesses violent murder multiple times, both from the poor and destitute and the rich. Twain seems to poke humor at the fact that the aristocratic Sheperdsons and Grangerfords kill each other over a forgotten rude while the more poor characters use violence to try and increase their rank in life. Twain uses Jim and Huck’s flight from their own enslavers as a backdrop to discuss poverty throughout the South. The marxist critiques of Southern life become apparent in Twain’s writing due to both Huck and Jim fleeing a product of capitalism, issues of violence and desperation involving poverty and the rich, and the way Huck’s conscience is molded by religion and society to keep Jim enslaved in the chains of a capitalist society.…

    • 914 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Bibliography: U.S. Department of Homeland Security. (n.d.). Cyber-Security. Retrieved from Department of Homeland Security: http://www.dhs.gov/cybersecurity…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Penal Reform Paper

    • 1952 Words
    • 8 Pages

    2 INTRODUCTION What’s the problem? 2 MODEL How are we going to approach it? 4 DATA Observations. 5 RESULTS What did we find? 6 EXTENSIONS Quadratic and interactive relationships. 7 CONCLUSION What does it all mean? In Depth Statistical Analysis…

    • 1952 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Imagine a day where a person cannot withdraw money from an ATM to pay for their groceries or rent; a hospital record destroyed or rendered in accessible and a patient is given medicine that they are allergic to; the electric grid in a medium sized leaving a great number of people without electricity, putting people who are on life support at risk. All of these scenarios may very well become a reality if a cyberattack were to target the financial, healthcare and public health, and energy critical infrastructure sectors. The 16 sectors are displayed below in Table…

    • 505 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The growth of e-commerce has been astronomical and its relevance to many businesses c=has increased. According to Forrester, e-commerce in the United States is going to reach $279 billion by 2015 (Indvik, 2011). This includes all electronic financial transactions. A 12.6% increase to $176 billion in 2010 has been fueled by an increase in Internet connected devices such as smartphones, tablets, combined with new e-commerce models—such as NetFlix, Groupon, etc. The consumer appears to be the driving force behind the financial boom of e-commerce.…

    • 6545 Words
    • 27 Pages
    Good Essays
  • Best Essays

    Corporate Espionage

    • 2258 Words
    • 10 Pages

    With the increase in influence of global economies companies have become increasingly knowledge based. As businesses continue to increase their online data storage the ability to keep vast amounts of data online has increased the risk of data leakage and theft. The crime of corporate espionage is a serious threat which has increased along with the integration of technology into business processes. This paper has been written with the objective of providing insight into the crime of corporate espionage including discussion of the problem, offenders and motive, and basic protection measures.…

    • 2258 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    analytics to make better security decisions, as well as understand the forces that shape the security…

    • 527 Words
    • 1 Page
    Satisfactory Essays