National Security Research Paper

Improved Essays
Every day, we have seen technology advanced dramatically in the past years. Many of those advances include smart phones, smart TVs, computers, tables, watches, and so much more. We even have faster internet and network access. Many companies and civilians take advantages of such advancements by providing and selling “access” to several applications to watch movies and TV shows, listening and access music, and using a faster way to network with many people (both near and far) in social media. However, such advancements can be affected and misused. Cybersecurity threats and attacks and not being prepared to defend and respond are issues that involved dramatic changes in technology in military affairs and national strategy.
Technology had helped the military affairs to revolutionize when it comes to national security strategy. Combat drones had helped troops for surveillance up in the air. These drones has help troops remain
…show more content…
computer networks. In 2010, it was discovered that there were more than 75,000 computers hacked in one of the largest cyberattacks that happened to the U.S. and the around the world (Nakashima, 2010). Apparently, this attack had targeted in corporate data, emails, credit card information, and login credentials in health and technology industries. That’s why in 2010 National Security, the term of “cyber” and the initial concern to build up a strategy to secure cyberspace when Barack Obama was elected president. As the document states, cybersecurity threats is considered as the “most serious national security, public safety, and economic challenges we face as a nation” (Obama, 2010). If cyber criminals are able to create such a threat, they could have the capability to hack into military technology and equipment. Rather, the fear that a cyberattack could potentially affect U.S. security and

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    I believe in a safe, but yet still free America. In its early years, America was established so that citizens could feel safe no matter what they believed in, or any unique physical trait they possessed Whether it is our military, police, firemen, or any other officer that serves our country, they all work to keep us safe, secure, and maintain all of our rights. Almost all countries in the world have a military. The military keeps out foreign trouble. One of the reasons many people love America is because of the protection they receive under the stars and stripes.…

    • 400 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Homeland Security Department According to the United States Government, Federal Agencies Department of Homeland Security website, The Homeland Security department was established in 2002 from a collaboration of 22 other departments and agencies. The homeland security is just what is names says it’s an agency that tries to find ways to improve security for America. Everyone knows that the military plays an important role in Homeland security, however there are a few parts to the department that some might now realize are, the following is a list of some of the other departments that are also part of homeland security: Customs, Border, immigration enforcement, emergency response to natural and manmade disasters, antiterrorism, and cybersecurity.…

    • 991 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Do you ever get up in the morning for work and say this is going be a decent day? Will you get a promotion or a pay increase on your job? Well consider going to work and seeing planes collide with your employment. This day was known as 9/11 when George W. Bush reported a War on Terror. The war on terror has been going on as far back as Sept. 11, 2001.…

    • 1337 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    The aforementioned Stuxnet worm that delayed Iran’s nuclear capabilities by two years is used to support this claim. The author also supports this claim by claiming a cyber attack could potentially cripple an economy. Simply deleting data from banking systems could result in economic crisis. Harris cites an instance where the military planned to attack Iraq’s banking system prior to the 2003 invasion, however the military called off this plan because they feared the attack may accidentally spread to France’s banking system. This shows the nature of digital warfare is similar to that of physical warfare; an attack can have accidental effects on unintended targets.…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Advancement In Military

    • 533 Words
    • 3 Pages

    The advancements in information technology within the United States Army changed the battlefield. Through the identification of improvement that I have seen in my eighteen year military career, I will show changes on the battlefield in the areas of surveillance, communication and planning. Surveillance is a key part to the planning of any military operation. In the beginning of my career I would have sat in a two to four man Reconnaissance and Surveillance position and passed information about what I had seen back to my higher element, but once I left that position I could no longer verify that what I had reported had not changed.…

    • 533 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “ By the 20th century, military organizations confronted the problem of not only adapting to technological changes in peace time, but also the fact that war itself has inevitably turned up the speed of technological change”. The first Gulf War constitutes a turning point in the history of modern conflicts essentially because of the integration of technology into all levels of military operations. War was always been a declaration of hostility between two opposing groups clashed over a battlefield in a duel with the ultimate aim to impose its will on the other. However, the advent of new technologies has completely changed these legendary and almost static clashes.…

    • 1300 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The Department of Homeland Security is adequate enough to prevent some terrorist attacks, but not all of them. For example, two teens in Franklin County made threats against their high school (Franklin County High School). This threat not only included a school shooting, but a bombing. These teens were trying to get others to help them and this resulted in them getting caught. These teens are being charged with conspiracy to commit an act of terrorism.…

    • 147 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    The U.S. Intelligence Community Justin Sharp Grantham University After 9/11 the U.S. Intelligence Community (IC) was transformed. Prior to 9/11 the Director of CIA was in charge of all intelligence. Since 9/11 it has taken on a form of its own. The Office of the Director of national Intelligence (ODNI) was born in April 2005. The formation of the ODNI allows for intelligence to flow up and down the chain so the people who need the information have access to it and allows for analysts to put together Intel briefings and brings together Local, State and Tribal law enforcement into the fight against terror with the training and intelligence needed for the fight in the local communities.…

    • 687 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays