Preview

cyber security

Powerful Essays
Open Document
Open Document
3203 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cyber security
Cyber Threat and Military Challenges*

Introduction

History has shown that wars are won not only by the courage and strength of the men and women on the battlefield; but also, by the evolving technology adopted by the military. In the cyberspace, two distinct regimes emerge for the military. The first regime is the open network with its inherent risks and vulnerabilities which is essential for collaboration, information sharing, logistics etc. The second regime of closed network meets the demands of security, speed of operation and availability of information at the right time and place. To maintain confidentiality, integrity and availability, closed network is air gapped from open network. In addition to these networks, the military is also exposed to commercial off the shelf (COTS) hardware and software products for wireless, cellular phones, computers, networking equipment etc. Therefore, increased dependence of the military on civilian cyberspace capabilities have inherent risks and make them vulnerable to cyber-attacks by attack vectors which are prevalent in commercial/open cyberspace. This paper draws attention to current cyber threats and challenges that the military faces.

Cyberspace

Cyberspace includes not only the internet but also telecommunications, cellular phone technologies and wireless data services. The technologies involved, such as bandwidth, interoperability, processor speed, functionality and security vulnerabilities have evolved over time.

Design Flaw. Internet which is the major platform in cyberspace is loosely based on the legacy model of Open System Interconnection (OSI) in which most commonly, internet protocol (IP) is paired with Transmission Control Protocol (TCP) to form TCP/IP. The three way handshake of the TCP software for packet exchange is user-friendly but is one of the causes of flooding and other attacks.

SCADA. Increasingly today, supervisory control and data acquisition (SCADA) devices are being used to

You May Also Find These Documents Helpful

  • Better Essays

    Weaknesses are a symptom that is prevalent in today’s information technology realm, indicating vulnerabilities and risks that come hand and hand with shared networks like Aircraft Solutions. With enterprises exchanging an unprecedented level of information over open networks, the vulnerabilities and possibility of compromised security by unwanted intruders is swelling up into a new type of beast.…

    • 1105 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment

    • 4104 Words
    • 17 Pages

    However, there is growing interest in protocols and other mechanisms for use with novel telecommunications services. Next-generation value-added services are bound to introduce new vulnerabilities. The interaction between all these communications and security protocols, and the mechanisms used for distributed systems security, is fertile ground for both interesting research. Ways to enhance these protection tools to make sure our technology is safe from IT attacks are evolving all the time. The systems or measures used to protect a company system at present might not be of any use in the future as technology is always enhancing to higher levels. Telecommunication businesses tend to be comparatively adept at managing information security risks. And many are taking action to achieve an enhanced level of ongoing insight and intelligence into ecosystem vulnerabilities and dynamic threats. Companies like Celcom must be ready to invest in this expensive research so as to be able to aggressively compete in the intense telecommunication market and to be able to sustain itself in this industry. Today, information security is a discipline that demands advanced technologies and processes, a skill set based on counterintelligence techniques, and the unwavering support of top executives. As telecom operators become more similar to technology companies, they will face a raft of new challenges. Core practices like employee awareness and training, policies and tools to reduce insider risks, and protection of data, including intellectual property, will need to be updated. The confluence of mobility, cloud, and social networking have multiplied risks, yet few operators have addressed these threats or deployed technologies that monitor user and network activity to provide insight into ecosystem vulnerabilities and threats. These…

    • 4104 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Risk Assessment

    • 1733 Words
    • 7 Pages

    Networking security personnel play a major role in the security of anything and everything within the network. There are risks involved with keeping servers secured when people try to hack into the system. Cyber security personnel are responsible for keeping all the information secure that is on the network. Key roles that will play a big part in the completion of this project will pertain to network security and reliability and…

    • 1733 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…

    • 824 Words
    • 4 Pages
    Good Essays
  • Good Essays

    External cyber-attacks are on the rise and have become a real challenge for network administrators as well as network design planners to ensure their respective networks are protected from external attacks resulting in loss of website availability, confidential data, and internal processes critical to mission objectives. Cyber-attacks can cost companies large sums of unrecoverable revenue associated with site downtime and possible compromise of sensitive confidential data. It is imperative today’s corporate network is configured and prepared to protect itself from external cyber-attacks.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    References: Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S. Army Training…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    research paper

    • 2972 Words
    • 9 Pages

    Plunkett, D. A. (2013, March 14). Are We Ready To Defend Cyberspace? Webinar. Maryland. http://www.umuc.edu/securitystudies/events.cfm…

    • 2972 Words
    • 9 Pages
    Best Essays
  • Better Essays

    References: Bidgoli, H. (2006). Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations. John Wiley & Sons, 1008 pp. ISBN: 0470051205, 9780470051207…

    • 1068 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Cyber Threats

    • 1222 Words
    • 4 Pages

    Every day advances in technology happen. In the last few decades, computer technology has advanced past many technological barriers. Almost every aspect of everyone’s life has some dealing with computers in it. With all this being said, computer cyber threats are on a rise in every economy in the world. Cyber threats in America, have caused the government to try and control American internet access, have cost American’s a lot of money, and have everyone worried about the many infrastructures that are ran by the cyberspace, from being attacked.…

    • 1222 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    AI in cyber Defense

    • 2430 Words
    • 9 Pages

    Cyber security is a multidisciplinary field that is targeted on reduction of risks to the secrecy, affinity and integrity of data, information and resources in computer as well as in network systems. Modern systems have become much complex. Need for an intelligent, adaptive and multimodal solution raises here for which best suited approach is artificial…

    • 2430 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Evolution of Internet

    • 1501 Words
    • 7 Pages

    With the passage of time men has advanced in technology in fulfilling his needs and desires. After the mechanical evolution world is now living in evolution of Informational Technology. Mechanical evolution innovate means of transportation whereas Information Technology invented a new way of communication called Internet. Astoundingly communication can be done from anytime anyplace all over the world through internet. The number of people especially among young generations internet is gaining popularity exponentially. I aimed this research to understand its history, development, benefits to mankind and its role on communication. After the invention of computer in 1950, world got familiar with the concept of internet. Professor Kleinrock demonstrated sending of messages from University of California to Stanford Research Institute by using ARPANet (Advanced Research Project Agency Network). Advanced Research Project Agency (ARPA) developed and supported research projects in 1970 whose focus was on communication. In 1973 Robert Elliot ’Bob’ Kahn with Vint Cerf invented TCP (Transmission Control Protocol) / IP (Internet Protocol) which is still the heart of Communication protocol in Internet. In 1989 web technician created World Wide Web (WWW) and in 1990 it was opened for unlimited public use. Finally VOIP (Voice Over IP) was invented in 1990 and we are all enjoying the free calling software application on internet like Skype.…

    • 1501 Words
    • 7 Pages
    Better Essays

Related Topics