StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Dissecting a Cyberwarfare Weapon - Essay Example

Cite this document
Summary
From the paper "Dissecting a Cyberwarfare Weapon" it is clear that the government officials should use the authority bestowed on them by the people to merge with the private sector so as to comprehensively offer cybersecurity that can respond to cyber-attacks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Dissecting a Cyberwarfare Weapon
Read Text Preview

Extract of sample "Dissecting a Cyberwarfare Weapon"

Dissecting a Cyberwarfare Weapon Introduction Cyberspace security and the concepts of cybersecurity strategies have attracted unprecedented concerns in over the last decade. Cyberwarfare refers to a political motivation that employ unethical hacking, sabotage and unforeseen espionage. It is a new form of informational warfare that could prove detrimental in the future of any nation or even an organization. In the wake of modern technology, several issues concerning privacy and safety of the information have posed debates across the information technology experts and the security system including United States Homeland Security team. Today, there are several areas of security concerns as the cyberwarfare rages across social and political domains within and outside any particular nation. Cybersecurity is a critical component of every aspect of organizational and national security. According to the McAfee internet security company 2007 annual report, it projected that around 120 countries were developing various mechanisms of developing internet as a new mode of the weapon. The target of this technology warfare includes other governments, financial markets and internal security details. By 2008, there were reports that China was harnessing its internal talents to boost its internet offensive and defensive capabilities against the United States. Besides, there was a report that China had successfully conducted security espionage between 1995 and 2008 with reasons that remain largely unknown (Jacobson and Patricia 98). In addition, diplomatic cables continue to highlight serious concerns on the China perceived cyberwarfare against the security system of U.S. In addition, United States growing concerns on the need to enhance internet security is informed by the various reports, including Keith Alexander reports to the senate security committee on the computer network warfare. The recently formed USCYBERCOM body has also expressed its concerns on the rising cyberterrorism as a new platform in cyberwar (Langner 49). In the report, the concern raised includes how systems could be hacked without the knowledge of the armed forces. Besides, the clueless nature of the discipline forces on the possible timelines of attacks on the systems helped informed in designing Stuxnet technology.Stuxnet major concern is military just as the intention of the majority of cyberterrorists. Its discovery helped paved way into an array of possible strategies to completely eradicate cybercrimes (Jacobson and Patricia 101). Before operationalization of the Stuxnet, several attempts had been made within the military to neutralize cybercrimes. Initially, there was the creation of Cyber command that as viewed as the superior combatant to internet security threats. The creation of this system was informed by the realization of military changes in the warfare front from the battlefields to the cyberspace warfare.However, the improve counter-cyberwarfare strategies continue to face uncertainties as the internet crimes dynamics continue to evolve. While the cyber command could not determine the motivation and the identity of the attacking party, the Stuxnet technology evolution was seen as an alternative platform that would fill security gaps (Jacobson and Patricia 103). Critical Analysis of Cybersecurity Cybersecurity refers to the strategies employed to enhance internet security through creation of cyberspace that is confidential to the users. Besides, the system created should ensures that the security details remains immune to hacking, thus enhancing cyberspace integrity, safety and conventionality. While internet may appear a virtual space where information free from access by any other user, it has since been subjected to unethical adventure of illegal access (Jang-Jaccard 990). It is defrauded through hacking, erasing vital information or even destroying classified information by the unwarranted person. In addition, modern national security systems employ internet services as a virtual space where critical security details are kept. In circumstances where there is unwarranted entry through dubious mans the national security is significantly compromised (Langner 51). Following continuous threat from hackers, there was a need to develop a more secure platform the could help destroy illegal access to classified cyberspace. The invention of Stuxnet marked a critical turning point in cybersecurity designs. Contrary to many misleading beliefs, Stuxnet discovery was not about destruction of industrial sabotage but, a military target that literary destroys illegal access from hackers. The purpose of illegal access and hacking is to manipulate, erase or seal certain information from the cyberspace. Stuxnet, on the other hand, is designed to facilitate accuracy of the information and provides originality thus preventing compromising of evidence (Langner 50). Certainly, there was a great misconception on the security availability and potential harm created by this technology during its initial stages. In fact, there was a belief that Stuxnet was an attacked launched against the SCADA and system controllers that could ultimately compromise internet access and availability to the users. SCADA been a window application that allows human operators to monitor industrial processes was a critical component that the industrialist could not compromise (Langner 51). However, the perception was totally wrong since the SCADA is an independent application although it played a small role in Stuxnet designing. The only relationship between these two application is that SCADA is used to distribute this security system.In industrial processes, SCADA helps in the distribution of Stuxnet that is essential in monitoring industrial processes and protecting them from illegal access by other persons. Besides, its aims were the entire industrial processes that include SCADA and those independent of this window application. Sadly, there was, and there is still a serious misconception about the operationally of Stuxnet, contrary to many beliefs. It is a software that is a stand alone system that do not require internet access neither is it controlled by a remote (Langner 51). Besides, Stuxnet enhances internet security in a conventional way through verification of codes and even downloading program code from the original site. The purpose of this process is to counter-check genuine access from the controller if it is the right access. The initial internet security services lacked this critical access to the codes and missed out on the ability to counter-check the originality from the controller. This technology is certainly a critical milestone towards enhancing internet security.While other computer programs operate on the information, the ladder logic or simply the controller security operator such as Stuxnet operates on the physics. It is an important feature in light of cybersecurity. It confers features of denial of access to unwarranted party and unpredictability to intruders. It, therefore, ensures that all illegal accesses are cancelled, redirected or completely blocked thus enhancing cyberspace security.There are two leading strategies employed in Cybersecurity platform. One of the strategies laid by the United States in fighting cyberwarfare from China and other perceived intruders includes offensive cyberwarfare strategy. Under this strategy, the U.S military and industrial internet security team operates on destroying foreign networks espionage access and attacking any persistent attempts to access critical data. Through this operational system, there is creation of customed-designed internet weaponry that are set ready to shoot any foreign electronic access and subsequently infrastructure. In the wake of potential terror blackmails, sabotage and potential attacks, this approach recognizes severity of information falling on unauthorized access and destroying any foreign access is the primary option of enhancing security.Besides, under offensive strategy the U.S has embarked on pursuing internet security policies that are expensive and destabilizing. While it may be a recipe to counter-reaction from other nations, it is viewed as the reasonable security strategy that would protect the nations military, industrial and civilian internet space (Jang-Jaccard 977). Sadly, there has been interruption and sabotage from hackers thus posing a security threat to individual and the nation. Notably, the rising terrorism has paved way to this pro-active approach that will guarantee confidentiality and integrity of the large-scale cyberspace. Offensive Cyber Effect Operations and cybersecurity In addition, the use of Offensive Cyber Effect Operations (OCEO) in United States offers a unique opportunity to advance the national programs and philosophies without potential adversary or enemy interference. Arguably, this is the most classical way in ensuring future internet security. However, the establishment of a consistent OCEO requires time and a lot of efforts if the access and tools of each specific potential target do not exist.Defensive cyberwarfare strategy that recognizes that cyberwar is a serious threat with potential catastrophic effects commonly called "cyber attacks." The use of Stuxnet malware in June 2010 proved to be effective defense strategy against cyberwar (Jang-Jaccard 974). Effects of Stuxnet Security on Cybersecurity In 2010, Natanz after an experience of Stuxnet defensive strategy recognized that it was the most advanced malware ever in the 21st century that had the potential of providing destroying over 1000 nuclear centrifuges. In recognizing the success of Stuxnet technology in combating a serious Iranian cyberwar against the U.S, Gary Samore the White House Arms Control advisor admitted a successful defensive strategy against foreign internet access to U.S military documents. However, when EEdward Snowden in 2013 revealed the U.S cyberwar against civilians it significantly compromised the citizens confidence levels on the internet security and privacy. Sadly, the National Security Agency (NSA) was accused of a sabotage of computer networks and telephones space intrusion in pretence of offering internet surveillance. It certainly confirms the importance of Stuxnet technology at personal level in order to enhance the personal cybersecurity (Jang-Jaccard 978). Recommendation for future Cybersecurity It is today a reality that cybersecurity is one of the topmost priority of United States security and indeed the entire globe. The role of cybersecurity agencies cannot be underscored in todays security surveillance systems. Besides, the ever rising terrorism threat compounded with dynamic technology requires elaborate, effective and ethical internet surveillance systems that will guarantee confidentiality of information in the cyberspace. Besides, the contemporary acts of terrorism have significantly undergo systematic transformation leading to crafty and intelligent approach that the military and industrial internet systems should remain alive to such reality. It is recommended that like Stuxnet cybersecurity software, the modern systems should be in a position to detect unwanted access and destroy its entry.It is should completely block access or report the entry in a systematic secret and wired technology to the security team. Singly, Stuxnet cannot yield much on detecting illicit access, reporting to security team and highlighting the intention of the attempted access. The future experts should come up with non-internet software that can detect the intention of attempted access, provides location and automatically classify the nature of entry. While it may appear theoretical, it is worth pursuing since the quick revolution of cybercrime requires elaborate mechanism with a long-term solution. Besides, in order to prevent future crimes, the military and national security agencies should put into policy cyberwarfare as a national security concern. Surprisingly, majority of those found hacking security and commercial internet systems remains free while the government continues to face heinous cybercrimes that have been escalating over the past decades. In addition, the government officials should use the authority bestowed on them by the people to merge with the private sector so as to comprehensively offer cyber security that can respond to cyber attacks.Lastly, while cyberwarfare remains a challenge, there should be an ethical approach towards enhancing internet security. The revelation of Snowden in 2013 sadly painted a negative impression and casted doubts on the commitment of NSA towards enhancing ethical practice and professionalism in combating cyberwars. The ultimate success to the cyberwarfare will be achieved when cyberwarfare is fought in collaborative and ethical approach. Works Cited Jacobson, George V., and Patricia Moloney Figliola. Cybersecurity, botnets, and cyberterrorism. New York: Nova Science Publishers, 2009. Print. Jang-Jaccard, Julian, and Surya Nepal. "A survey of emerging threats in cybersecurity." Journal of Computer and System Sciences 80.5 (2014): 973-993. Print. Langner, Ralph. "Stuxnet: Dissecting a Cyberwarfare Weapon." IEEE Security & Privacy Magazine 9.3 (2011): 49-51. Print. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Stuxnet: Dissecting a Cybewarfare Weapon Assignment”, n.d.)
Stuxnet: Dissecting a Cybewarfare Weapon Assignment. Retrieved from https://studentshare.org/information-technology/1656623-stuxnet-dissecting-a-cybewarfare-weapon
(Stuxnet: Dissecting a Cybewarfare Weapon Assignment)
Stuxnet: Dissecting a Cybewarfare Weapon Assignment. https://studentshare.org/information-technology/1656623-stuxnet-dissecting-a-cybewarfare-weapon.
“Stuxnet: Dissecting a Cybewarfare Weapon Assignment”, n.d. https://studentshare.org/information-technology/1656623-stuxnet-dissecting-a-cybewarfare-weapon.
  • Cited: 0 times

CHECK THESE SAMPLES OF Dissecting a Cyberwarfare Weapon

Dissecting Responsibilities on The Late Paper

"dissecting Responsibilities on The Late Paper” paper states that it takes maturity to understand various perspectives and acknowledge if one is at fault, however, as responsible adults, it needs to be learned, repercussions must be accepted and damage must be reversed, if at all possible....
2 Pages (500 words) Essay

Advantages and Disadvantages of Future Cyber-Warfare

cyberwarfare operations are not stealth operations.... The paper presents the cause of future cyber warfare.... Major Powers of the world are preparing for cyber warfare and espionage by developing lethal cyber weapons in the shape of viruses through trained hackers.... World has not seen real hot cyber warfare but nations are working on raising cyber capability....
1 Pages (250 words) Assignment

Dissenting Opinions about Outsourcing

Stephen Andriole's article about Best Practices Technology Management may have been true at the time it was written but some of his arguments are no longer valid today.... I said that some of his arguments are no longer valid today because the technology and outsourcing industry… Some of his arguments are still valid while some are arguable and relative depending on what angle you are looking at. The reason why some of his arguments were no longer valid today Dissenting Opinion about Outsourcing A critique on Stephen Andriole's article Stephen Andriole's article about Best Practices Technology Management may have been true at the time it was written but some of his arguments are no longer valid today....
2 Pages (500 words) Essay

Biological Weapons Program

Do you think their impact of destruction is more deadly than that of any biological weapon?... ou will agree with me that it is easy to assemble a biological weapon because it is cheap and easy to acquire.... Considering that biological weapons are the world's most deadly do you think containing any attack by biological weapon is easier than that of chemical or nuclear weapon?... Do you think that the residual effect in biological weapon is much worse?...
1 Pages (250 words) Assignment

Socioeconomic Status And The Outcomes Of Aortic Dissection Surgery

The methodological study design will focus on the reciprocal linkages between socioeconomic status and the outcomes of aortic dissecting surgery.... The research paper "Socioeconomic Status And The Outcomes Of Aortic Dissection Surgery" strives to identify issues concerned with the outcomes of aortic dissection surgery....
12 Pages (3000 words) Dissertation

Aortic Dissection

The researcher of this essay "Aortic Dissection" aims to analyze Aortic dissection which refers to a type of tear in the inner walls of the aorta that allows blood to glide into the wall of the aorta.... Aortic dissection is a condition that may be fatal and life threatening.... hellip; The unusual blood flows into the aortic wall can cause various problems in the human body....
2 Pages (500 words) Research Paper

Heart Dissection Process

The author of this paper will specify the general functions of blood and describe the structure and function of all blood components including plasma.... the author will also draw a flow diagram to show the movement of blood around the body and indicate whether the blood is oxygenated or deoxygenated....
8 Pages (2000 words) Assignment

Dissecting the Perceptions Gained from Televised Medical Drama - Grey's Anatomy

This paper "dissecting the Perceptions Gained from Televised Medical Drama" focuses on the fact that more than ever before, the media has a great impact on the manner in which people perceive issues.... Popular TV shows have distorted the opinions of viewers on politics, beauty, disease etc....
5 Pages (1250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us