Cyber Security as a Threat to the USA Essay
Order ID 53563633773 Type Essay Writer Level Masters Style APA Sources/References 4 Perfect Number of Pages to Order 5-10 Pages
Cyber Security as a Threat to the USA Essay
Cyber, Security, Threat, USA, Essay
Cyberspace has the potential of becoming the theatres of warfare in the 21st century. Future battles will be diverse from the traditional ones that were fought on land, water and air. When a country initiates internet based and invisible force as an instrument of fight against another country it is argued to be a cyber-warfare.
Some of the features of cyber warfare may include hacking of government and organizations critical data, webpages, strategic controls and intelligences. In 2014 there was a six month long cyber-attack on German parliament and another example of the 2008 attack of the USA military computers.
Cyber security is therefore an issue that needs global urgency in the global media. Cyber security alludes to a framework whose primary focus is on the protection of computer programs, data, and networks (Swine, n.d.). Cyber security mechanisms protect organizational and personal data from unauthorized access, destructions, and unintended access.
Government agencies, militaries, and health care facilities, financial institutions, and many other organizations tend to gather, process, and store confidential information in their operating systems and networks. With the growing sophistication and escalations of the numbers of cyber insecurity cases such as hacking, cyber security issues remain as one of the most threatening risks facing the United States of America for various reasons, as discussed in the essay.
There have been multiple cases of data loss that have led to substantial adverse implications to the clients and organizations such as in the banking sectors in the United States. All the government agencies, including the defense forces, faces higher risks of data loss and theft of critical information or their critical data being accessed by unauthorized individuals and can be further used f to perpetrate crimes and unintended purposes.
One of the memorable attacks on the USA government infrastructure includes the SCADA attacks. The attackers accessed the frameworks of a seller of SCADA control frameworks and utilized the accumulated information to execute further assaults.
The gathered data could have been potentially utilized in tapping the utilization of the default ids and passwords to assault and devastate the Illinois water siphon frameworks (“Russian hackers behind first successful US SCADA system attack,” 2011). The water pump was remotely activated and burnt through a redundant system.
This attack was similar to the one in Massachusetts, which exploited bugs in the open software phpmyadmin. We cannot understate the impacts of data breaches at Equifax as data was stolen even from places that were believed to be most secure.
The data breach at Equifax led to the loss of data for millions of USA citizens, such as security numbers, credit card information’s, PINS, and credit information. The breach occurred for almost three months without being detected, with over 146 million people losing their critical data.
Netflix utilized AWS cloud administrations, with the two having created perfect connections (“9 Spectacular Cloud Computing Fails,” 2015). The Netflix spilling administrations were developing at a quicker rate than the firm capacity to keep up them with the accessible IT assets.
Amazon had noteworthy difficulties in its distributed computing administrations, which was the fundamental explanation behind Netflix to go down during the Christmas day. The Netflix blackouts were so broad advanced with numerous clients filling their objections, contending that amazon administrations were down as it affected such a significant number of individuals and seemingly setting the whole endeavor cloud development a few stages back.
Another significant cloud comes up short happened in Cloud Flare, which is a security and cloud getting administration. During the way toward overhauling the Cloudflare switches, which was done at the same time, the switch smashed.
As the firm was including a layer between 785 000 administrations and their clients to accelerate the traffic and relieve instances of ddos assaults and other security challenges, the entirety of the 785,000 sites were adversely affected.
The above are just examples that depict the fact that the United States of America is a significant target for cyber attackers. In the era of increased data mining and data explosion, most organizations are overwhelmed by massive information that flows through their information systems, with most organizations having inadequate mechanisms of guaranteeing safety for such data (“Cyber security essay for students and children,” 2019).
It is worth to note that most hackers are technology buffs and keep updating themselves with the emerging technologies and diverse aspects of the computers form programming to the coding to be prepared to hack any system.
Evolution and increased sophistication in the cyber-attacks such as ransomware strategies evolving can cost the US firm billions of dollars in case they are able el to access and kidnap an individual or organization database such as government agencies. Crypto-jacking whereby criminals are hijacking work computers to mine for Cryptocurrencies.
The United States is not immune to cyber-physical attacks as the hackers are increasingly targeting electrical grids, transport systems, water treatment facilities, and military departments, and so on. We cannot understate the dangers of state-sponsored attacks, which is a significant cyber security issue that faces the United States of America (Kali, 2019).
Besides the hackers seeking to make profits through access and theft of personal data, entire nations and states are using their cyber skills to infiltrate other governments and perpetrate attacks on their critical infrastructures.
State-sponsored attacks mainly target the government-run systems and infrastructures, such as in the security forces with the USA expected to face such a challenge form countries like China, which can significantly impact its government processes.
As the internet of things is turning out to be more ubiquitous, it is expected that more than 75 billion devices will be connected to the Iot by 2025. It is, therefore, insightful to argue that most of the transactions and operations in the developed nations, including the USA, will be done through computers, and hence cyber security will be the greatest threat that the countries will be experiencing.
People’s data will increasingly become vulnerable as medical care facilities, government agencies, education institutions, and business organizations abandon paperwork and embrace computerized data storage mechanisms (Brenner, 2013). Digitalization of transaction and government operations is providing the hackers with vast opportunities of exploiting any available vulnerabilities.
People are increasingly diverting from traditional crimes such as terrorism and armed robberies to smart means of achieving their goals. For instance, perpetuating a cybercrime would be viewed to be safer and compared to stealing physical commodities as individuals Ca part away with billions of dollars and remain anonymous and hence is attractive to most youths and elites (Brenner, 2013).
Cybercrimes can be done regardless of geographical barriers and police surveillances, making cyber security issues the next major challenge that the government will be facing in the near future. It would, therefore, be easier to engage in social engineering and hacking as the number of graduate’s increases with the increasing levels of unemployment.
The state government is struggling to hire enough and qualified experts who can assist in effectively curbing the threats of rising cyber insecurity. The shortage of skilled workforces in the government and organizations is a cause for alarm since the smart and digitized workforce is essential in combating the more sophisticated and evolving cyber security threats.
It would be critical for the state government to ensure that it takes measures to equip its workforce with the emerging technologies and data security mechanisms, which can aid in mitigating the imminent cyber threats that face the government infrastructures (Brenner, 2013).
There are multiple ways through which the state government can mitigate the rising dangers of cyber security issues, including ensuring that all data is encrypted, such as in the transit. Ensuring that the organizations are using the latest information communication systems such as computers that have modernized features.
There should be an effective defense against the advanced and persistent threats at multiple levels, which is possible through installations of multi anti-malware scanners, which will efficiently scan archives with various antivirus engines through combinations of signatures and heuristics hence increase capabilities of detecting more threats.
Through continuous monitoring of the devices for abnormal activities, the management would be enabled to detect unusual traffic through scanning with multiple antiviruses and an updated signature database that can detect viruses that were previously undetected (Swine, n.d.).
Regular penetration testing’s coupled with vulnerability assessments would be critical in gathering realistic inputs on the general security levels and offer insights on areas that need additional security improvements.
We cannot understate the criticality of the physical security control measure in mitigation of such threats which may include use of stronger passwords, restricting access only to specific areas surveillances, using intrusion detection systems, heat sensors and smolder sensors, testing coupled with strict policies on safeguarding critical information among employees.
In conclusion, obey security threats are on the rise as the numbers of graduates increase with increased levels of unemployment in the USA and other nations. Cybercriminal such as hackers is continually equipping themselves with emerging skills and technologies which make cybercrimes more complex.
As the world continues to embrace cloud computing services in the era of big data, cyber security will be the next big challenge as past events of data breaches in the United States offers insight that they can still occur again if appropriate security measures to safeguard data are not implemented. It is therefore advisable for the USA government to unite with other governments in fighting this common enemy since it is turning out to be a global pandemic.
9 Spectacular Cloud Computing Fails. (2015, July 15). Retrieved from https://www.informationweek.com/cloud/9-spectacular-cloud-computing-fails/d/d-id/1321305?Image_number=4
Brenner, J. (2013). Glass houses: Privacy, secrecy, and cyber insecurity in a transparent world. Penguin.
Cyber security essay for students and children. (2019, September 16). Toppr-guides. Https://www.toppr.com/guides/essays/cyber-security-essay/
Kali, K. (2019). Cyber security: A starter guide to cyber security for beginners, discover the best strategies for defense your devices, including risk management, social engineering, and information security.
Russian hackers behind first successful US SCADA system attack. (2011, November 21). Retrieved from https://www.infosecurity-magazine.com/news/russian-hackers-behind-first-successful-us-scada/
Swinhoe, D. (n.d.). The 15 biggest data breaches of the 21st century. CSO Online. Https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
QUALITY OF RESPONSE NO RESPONSE POOR / UNSATISFACTORY SATISFACTORY GOOD EXCELLENT Content (worth a maximum of 50% of the total points) Zero points: Student failed to submit the final paper. 20 points out of 50: The essay illustrates poor understanding of the relevant material by failing to address or incorrectly addressing the relevant content; failing to identify or inaccurately explaining/defining key concepts/ideas; ignoring or incorrectly explaining key points/claims and the reasoning behind them; and/or incorrectly or inappropriately using terminology; and elements of the response are lacking. 30 points out of 50: The essay illustrates a rudimentary understanding of the relevant material by mentioning but not full explaining the relevant content; identifying some of the key concepts/ideas though failing to fully or accurately explain many of them; using terminology, though sometimes inaccurately or inappropriately; and/or incorporating some key claims/points but failing to explain the reasoning behind them or doing so inaccurately. Elements of the required response may also be lacking. 40 points out of 50: The essay illustrates solid understanding of the relevant material by correctly addressing most of the relevant content; identifying and explaining most of the key concepts/ideas; using correct terminology; explaining the reasoning behind most of the key points/claims; and/or where necessary or useful, substantiating some points with accurate examples. The answer is complete. 50 points: The essay illustrates exemplary understanding of the relevant material by thoroughly and correctly addressing the relevant content; identifying and explaining all of the key concepts/ideas; using correct terminology explaining the reasoning behind key points/claims and substantiating, as necessary/useful, points with several accurate and illuminating examples. No aspects of the required answer are missing. Use of Sources (worth a maximum of 20% of the total points). Zero points: Student failed to include citations and/or references. Or the student failed to submit a final paper. 5 out 20 points: Sources are seldom cited to support statements and/or format of citations are not recognizable as APA 6th Edition format. There are major errors in the formation of the references and citations. And/or there is a major reliance on highly questionable. The Student fails to provide an adequate synthesis of research collected for the paper. 10 out 20 points: References to scholarly sources are occasionally given; many statements seem unsubstantiated. Frequent errors in APA 6th Edition format, leaving the reader confused about the source of the information. There are significant errors of the formation in the references and citations. And/or there is a significant use of highly questionable sources. 15 out 20 points: Credible Scholarly sources are used effectively support claims and are, for the most part, clear and fairly represented. APA 6th Edition is used with only a few minor errors. There are minor errors in reference and/or citations. And/or there is some use of questionable sources. 20 points: Credible scholarly sources are used to give compelling evidence to support claims and are clearly and fairly represented. APA 6th Edition format is used accurately and consistently. The student uses above the maximum required references in the development of the assignment. Grammar (worth maximum of 20% of total points) Zero points: Student failed to submit the final paper. 5 points out of 20: The paper does not communicate ideas/points clearly due to inappropriate use of terminology and vague language; thoughts and sentences are disjointed or incomprehensible; organization lacking; and/or numerous grammatical, spelling/punctuation errors 10 points out 20: The paper is often unclear and difficult to follow due to some inappropriate terminology and/or vague language; ideas may be fragmented, wandering and/or repetitive; poor organization; and/or some grammatical, spelling, punctuation errors 15 points out of 20: The paper is mostly clear as a result of appropriate use of terminology and minimal vagueness; no tangents and no repetition; fairly good organization; almost perfect grammar, spelling, punctuation, and word usage. 20 points: The paper is clear, concise, and a pleasure to read as a result of appropriate and precise use of terminology; total coherence of thoughts and presentation and logical organization; and the essay is error free. Structure of the Paper (worth 10% of total points) Zero points: Student failed to submit the final paper. 3 points out of 10: Student needs to develop better formatting skills. The paper omits significant structural elements required for and APA 6th edition paper. Formatting of the paper has major flaws. The paper does not conform to APA 6th edition requirements whatsoever. 5 points out of 10: Appearance of final paper demonstrates the student’s limited ability to format the paper. There are significant errors in formatting and/or the total omission of major components of an APA 6th edition paper. They can include the omission of the cover page, abstract, and page numbers. Additionally the page has major formatting issues with spacing or paragraph formation. Font size might not conform to size requirements. The student also significantly writes too large or too short of and paper 7 points out of 10: Research paper presents an above-average use of formatting skills. The paper has slight errors within the paper. This can include small errors or omissions with the cover page, abstract, page number, and headers. There could be also slight formatting issues with the document spacing or the font Additionally the paper might slightly exceed or undershoot the specific number of required written pages for the assignment. 10 points: Student provides a high-caliber, formatted paper. This includes an APA 6th edition cover page, abstract, page number, headers and is double spaced in 12’ Times Roman Font. Additionally, the paper conforms to the specific number of required written pages and neither goes over or under the specified length of the paper.
GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER
Do You Have Any Other Essay/Assignment/Class Project/Homework Related to this? Click Here Now [CLICK ME] and Have It Done by Our PhD Qualified Writers!!
Cyber Security as a Threat to the USA Essay
Tired of getting an average grade in all your school assignments, projects, essays, and homework? Try us today for all your academic schoolwork needs. We are among the most trusted and recognized professional writing services in the market.
We provide unique, original and plagiarism-free high quality academic, homework, assignments and essay submissions for all our clients. At our company, we capitalize on producing A+ Grades for all our clients and also ensure that you have smooth academic progress in all your school term and semesters.
High-quality academic submissions, A 100% plagiarism-free submission, Meet even the most urgent deadlines, Provide our services to you at the most competitive rates in the market, Give you free revisions until you meet your desired grades and Provide you with 24/7 customer support service via calls or live chats.