Preview

U.S. Plans for Cyber Attack Prevention

Good Essays
Open Document
Open Document
816 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
U.S. Plans for Cyber Attack Prevention
U.S. Plans for Cyber Attack Prevention
CMGT 441

U.S. Plans for Cyber Attack Prevention
Introduction
The improvements being done in technology touted to make lives and work easier also makes it easier for cyber-criminals to perform his or her nefarious deeds. Some of the most vulnerable and potentially damaging targets are critical infrastructures such as the energy grid and nuclear-power plants. To help combat this, the U.S. Government is launching a program dubbed “Perfect Citizen” to help safeguard those critical infrastructures as well as private companies. In this paper I will discuss the Wall Street Journal article on the Perfect Citizen project posted on the Wall Street Journal website.
Article
The Wall Street Journal (2010) website states “The federal government is launching an expansive program dubbed "Perfect Citizen" to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.” This program would be deployed and monitored by the U.S. Governments eavesdropping specialists, the National Security Agency (NSA). The NSA will rely on a series of sensors that will be deployed in high risk computer networks and that will be triggered by unusual activity that may be a prelude to cyber attack. The NSA will not, however, monitor the system on a persistent basis. The program is the brainchild of defense contractor Raytheon Corporation which recently won the classified contract estimated to be worth up to $100 million. This contract is said to be for the initial phase of the surveillance project. The Wall Street Journal (2010) website is quoted as saying “Some industry and government officials familiar with the program see Perfect Citizen as an intrusion by the NSA into domestic affairs, while others say it is an important program to combat an emerging security threat that only the NSA is



References: Gorman, S. (2010). U.S. Plans Cyber Shield for Utilities, Companies. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052748704545004575352983850463108.html

You May Also Find These Documents Helpful

  • Good Essays

    Eo 13636 Summary

    • 334 Words
    • 2 Pages

    The EO 13636 despite its early criticisms has accomplished a lot over the past two years considering the monumental task it was designed to undertake. The criticism that mandated solutions will inevitably be too slow to effectively respond is still true, but as the EO gains ground with the cooperation of private industry by sharing information to help coordinate efforts to enhance cybersecurity and providing liability protection, it seems that a mass solution is taking shape. One can only imagine how long it will actually take and how well it will be able to be managed and regulated. But one also hopes that a serious attack to our infrastructure does not take place before we at least get something in place that is flexible and can be improved…

    • 334 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    In t fid en tia l ity The CIA Triad Co n y rit eg Availability NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    References: Department of Veterans Affairs. (2007). VA Handbook 6500. Washington, DC: US Government Printing Office. Retrieved February 20, 2013, from http://www.va.gov/vapubs/viewPublication.asp?Pub_ID=56…

    • 1273 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    A Policy Brief of NSA Reform

    • 3654 Words
    • 12 Pages

    I. Introduction: Since the acknowledgment of abused power by the NSA by former NSA contractor, Edward Snowden, long debate about the constitutionality of the collection of private records of American citizens has ensued in the senate. As a result of this issue that has and can continue to transgress on the civil liberty of privacy by all persons and entities, The USA Freedom act has been created which seeks to limit and to regulate the power of US surveillance agencies to collect private information from third parties. The USA Freedom directly addresses issues that are included in the USA Patriot Act, an act that was created to combat and to create protection against the threat of terrorism, which was a fear that heightened in response to the 2001 September 11 attacks (Savage). While this bill proved necessary at the time, in the act, are provisions that overstep constitutional boundaries that go beyond the intention and framework of the original plan.…

    • 3654 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    The DHS set up the National Cybersecurity Protection System (NCPS) to detect and monitor potential malicious activity across federal agencies network systems. The NCPS is not meeting the systems objective of intrusions or deviations of abnormal network behavior. This system is not addressing the common security vulnerabilities of unknown signatures across the network. The NCPS is also failing at preventing intrusions in blocked e-mail domains. The DHS plans to deliver a new Cybersecurity System in…

    • 831 Words
    • 4 Pages
    Good Essays
  • Better Essays

    "The NSA 's New Spy Facilities Are 7 Times Bigger Than the Pentagon." Defense One. Web. 02 Sept. 2014. .…

    • 1348 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The 16 critical infrastructure sectors identified by the Department of Homeland Security (DHS) include; Chemical, Commercial facilities, Communications, Critical manufacturing, Dams, Defense industrial base, Emergency services, Energy, Financial services, Food and agriculture, Government facilities, Health care and public health, Information technology, Nuclear reactors, nuclear materials, and waste, Transportation systems, and Water and wastewater systems. Technological advancement, increasing use of the internet, coupled with the interdependencies of information technology had and continue to have a direct effect on critical infrastructure attacks. These attacks and threats unfortunately have grown and sophisticated level of cyberattacks…

    • 323 Words
    • 2 Pages
    Good Essays
  • Good Essays

    As NBS News puts it, "Carnivore [the software used to monitor citizens] uses a list of FBI-supplied keywords to sift through email (maybe everybody's email) to find suspicious references to call FBI attention to possibly nefarious conversations going on across the Internet". Using these systems, that the government places it creates a relatively safer environment, but also causes privacy and ethical issues. The measures that governments take to ensure the safety of their citizens comes at a cost to the citizen’s own rights and freedoms. Citizens in today’s society have a more powerful voice and use it to limit and/or prevent the loss of privacy. Other nation’s citizens are not as lucky.…

    • 1573 Words
    • 7 Pages
    Good Essays
  • Better Essays

    The government should worry citizens, by hiring people to hack into their lives. The National Security Agency, NSA, is “inside” everything from phones to major websites like Google and Yahoo. The NSA is responsible for code breaking and getting information from phones and the internet. The NSA has headquarters in the United Kingdom as well. They try to focus overseas instead of domestically to prevent any serious crime and to defend the UK’s economic interest. Because the NSA doesn’t trust its own U.S. citizens, violates the fourth amendment, and made programs to “hack” us, the NSA invades the privacy of citizens and should be stopped.…

    • 1637 Words
    • 7 Pages
    Better Essays
  • Good Essays

    This type of technology can also be used against the United States. “Chinese attackers place similar software in the computer systems of American Companies and industries and also government agencies,” says David E. Sanger. Who says that the NSA could use the same technology to put in our own personal computers at home? It hasn’t been proven that the NSA has done this domestically or have they? I do not want the NSA looking through my computer. Not that I have anything to hide, but I still do not want the see what I have. The article by Sanger also says,” NSA said its actions were not comparable to China’s.” What if they are lying? Again I do not feel comfortable with the NSA keeping track of my every move. They also have the technology to see people in person.…

    • 672 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Everything is now online, from banking to travel to social media. From the creation of these things, the NSA has also created new possibilities of following you and intruding in your life. For example, The NSA is now allowed to collect images and videos and subject them to facial recognition that is able to put a name to almost any face. There were laws that once prevented the NSA from accessing private company info but large companies have now allowed the government to access this information. The incorporation of better cameras and fingerprinting onto smartphones has also allowed the NSA to put unique biological traits to a person for identification. This is called biometrics. One of the worlds largest know biometric collections belongs to the department of the state. It is believed to have over 75 million photographs of Americans and foreigners with a growing rate of over 35,000 photographs per day. With all these records, the NSA and other agencies are developing ways of storing the data. Such storage is cheap and has wiped out the era of old clunky file cabinets and the use of…

    • 482 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Law Enforcement Paper

    • 1265 Words
    • 6 Pages

    The FBI’s efforts in combating terrorism included collecting, analyzing, and sharing information and critical intelligence with other federal agencies and departments. Some of these departments are the Central Intelligence Agency (CIA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) as well as other agencies across the country (Schmalleger, 2009). Some changes were made by the FBI as a result of September, 11, 2001. For example, the FBI has made modernization of its information technology (IT) systems a top-level priority. This is a multi-phased program code-named Trilogy. With Trilogy, the FBI can do three important things: First, the FBI has deployed a secure high-speed network that enables people in the FBI offices around the country to share data, including audio, video, and image files. Second, the FBI has given its agents and intelligence analysts more than 30,000 new computers that run several modern software applications. Third, the FBI has developed an IT infrastructure that enables secure communication with FBI intelligence partners (Grabosky,…

    • 1265 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The FBI has identified the most significant cyber threats to our nation as those with high intent and high capability to inflict damage or death in the U.S., to illicitly acquire assets, or to illegally obtain sensitive or classified U.S. military, intelligence, or economic information.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Argument Against NSA

    • 1450 Words
    • 6 Pages

    In 2005, government contractor, Edward J. Snowden, leaked classified documents to the public, revealing a classified government surveillance program headed by our own National Security Agency. This leakage confirmed that the NSA has stolen trillions of U.S. citizens’ emails, phone calls, and other information from both the Internet and our phones. It is understood that the collection and analysis of all information is part of the NSA’s mission to keep the United States safe, however, it’s troubling that our own government has to sneak around us. Regardless of whether or not U.S. citizens’ are committing illegal crimes, we should be concerned that the government and NSA steal our private information without our consent. As the government…

    • 1450 Words
    • 6 Pages
    Better Essays