Premium Essay

Cyber Attacks What Should America Do to Stop Them

In: Computers and Technology

Submitted By ewgilliam
Words 516
Pages 3
Cyberattacks: What Should America Do To Stop Them?
Eric Gilliam
Colorado Technical University

Cyberattacks: What Should America Do To Stop Them? In the past few years, Cyberattacks have increased more than any cyber expert could have expected. Hackers and nation state sponsored attacks have risen about forty eight percent in 2014. America needs to do something now, before it gets worse. If we do not find a way to put a stop to these Cyberattacks hacker could essentially destroy our financial infrastructure. If this was to happen there would be no plastic to use for payment. Cyberattacks are here to stay. We need the help from ethical hackers to police the Cyberattacks world. When you watch the news, you hear about Cyberattacks on a daily basis. What you probably did not realize is “Cyberattacks cost business about 2.7 Million dollars per business” (White, 2014) per business. Cyberattacks are increasing and it is something we all need to look at. When this article came out, there were about 117,339 Cyberattacks every day. Now Cybercriminals are targeting mid-range businesses because larger businesses have increased their security. Cyberattacks can take down anything hackers want to destroy. “The UK National Security Strategy says that there is real risk. Attacks in cyberspace can have a potentially devastating real-world effect. Government, military, industrial and economic targets, including critical services” (Ncube, 2016), for example, hospitals or transportation, such as railroads and airplanes If that is not enough; Cyberattacks can destroy the financial system. With most Americans using plastic for currency, a breakdown of the financial system would have devastating effects. America needs to balance technical with the non-technical technologies to lower the risk of information theft. Real time security discovery can lower the cost of…...

Similar Documents

Free Essay

Cyber in America

...thousands of people have misused use of internet and the computer with cyber-crimes. In Today's competitive world identity theft is increasing throughout the world. The main study of research is regarding identity theft in Internet technology. Well first and foremost, what is meant by the term 'identity theft'? A very short and simple definition for identity theft is stealing other people's personal details like Social security number, credit card details, Date of Birth etc. What are the criminals going to do with these details? Why they do that? What kind of technologies are they using to steal the other person's details? Is it becoming very dangerous nowadays? How is it possible to protect yourself from identity theft? In the UK, almost all of the people are using broadband services (BT Group Plc, 2006). The Internet is making everything easy for the consumer. Almost half of the population in the UK is using online banking, paying their bills, shopping and using the Internet to fulfil their day to day tasks. The Internet is a form of global communication throughout the world. Almost 60% percent of the people in the UK use online banking (BT Group Plc, 2006). It is quick, and reliable; however people are not aware of the threads in online banking. The majority of the people in the UK are becoming victims of online banking. Online business, internet auction, Phishing E-Mails, Trojans, and Man - in - the - Middle attacks, Easy Password, Spyware, Adware, Payment system and......

Words: 402 - Pages: 2

Free Essay

Cyber Attack Prevention

...Cyber-Attack Prevention As cyber-criminals become cleverer with the cybercrimes, more and more individuals are in danger of a cyber-attack. The threats become more intense and damaging as technology grows. Often times, home users think computing and surfing the Internet is safe when at home. It is a necessity to be aware of the prevention methods whether at home or at work. To further the comprehension of cyber-attack prevention, an article is chosen and an evaluation is the article. The evaluation of an article will include a stance on the quality of the material, selections of various aspects, descriptions of each aspect, reasons for an individual viewpoint, and an example. Article Summary Home users need to practice prevention methods when using the Internet at home. Cyber-criminals’ methods and targets have evolved (Damico, 2009). Several home users may not be aware that any connection to a network is networked activity and requires some measure of protection. According to the Damico (2009) article, a prevention system must identify and stop malicious attacks before they do damage and have a chance to infect a system. It is not only imperative to use prevention methods, but also it is imperative to understand prevention methods. Technology prevention methods will no longer be adequate to protect against the modern cyber-criminals of today. Material Quality The quality of the material is credible. The article is valid. The author uses more than one in-text......

Words: 722 - Pages: 3

Premium Essay

Cyber Attacks

...Cyber Security By Charles Jackson Strayer University Theories of Security Management CIS 502 Dr. Emmanuel Nyeanchi June 7, 2013 Table of Contents Abstract 2 NICE Strategic Plan 3 NICE Goal’s 3 Stockholders 4 NICE Outcome: 6 Professional Competency: 7 Conclusion: 7 References: 7 Abstract Cybersecurity has evolved with such quickness that it is challenging to capture all the moving parts. New threats to include old ones are being developed every day as do plans to defend against them. Electronic information is a critical part of our culture. It’s often said that electronic information created our way of life. No matter how far we’ve advanced with the age of new Technology, it remains a fact that cyberspace has a phenomenal impact on each of our lives. It’s extremely important for us to understand that we must have security in cyberspace just as we maintain security in our physical world. It’s very difficult...

