Pros And Cons Of Cyber-Terrorism

Improved Essays
When it comes to our national security, there are many threats. For instance, some may believe that biological weapons are the biggest threat, while others feel transnational crimes are. In my opinion, though, I believe that cyber-attacks are our biggest threat when it comes to national security. Cyber-crime, as well as cyber terrorism proceeds to be the most accelerated threat to citizens of the United States. Our digital foundation is so accessible when it comes to being attacked which is just one of the reasons why it is more crucial than ever before that we keep ourselves, as well as our personal data safe from the exceeding danger of hackers (Nozzolio, 2015). The cyber security outbreak is a forthcoming danger when it comes to the protection and surveillance of not only us, but also our community and our country, as well (Nozzolio, 2015). There are a lot of things which depend on the security of cyberspace. As Barack Obama stated, our economic benefits, national security, and our individual freedom rely upon our obligation to protecting our computer networks and managing an accessible, protected and trustworthy Internet (White House, N/A). As stated by one of the top U.S intelligence officials, James Clapper, disturbances in cyber space and assaults by domestic terrorists are the greatest immediate security threats that the United States is encountering in 2016. When he was conducting the United States yearly threat assessment, James Clapper cautioned that the expansion of technological gadgets, several of which are created and advertised with little safety specifications and examination, and the continually rising intricacy of information technology could lead to extensive accountabilities in civilian foundations and U.S regime organizations (Reuters, 2016). In fact, since Clapper 's most recent cautionary advice, the White House was prompted to make cyber security one of topmost concerns in this year while President Barack Obama is still the president. President Obama 's financial plan proposition for the year of 2017 pursues nineteen billion dollars for cyber security which is an increment of more than a third by this year (Reuters, 2016). Technological advances such as smart household devices and vehicles that power themselves are just a couple of the things that can not only potentially put our information secrecy in danger, but put our information virtue and the progression of these services at risk. Eventually, undercover agents from other countries may be capable of taking advantage of the expansion and perplexity of devices to administer supervision, mark whereabouts, spot informants for future enlistments, or obtain entry to systems or consumer documents. In fact, in 2013, Target fell victim of a data breach which disclosed forty million consumers account information (Krebs on Security, 2016). Security specialists at Verizon explored its systems for defects and actually discovered that once a hacker is inside Target 's system of connections, there was not a thing that can be done to prevent aggressors from obtaining direct and total admission to …show more content…
Cybercrimes, as well as cyber terrorism proceed to be the most accelerated threat to citizens of the United States. The cyber security outbreak is a forthcoming danger when it comes to the protection and surveillance of not only us, but also our community and our country, as well (Nozzolio, 2015). Technological advances such as smart household devices and vehicles that power themselves are just a couple of the things that can not only potentially put our information secrecy in danger, but put our information virtue and the progression of these services at risk. Eventually, undercover agents from other countries may be capable of taking advantage of the expansion and perplexity of devices to administer supervision, mark whereabouts, spot informants for future enlistments, or obtain entry to systems or consumer documents. When it comes the government, there are five things that they are going to make their priority when it comes to attempting to stop or at least decreasing the number of cyber-attacks; these five things are as follows: protecting the nation 's critical infrastructure, improving our ability to identify and report cyber incidents, engaging with international partners, securing federal networks and shaping a cyber-savvy workforce. As James Clapper once said, hacking threats are not going to be able to be entirely removed or stopped, however there are ways that we can at least decrease the number of attacks which is by being cautious in our attempts to discover, govern and fight against it (Fadilpašić,

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    As such, the cyberterrorists use the cyberspace to carry out their attacks. As such, the FBI has worked to pinpoint the most significant cyber threats, which have the ability to inflict damage or acquire classified information from its target. The federal government, through the FBI is continuously collecting intelligence to learn about the cybercrime networks with an aim to dismantle the networks and bring the perpetrators to…

    • 820 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Homeland Security Thesis

    • 670 Words
    • 3 Pages

    An introductory text for the 21st Century (11th ed.). Upper Saddle River, NY: Prentice Hall. Annotated Bibliography Bullock, J. A., Haddow, G. & Coppola, D. P. (2013). Introduction to Homeland Security (4th ed.). Waltham, MA: Butterworth-Heinemann.…

    • 670 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    According to the Zertag video the three classes of cyber-attacks are intellectual property theft, attacks that disrupt our way of life and attacks that threaten the military’s ability to defend itself. The effects of intellectual property theft are that it will degrade our economic competitiveness. The effect of attacks that disrupt our way of life is attacked that disrupt our infrastructure like 9/11. After 9/11 Americans were shaken and the government cracked down on airport security, immigration, and the war of terrorism. The effect of attacks that threaten the military's ability to defend itself is that it will leave us vulnerable to other attacks, other countries, and more deaths of…

    • 111 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    After the 2001 attacks The Department of Homeland Security had to completely remodel its system and focus on terrorism as the main threat. “Terrorists today can strike at any place, at any time, and with virtually any weapon. This is a permanent condition and these new threats require our country to design a new homeland security structure.” Our country suffered from this event and it has been the focus of Homeland Security to make sure nothing like that ever happens again. The USSS has taken effective measures in expanding its investigation in computer networks and monitoring internet activity.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Cyber attackers have come from in the country and outside of the country, and these other countries need to know that we aren’t going to accept it. In the debate, Clinton said, “the United States has much greater capacity. And we are not going to sit idly by and permit state actors to go after our information, our private-sector information or our public-sector information.” (Washington Post)…

    • 1185 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    Protecting the Internet is a difficult task. Cybersecurity can be obtained only through systematic development;…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays