Saturday, May 25, 2019

Cyber Security

Securingacomputersystemhastraditionallybeenabattleofwitsthepenetratortriestofind theholes,andthedesignertriestoclosethem. Gosser Warf atomic number 18hasal stylussbeenagameofcatandmouse. Astechnologyincreaseswarhastoadapt withit. Warshaveevolvedfromacontestofstrengthtoashowofpotential. antecedentlywarswere foughtwithlargearmiesandwhomevercould almosteffectivelyutilizethemosttroopswithbetter trainingwonnowhowever,asinglepersonwitha thermonuclearbomb give the bouncedestroyacitywithinseconds.In the1980s,anewtechnologyappe ardtheinternet. Atfirsttheinternetwasjustawayforpeopleto conveybysendingtextfilestoeachother. Soonhowevertheinternetbecameapublicplaceto storeandaccess cultivation. As muchandmorepersonalandclassified selective informationgetsstored,itis onlynaturalthatpeopletrytofindawayto take awayinformationfortheir knowledgebenefits. Cyberskirmishes are in effect(p)nowbeingfoughtonlinetogetmoreinformation.BruceBerkowitzsaidTheabilityto collect,communicate,process,and encourageinfo rmationisthemostimportantfactordefining armed forces power. Berkowitzarguesthatweaponryand workforcethatusedtobethemaindeterminingfactor ofwarswillloseouttotheamountofinformationthatacountryhas. subtlewheretheenemies have classtheirtroops/weaponswillallowaguidedmissilesandunmanneddronestowreak havoc. Cheapcyberweaponssuchaswormsandtrojans(viruses)canneutralize courtly 2 eaponsasmissilesandnukes1. AccordingtotheDepartmentofHomelandSecurityOurdailylife,economicvitality,and demesneal warranterdependonastable,safe,andresilientcyberspace. We deponeonthis capaciousarrayof networkstocommunicateandtravel,powerourhomes,runoureconomy,andprovidegovernment services. Yetcyberintrusionsandattackshaveincreaseddramaticallyoverthelastdecade,exposing mediumpersonaland worryinformation,disruptingcriticaloperations,andimposinghighcostson theeconomy. 2 Unlikeanyothertechnologicaladvancement,informationtechnologyhaschangedhowwars arefought. Beforeinformationtechnologywarswerealwaysaboutkillingenemycom batants,now skirmishesareaboutthespeedofmaneuveringpacketsofinformation. Thereisnolongerafrontin warratheritisallaboutlittlebattlesbetweencounterinvasionandinvasion. Whilepreviouslya command amountwouldbeuntargetableunlessyou go aroundtheenemyarmies,noweachbattleonline isconsistedofitsownsecuritysystem. Whatweareseeingarethreatsagainstcriticalinfrastructure, saidCybersecurity technologicalJessicaHerreraFlaniganoftheMonument policyGroup. So,weare talkingaboutthreatsagainstourenergysector,thebankingsector,telecommunications,smartgrids, oilandgasbasically,allthecriticalassetsthatwehavethatoperateourdaytoday livelyarebeing impacted. Liketraditionalwar,cyberwarhastwobasictypesofattacksdisruptionandespionage. 1 ttps//www. cia. gov/library/centerforthestudyof cognition/csipublications/csistudies/studies/vol48no4/ new_face_of_war. html 2 http//www. dhs. gov/cybersecurityoverview 3 Disruptionattackscanbecomparedtotraditionalbattlesbetweentwoarmies. Attacksofthistypeis designedtohaltaspecifi c layorserver. Espionageattacksaregenerallyattacksforclassified information. Commonattacksincludedenialofserviceattack,viruses,wormsandtrojans.Countries suchasChinaandIndiaarerapidlyoutpacingtheUnitedStatesinthefieldofinformationtechnology. ShouldtheUnitedStatesnotbeabletokeepupwithChinaandIndiaininformationtechnology,these countrieswillbeabletostealinformationontheUnitedStatesinfrastructureandmilitarysecrets. WhatisComputerSecurity Cybersecurityisusedtodescribeasetofhardware,softwareandcodingdesignedtoprotecta nation/ bon tonsnetworks,computers, course of instructionsanddatafromanytypeofunauthorizedaccess.Thereare oppositetypesofofcybersecurityApplicationsecurityisspecifictodifferentapplications (programs)anddealswiththemeasuresthattheprogramtakes epochitisrunningtopreventerrors andhandleexceptionswhenthereisaflaw(anexampleofthiscanbetheWindowsBlueScreenof Death). Informationsecurityiswhenacompany/nationtriestodefendinformationortrade/military secretsfromunauthorizedaccess(anexampl eofthisiswhenGmailisencryptingitspasswords). DisasterrecoveryistheprocessinwhichaprogramtriestorecoverdataaftCyber SecuritySecuringacomputersystemhastraditionallybeenabattleofwitsthepenetratortriestofind theholes,andthedesignertriestoclosethem. Gosser warfarehasalwaysbeenagameofcatandmouse. Astechnologyincreaseswarhastoadapt withit. Warshaveevolvedfromacontestofstrengthtoashowofpotential. Previouslywarswere foughtwithlargearmiesandwhomevercouldmosteffectivelyutilizethemosttroopswithbetter trainingwonnowhowever,asinglepersonwithanuclearbombcandestroyacitywithinseconds.In the1980s,anewtechnologyappearedtheinternet. Atfirsttheinternetwasjustawayforpeopleto communicatebysendingtextfilestoeachother. Soonhowevertheinternetbecameapublicplaceto storeandaccessinformation. Asmoreandmorepersonalandclassifiedinformationgetsstored,itis onlynaturalthatpeopletrytofindawaytostealinformationfortheirownbenefits. Cyberskirmishes arerightnowbeingfoughtonlinetogetmoreinformation.BruceBerkowitzsaidTheabi lityto collect,communicate,process,andprotectinformationisthemostimportantfactordefiningmilitary power. Berkowitzarguesthatweaponryandmanpowerthatusedtobethemaindeterminingfactor ofwarswillloseouttotheamountofinformationthatacountryhas. Knowingwheretheenemies havegroupedtheirtroops/weaponswillallowaguidedmissilesandunmanneddronestowreak havoc. Cheapcyberweaponssuchaswormsandtrojans(viruses)canneutralizeconventional 2 eaponsasmissilesandnukes1. AccordingtotheDepartmentofHomelandSecurityOurdailylife,economicvitality,and nationalsecuritydependonastable,safe,andresilientcyberspace. Werelyonthisvastarrayof networkstocommunicateandtravel,powerourhomes,runoureconomy,andprovidegovernment services. Yetcyberintrusionsandattackshaveincreaseddramaticallyoverthelastdecade,exposing sensitivepersonalandbusinessinformation,disruptingcriticaloperations,andimposinghighcostson theeconomy. 2 Unlikeanyothertechnologicaladvancement,informationtechnologyhaschangedhowwars arefought. Beforeinformationtechno logywarswerealwaysaboutkillingenemycombatants,now skirmishesareaboutthespeedofmaneuveringpacketsofinformation. Thereisnolongerafrontin warratheritisallaboutlittlebattlesbetweencounterinvasionandinvasion. Whilepreviouslya commandcenterwouldbeuntargetableunlessyoubypasstheenemyarmies,noweachbattleonline isconsistedofitsownsecuritysystem. Whatweareseeingarethreatsagainstcriticalinfrastructure, saidCybersecurityexpertJessicaHerreraFlaniganoftheMonumentPolicyGroup. So,weare talkingaboutthreatsagainstourenergysector,thebankingsector,telecommunications,smartgrids, oilandgasbasically,allthecriticalassetsthatwehavethatoperateourdaytodaylivingarebeing impacted. Liketraditionalwar,cyberwarhastwobasictypesofattacksdisruptionandespionage. 1 ttps//www. cia. gov/library/centerforthestudyofintelligence/csipublications/csistudies/studies/vol48no4/ new_face_of_war. html 2 http//www. dhs. gov/cybersecurityoverview 3 Disruptionattackscanbecomparedtotraditionalbattlesbetweentwoarmies. Attacksofthistype is designedtohaltaspecificsiteorserver. Espionageattacksaregenerallyattacksforclassified information. Commonattacksincludedenialofserviceattack,viruses,wormsandtrojans.Countries suchasChinaandIndiaarerapidlyoutpacingtheUnitedStatesinthefieldofinformationtechnology. ShouldtheUnitedStatesnotbeabletokeepupwithChinaandIndiaininformationtechnology,these countrieswillbeabletostealinformationontheUnitedStatesinfrastructureandmilitarysecrets. WhatisComputerSecurity Cybersecurityisusedtodescribeasetofhardware,softwareandcodingdesignedtoprotecta nation/companysnetworks,computers,programsanddatafromanytypeofunauthorizedaccess.TherearedifferenttypesofofcybersecurityApplicationsecurityisspecifictodifferentapplications (programs)anddealswiththemeasuresthattheprogramtakeswhileitisrunningtopreventerrors andhandleexceptionswhenthereisaflaw(anexampleofthiscanbetheWindowsBlueScreenof Death). Informationsecurityiswhenacompany/nationtriestodefendinformationortrade/military secretsfromunauthorizedaccess( anexampleofthisiswhenGmailisencryptingitspasswords). Disasterrecoveryistheprocessinwhichaprogramtriestorecoverdataaft

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.