Words: 1131 - Pages: 5

Premium Essay

Cyber Attacks

...Cyber-attacks over the recent years have caused strong stirs among corporations and governments enough to warrant the needed attention to fight them. A recent and more damaging attack is the dual attack’s that hit the Bitcoin Virtual currency systems, a decentralized p2p network-based virtual currency that is traded into US dollars and other currencies. The mode of these attacks was a DDoS attack (distributed denial of service). A DDoS attack is an attack in which a multiple of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. It works by flooding a web server with bad traffic enough to either shut it down or stop users from performing specific functions online, like making payment or making good on a bill. The motive behind a cyber-attack is taken very seriously to determine whether it is coming from another government, a hacker or a criminal. The attack on the bitcoin virtual system is suspected to be profit motivated, a way for the attackers to cause panic in the exchange then take advantage of the falling prices. The website of Bitcoin, instawallet was forced to shut down after hackers gained access to its database. Instawallet was notoriously insecure as it used a URL password mechanism for protection. . Perpetrators of DDoS attacks are usually nit caught due to nature by which the attack is initiated. There are a number of ways to prevent a DDoS attack. Most institutions, to prevent DDoS attacks, are......

Words: 406 - Pages: 2

Premium Essay

What Business Should Do to Restore Competitiveness

...What Business should do to Restore Competitiveness America’s global competitiveness is dropping and it would appear that the main reason for this is its weak economy. The political environment has three main perspectives as to who should be blamed for this or whose fault it is. The first would be that the national competitiveness is the responsibility of the policymakers of the business, rather than the business leaders themselves, who needs to concentrate on running their companies, the second would be that the companies should show loyalty to the country in which they run their business, the country which supports them. If the American jobs were to be moved overseas then the executives responsible for this would be considered traitors to the American economy. The third perspective is that the managers should be able to run their companies well. But firms would draw from the commons, which means that these firms should draw from the business environment in which they conduct operations. Business leaders have the capacity to affect the commons in which they draw. Also, if a firm were to improve on its commons this would lead to an increase in the profitability of the business. Therefore, these firms should opt to improve and develop these commons in order to gain more profitability in the long run. Competitiveness is of great importance in America; one of the reasons why this is so is because when a firm is considered to be competitive in America, it is already......

Words: 2066 - Pages: 9

Free Essay

Cyber Attack

...during a crisis. This is a case of a cyberattack against Sony Pictures Entertainment once on December 3, 2014 and another attach on December 8, 2014 was considered for the purpose of this research. These cyberattack shows how techniques are not just a strategic weapon to bring down societies or to terrorize societies. But it shows that attackers are getting increasingly comfortable with using cyberattacks and can quite easily gain access to consumer personal information, business information, and employee information and can bring a company to its knees. The recent attacks not only on Sony but also Home Depot, Target and others are raising concerns. What needs to be done? The attacks are becoming more frequent, more invasive and the attackers are being bold. Should there be collaboration between businesses to combat the rising issues? Will this change the way that others businesses work together? What role does the government have in protecting citizens and their right to privacy especially from foreign attackers? These issues are significant as they underline the element of crisis communication and collaboration. Introduction In the face of increasing business demands for the bottom line, growth, stock prices, and global economic pressures, businesses today have a lot to worry about. According to Ihab Hanna Salman Sawalha (Jorunal of Business Continuity & Emergency Planning Vol 7 number 4), “Resilience is defined as: the ability of people, households,......

Words: 1827 - Pages: 8

Free Essay

What Should Phil Do

...Question # 1 - Did Phil commit plagiarism? If so, what did he do wrong, and how could he have prevented this problem? Yes, Phil did commit plagiarism. According to the Academic Dishonesty and Plagiarism Policy, students are obligated to summarize, paraphrase, and use quotations to indicate that the content being used originated from another source. Phil failed to follow these guidelines when compiling his paper. Instead, he copied exact text without putting quotation marks around the material which is clearly defined as being dishonest. He could have prevented this problem by reading Professor Wemmick’s guidelines for the assignment before starting his paper which defines all aspects of plagiarism. If he took notes from the resources and then developed his own opinions instead of copying and pasting directly in his paper then he could have prevented this problem. In addition, Phil should have used quotes and cited the specific material he pulled from his resources. Question #3 - What are Phil's responsibilities? To whom is he responsible? What rules and guidelines should he follow? I agree with Trane that Phil was responsible for his work and allocated task within the assignment. To include submitting his paper in APA format and in accordance to Professor Wemmick’s guidelines. In addition, he was responsible for submitting his part of the assignment on time and without avoidable mistakes. I believe Phil could have avoided these errors by being organized and allocating......

Words: 577 - Pages: 3

Premium Essay

Cyber Attacks

...the subject in public, much as it gradually began to talk about drone strikes a few years ago. Admiral Rogers, who heads both the National Security Agency and its military cousin, United States Cyber Command, was answering questions about how the United States could deter attacks like the kind that struck Sony Pictures Entertainment. President Obama has said publicly that the attack originated in North Korea. When pressed, Admiral Rogers said that erecting ever-higher digital fences would never be enough, and that “we have got to broaden our capabilities to provide policy makers and operational commanders with a broader range of options. Because in the end, a purely defensive reactive strategy will be both late” and would become “incredibly resource-intense.” “So, I have been an advocate of, we also need to think about how can we increase our capacity on the offensive side here, to get to that point of deterrence.” In interviews as he came into office last year, Admiral Rogers identified creating some form of deterrence as his highest priority. At the time, he said, Chinese and other attackers who steal data from American companies “pay no price.” In the case of North Korea, the United States imposed some modest economic sanctions, and it is unclear whether an attack that slowed the North’s Internet connections was the result of American action or some other kind of action. In any event, the response was weak enough that many in the Obama administration......

Words: 591 - Pages: 3

Premium Essay

British Motorcycle Crossroad - What Nvt Should Do?

...British Motorcycle Crossroads – What NVT should do? The purpose of this document is to offer strategic alternatives to the management of NVT and to make a recommendation on how best to earn a return on capital. A number of strategies were explored including re-entering the low displacement market segment with a high volume approach. This was not pursued further due to the saturation of that market segment by Japanese manufacturers. Our recommended strategy is to maximise NVT’s strengths by focusing on premium quality finish and elegant style in the medium and high displacement class market segments. In addition, to reduce unit production costs by improving operations and supply chain management. British motorcycles traditionally had a reputation for premium quality finish, elegant styling, and high performance. Although performance has slipped in recent years NVT maintains a loyal customer base. NVT should reaffirm their position as a premium brand in the medium and high displacement market segments as these market segments have demonstrated the largest growth in recent years and offer the highest value per unit. Market research and an analysis of the competitive disadvantage of NVT with respect to Honda highlighted some key focus areas for NVT. The main competitive disadvantage of NVT compared to Honda in the 750cc range is the total cost per unit (72% higher), i.e. NVT require a higher retail price to achieve a profit. This is compounded by the low number of units sold......

Words: 650 - Pages: 3

Free Essay

Cyber Attacks

...Cyber Attacks on the Government’s Transportation Grid Breaches and Security Implications by Penetration of the Western Interconnection’s  Traffic Control System and its Effects on Modern Day Life  Year after year, a number of films are released involving computer hacking of some sort along with cyber-villainy. As entertaining as they are, the validity of these possibilities is not explored. Many of these films center revolve around a chaotic vehicle-related scene where a form of the government’s transportation grid is compromised. The breach typically involves traffic control. As the stoplights and streetlights are in a state known as gridlock, external hackers usually make the situation as unruly as humanely plausible. However, the very nature of this unfortunate scenario can only be determined once the backgrounds of the systems that control it are thoroughly studied.  The contiguous United States is divided into three main alternating current power grids.  The Western Interconnected System, or Western Interconnection, is the one applicable to those  of us living in California. The electric utilities functioning in this region are tied together,  operating at 60Hz. While the grid is currently electrically powered, research by the National  Renewable Energy Laboratory (NREL) in Colorado indicates the Western Interconnection can  handle higher levels of renewable energy, in a quest to implement alternative energy sources. If  integrated correctly, the NREL......

Words: 3038 - Pages: 13

Premium Essay

What Should I Do?

...What Should I Do? First off I would begin to reassure Kim that I understand that she has never been through a planning process before, so there’s no need for her to panic. I would then explain to her that the departmental plan is merely a written explanation on how to accomplish and to achieve the objectives discussed and agreed upon in last month’s meeting. I would then begin to tell her to utilize and incorporate her expertise of her 7 years as a sales specialist. She should deal directly with the warehouse clerks and get a printout of what time of the month or year sales is at its peak. I would first suggest that she juts down the specifics on what takes place daily in her department, and also I would suggest that other associates in that department compile the same thing and submit them to Kim. That way she will get the gist of what everyone in her department does and everyone would then be in agreement with that objective. Kim should also seek the previous manager for advice and expert advice if at all possible. I think that Kim’s initial reaction to the planning process is a usual one. Everyone if put into a new position would get cold feet. Even if you have had experience in and with a company for years, your new roll and what is expected in a promotion is new. No one knows what to expect until trained and it is okay to ask questions. Until she becomes familiar with what is expected of her, any new task will seem overwhelming, until she gets the hang of it....

