cyber security vulnerabilities

Best Essays
Cybersecurity Vulnerabilities Facing IT Managers Today

Darin Swan
University of Maryland University College
Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.
- Robert A. Miller and Daniel T. Kuehl

Connectivity in the Modern World
Today, computers connect us to our finances through online banking, mutual fund management, stock trading services, and a variety of other online applications that provide access to accounts twenty four hours a day. Beyond financial services, we have the ability to connect to a wide variety of information, including social media content such as Facebook, YouTube, and Twitter, as well as magazines, video games, and other Web 2.0 content. The interconnectivity of such systems has not only provided individuals with access to a wide variety of data, but now businesses have the ability to leverage the Internet as a part of their day-to-day operations. Whether it be human resources management, email and coordinated calendar systems, or sales tracking systems, the cloud offers opportunity to businesses for quicker, streamlined processes and potential cost savings. Furthermore, the government uses interconnected computer systems to manage public services such as energy systems, coordinate public transportation logistics, synchronize emergency services, run water treatment facilities, and



References: 2011 state of security survey. (2011, August 31). Symantec. Retrieved from http://www.symantec.com/connect/blogs/2011-state-security-survey Ashford, W Chen, T. & Walsh, P. J. (2009). Guarding Against Network Intrusions. In J. R. Vacca Computer and Information Security Handbook. Amsterdam: Elsevier. Cliff, A. (2001, July 3). Intrusion detection systems terminology, part one: A – H. Symantec. Retrieved from http://www.symantec.com/connect/articles/intrusion-detection-systems-terminology-part-one-h Coleman, K The Comprehensive National Cybersecurity Initiative. (n.d.) The White House, President Barack Obama. Retrieved from http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative Dhamankar, R., et al (2009, September) Efrati, A and Gorman, S. (2011, June 2). Google mail hack blamed on China. Wall Street Journal. Retrieved from http://online.wsj.com/article/SB10001424052702303657404576359770243517568.html FBI says hackers hit key services in three US cities Gottlieb, P. J. B., CDR. (2010). Cyberspace vs. cyber strategy. American Intelligence Journal, 28 (2), 18-25. Granger, S Gregg, M. (2006, June 9). Certified Ethical Hacker Exam Prep: Understanding Footprinting and Scanning. Pearson IT Certification. Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. Indianapolis, Indiana: John Wiley and Sons. Hassell, J. (2006, June 8). The top five ways to prevent IP spoofing. Computer World. Retrieved from http://www.computerworld.com/s/article/9001021/The_top_five_ways_to_prevent_IP_spoofing Hess, M Ispitzner. (2011, February 7). Book review – Social engineering. SANS (Securing the Human). Retrieved from http://www.securingthehuman.org/blog/2011/02/07/book-review-social-engineering-2 Jackson, D Kim, J. (2012, January 19). Many security breaches go unreported. Fierce Compliance IT. Retrieved from http://www.fiercecomplianceit.com/story/many-security-breaches-go-unreported/2012-01-19 Knickerbocker, B Lohrmann, D. (2012, January 4). 2012 Cybersecurity trends to watch in government. Government Technology. Retrieved from http://www.govtech.com/blogs/lohrmann-on-cybersecurity/2012-Cybersecurity-Trends-to-010412.html Libicki, M Libicki, M. C. (2009). The information environment. In America’s Security Role in a Changing World: Global Strategic Assessment 2009, 53-55. Lynn, III, W. J. (2010, September/October). Defending a new domain: The Pentagon 's cyberstrategy. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain Mallery, J Mateti, P. (2006). TCP/IP Suite. In Bidgoli, H. (Ed.), Handbook of Information Security. Bakersfield, California: John Wile & Sons, Inc. Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R Mick, J. (2011, June 19). Reports: Hackers use stolen RSA information to hack Lockheed Martin. Daily Tech. Retrieved from http://www.dailytech.com/Reports+Hackers+Use+Stolen+RSA+Information+to+Hack+Lockheed+Martin/article21757.htm Milevski, L McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill. Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R. & Murukan, A. (2003, June). Threats and countermeasures. Microsoft. Retrieved from http://msdn.microsoft.com/en-us/library/ff648641.aspx Montalbano, E Moore, R. (2005). Cybercrime: Investigating High Technology Computer Crime. Matthew Bender & Company. Security trumps secrecy in cyber fight-prosecutor (2012, January 12). Reuters. Retrieved from http://newsandinsight.thomsonreuters.com/Legal/News/2012/01_-_January/Security_trumps_secrecy_in_cyber_fight-prosecutor/ Sternstein, A Tanase, M. (2003, March 11). IP spoofing: An introduction. Symantec. Retrieved from http://www.symantec.com/connect/articles/ip-spoofing-introduction Editor Vacca, J Valacich, J. & Schneider, C. (2012). Information Systems Today: Managing in the Digital Word. Boston: Prentice Hall. Velasco, V. (2000, November 21). Introduction to IP spoofing. SANS (SysAdmin, Audit, Network, Security) Institute. Retreieved from ttp://www.sans.org/reading_room/whitepapers/threats/introduction-ip-spoofing_959

You May Also Find These Documents Helpful

  • Powerful Essays

    US Government. (March 5, 1999). Infrastructure Threats from Cyber-Terrorists. In . Retrieved September 11, 2010, from http://www.occ.treas.gov/ftp/bulletin/99-9.txt.…

    • 2458 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Wright, L. (2007, January 25). Who Are The Greatest Cyber Attack Threats To The United States? Retrieved February 15, 2010, from UNH Media Relations: Who Are The Greatest Cyber Attack Threats To The United States?…

    • 868 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Threats

    • 641 Words
    • 3 Pages

    Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents…

    • 641 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Canadian Press (2014, April 14). Computer hacking expert says more bad news to come…

    • 1067 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Crt 205 Final Project

    • 2361 Words
    • 10 Pages

    |Cyber Security Industry Alliance. "The Cybercrime Treaty Will Improve the Global Fight Against Internet Crime. "Opposing Viewpoints: Cyber |…

    • 2361 Words
    • 10 Pages
    Satisfactory Essays
  • Best Essays

    5. Goessl, L. (2012). Op-Ed: Nissan recently hacked, corporate hacking a growing issue. Available: http://digitaljournal.com/article/323723. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    US Department of National Security. (2006). The National Security Strategy of the United States of America. Washington DC: USDOS.…

    • 1546 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    According to, “Social Engineering for Security Attacks”, social engineering is a kind of advanced persistent threat that gains private and sensitive information through social networks or other types of communication (Nelson, 2016). The goal of social engineering is to stay inside of a social media account while undetected for a long period to steal private data (Nelson, 2016). Some targets of social engineering are government agencies, corporations, schools or high- profile users (Nelson, 2016). This type of threat has become increansingly popular in recent years as well as other threats to cybersecurity. Attackers are becoming more sophisticated and persistent, and are focusing on small attacks and high profile organizations.…

    • 109 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    spam and cyber attacks

    • 972 Words
    • 4 Pages

    United Nations , Internet , Internet Governance Forum , Cyberattack , Cyberbunker ,Spam , Spamhaus , Technology News…

    • 972 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This week I read “The Silent War”, which is an article written by James Bamford. This article is about the cyberwar that the US has been preparing for years. The articles states the resources available now to win the war, and what has been done so far to protect US interests. With the boom of the internet, the digitalization of the sensitive information, the increase of electronic communication, and the electronic monitoring of nuclear weapons, it becomes available to launch different types of cyberattacks. An example is given in the story about a cyberattack against the Iranian nuclear system with the collaboration of the Israeli. Also, the story gives a biography of the general Keith Alexander who led the National Security Agency (NSA) for…

    • 189 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Walsh, E. (2014, August 7). US Homeland Security contractor reports computer breach. Retrieved from Reuters: http://www.reuters.com/article/2014/08/07/us-usa-security-contractor-idUSKBN0G62N420140807…

    • 3225 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    web 2.0

    • 7126 Words
    • 29 Pages

    Butterfield, S. (2003). An article complaining about ‘social software’. Retrieved November 5, 2010, from http://www.…

    • 7126 Words
    • 29 Pages
    Powerful Essays
  • Best Essays

    Cybercrimes committed through Social networking 5 3. 4. 5. facebook. (2011). Privacy » Privacy: Privacy settings and fundamentals. Retrieved from http://www.facebook.com: http://www.facebook.com/help/?page=839 Finch, E. (2006). The Problem of stolen identity and the internet. Cullompton : Willan Publishing. Gross, R. & Acquisti, A. (2005). Information Revelation and Privacy in Online Social Networks. Proceedings of WPES '05. (pp. 71-80). Alexandria, VA: Association of Computing Machinery OECD. (2009). Online identity theft. OECD publications. Cifas. (2009, oct). The Anonymous Attacker. Retrieved from ttp://www.identitytheft.org.uk: http://www.identitytheft.org.uk/cms/assets/The_Anonymous_Attacker.pdf myId. (2011, april). How to Protect Yourself from Identity Theft. Retrieved from http://www.myid.com: http://www.myid.com/blog/how-to-protect-yourself-fromidentity-theft/ m86security. (2011). m86security. Retrieved from http://www.m86security.com: http://www.m86security.com safety web (2010, june 16). cyberstalking. Retrieved from http://www.safetyweb.com: http://www.safetyweb.com/cyberstalking Blake, M. (2011, june). Government to launch inquiry into 'outdated ' cyberstalking laws. Retrieved from http://www.independent.co.uk: telegraph. (2011). Social networks 'should do more ' on cyberstalking. Retrieved from http://www.telegraph.co.uk: http://www.telegraph.co.uk/technology/socialmedia/8630244/Social-networks-should-do-more-on-cyberstalking.html cyberstalking. (1999). CYBERSTALKING: A NEW CHALLENGE FOR LAW ENFORCEMENT AND INDUSTRY. Retrieved from http://www.justice.gov: http://www.justice.gov/criminal/cybercrime/cyberstalking.ht Haryani, H., & Yusof, F. B. (2010). Cyber Stalking: The Social Impact of Social Networking Technology. IEEE. International Conference on Education and Management Technology ncvc. (2011). Cyberstalking. Retrieved from http://www.ncvc.org: http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32 458 legal-dictionary. (2007, march). Child Pornography. Retrieved from http://legaldictionary.thefreedictionary.com/Child+Pornography: http://legaldictionary.thefreedictionary.com/Child+Pornography ost, S. (2009). child pornography and sexual grooming. cambridge university press. Edwards, l., & Waelde, c. (2009). Law and the internet. HART publishing.…

    • 2368 Words
    • 10 Pages
    Best Essays
  • Best Essays

    E Dominic Rushe (2011) ' FBI fights back against cybercrime’ 24/8 {online} (Accessed: 30/6/2013) available at…

    • 4912 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Today’s society is solely based and dependent on computer based systems. With the advent of computer technology, we have acquired many good things like online banking, online commerce, emails etc. Along with the advancements in technology comes the relentless pursuit to prevent criminal hacking. Criminal hacking affects big business as well as the individual. The modern ethical hacker is a person who attempts to penetrate a secured computer system in effort to learn how to further protect or repair weaknesses in a company’s already secure system. “According to the Sixth Annual Enterprise IT Security Survey released Monday, 67% of large companies with 5,000 or more employees reported one successful intrusion or more this year, as opposed to 41% in 2009.” (Messmer)…

    • 711 Words
    • 3 Pages
    Good Essays