Words: 281 - Pages: 2

Free Essay

Living in the Age of Cyber Attacks and Cyber Warfare

...Living in the Age of Cyber Attacks and Cyber Warfare UMUC   If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment of the Die Hard series, Live Free or Die Hard. While those movies had a profound impact on the lives of the characters in the script, the audience probably thought it was merely fiction, not fully based on fact. In Live Free or Die Hard, John McClain (played by the indefatigable Bruce Willis) is attempting to stop a domestic cyber-terrorist who is acting out on a vendetta against the United States. The cyber-terrorist is successful in launching an online attack to overload and destroy a power grid that left much of America’s East Coast in darkness. When I first saw this movie, I was curious if an attack like that was really possible; however, most people around me just labeled the movie as “Hollywood’s overactive imagination”. With cyber attacks literally having the ability to affect lives in a nanosecond, it is vital that everyone understand what cyber attacks entail, the impact of these cyber attacks on a domestic and international scale, and knowing what to expect in the future while living in a world dominated by virtual......

Words: 2352 - Pages: 10

Premium Essay

What Should We Do Now?

...To: Dante Sorella, CEO, Raydar Electronics Date: 25 April 2012 Subject: RFID Tags in Caps/Visors In regards to the implementation of RFID tags in the caps and visors, its strategic and ethical concerns, and proposed solutions, we are advising that Raydar should join in KK Inc.’s interest in tagging their caps and visors. However, much attention must be given to ethics and possible government regulations. Our analysis has factored in Kool Kid Inc.’s desire for an authentic brand and superior customer experience with Raydar’s current capabilities and future goals. We understood the strategic and ethical concerns to be as followed: • Ethics. o Internal and external individuals may question the ethics of tagging children’s clothing • Government Regulation. o Possible congressional bills restricting the use of RFID in clothing and requiring full disclosure with the use of RFID may be passed. • Reputation. o Possible tarnishing of the Raydar brand as a result of consumer privacy concerns may occur. • Financial Cost. o Research and development costs. o The cost to profits if a strong competitor enters the market. Value Control Much attention must be given to the protection of the customer and his/her private information. The following areas must be addressed to help ensure the success of the RFID tagging project, they are: • The database of customer private......

Words: 789 - Pages: 4

Free Essay

Cyber Attack

...Cyber Attack University of Phoenix Martese, Daniel, Terrence and Joe May 13, 2012 Mr. Thomas A. Maricle Introduction Cyber-attack is an attempt to undermine or compromise the function of a computer-based system, or attempt to track the online movements of individuals without their permission. These types of attacks can be undetected to the user and/or network administrator. Prevention At the time of this article writing, 86% of all attacks were aimed at home users. This article is from 2006, most likely the percentage is higher now. The article states that the home user does not take control and utilize their home firewall or antivirus software. To this end, I agree because most of my users that I have helped never opened their firewall or even heard of anti-virus. The author makes note what the difference between a detection and prevention system is. Prevention systems automatically detect and block malicious network and application traffic, while allowing legitimate traffic to continue through to its destination. A detection system just detects and would rely on the prevention system to act on it. The prevention system is said to block bad malevolent code and cannot block good code at the same time, while allowing for protection of newer and more advanced types of security threats. The users should get to know what......

Words: 496 - Pages: 2

Premium Essay

Review of Cyber Attacks

...“Targeted Cyber Attacks”, written by the site GFI.com and published as an eBook available at Help net Security. Targeted Cyber Attacks is an extensive, 25-page review of cyber attacks in a general sense, exposing the impact, extent of the problem, effectiveness of attacks, solutions and attack avoidance. It explains that the definition of a cyber attack is specifically when a company is attacked electronically for the purposes of gaining access to data or compromising functionality and causing denials of service. The paper starts off with a definition of those who are actually at thread for attack – EVERY organization. The paper’s position is that all organizations are vulnerable, whether they believe it or not, and that there is no target too large or too small that can be attacked. Visibility of the company, perception of the ease of attack, and hiding their vulnerability from the public all have nothing to do with whether or not an attack will take place. GFI explains how the actual extent of the problem is wide-ranged, consisting mainly of opportunistic (non-targeted) attacks such as Trojan horse programs, phishing scams, 419 scams, and mass-scanning for vulnerable services (which can transition to a targeted attack!). One test reported in the paper showed that an unprotected Windows-based system might be compromised by opportunistic attacks within 4 minutes of being connected to the internet. GFI then goes on to discuss the potential for targeted attacks. A......

Words: 1450 - Pages: 6