A Summary Of A Rhetorical Analysis

Improved Essays
On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak. Dr. Njilla worked on the defense team. The vision of this team is quoted as “To lead the Air Force and Nation in command, control, communications, computers, Intelligence, Cyber Science, technology, and Research and development.” This vision is set to complete their mission of maintaining the United States superior technical advantage. If we remain the biggest and most advance the United States will remain an intimidating force to be reckoned with. Their objective, to provide ability to optimally coordinate and synchronize assets from across …show more content…
Njilla starts on his presentation, asking the question “How can we serve our power grid?”. Attackers he calls them adapt to defender’s efforts making it a never-ending race to try to stay on top of each other. An ongoing effort that has no sense of ending, which probably means constant employment. Attackers can develop or purchase zero- day exploits that expose the vulnerabilities within a system that can be used for very malicious intent. Which explains why he called cyber security a “race”, it is nearly impossible to be 100 percent secure so being as secure as possible by upgrading and updating technology, and applying patches to vulnerabilities when they are discovered is the best route to protecting systems. Attackers are persistent and will continue until they reach their

Related Documents

  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Black Ice Summary

    • 823 Words
    • 4 Pages

    The Nation's critical infrastructure is diverse and complex. It includes distributed networks, varied organizational structures and operating models (including multinational ownership), interdependent functions and systems in both the physical space and cyberspace, and governance constructs that involve multi-level authorities, responsibilities, and regulations. Critical infrastructure owners and operators are uniquely positioned to manage risks to their individual operations and assets, and to determine effective strategies to make them more secure and resilient. All Federal department and agency heads are responsible for the identification, prioritization, assessment, remediation, and security of their respective internal critical infrastructure…

    • 823 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Unit 1 Assignment

    • 783 Words
    • 4 Pages

    COMPUTER ARCHITECTURE AND IMPLEMENTATION Assignment 1 Name: Bhargavi Bussu Student Id: 10000126759 Professor: Paul Wang 1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book. In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    National Security Agency

    • 1122 Words
    • 5 Pages

    Federal agencies have led law enforcement efforts against computer crime since these agencies hold the technical expertise and political influence to gather significant financial and operational resources at the national level. Thus, these agencies have progressively reorganized in an attempt to channel resources directly at preventing digital crimes and capturing computer criminals, including the creation of special sections within these organizations, employing of new personnel who have specialized technical skill in this area, and the creation of new collaborative sections that combine the resources of multiple agencies. Department of Justice (DOJ) United States Department of Justice was established in 1870.…

    • 1122 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    During my first year in the Electronics Team I had been primarily focused in the career field of medicine; however, after the time spent teaching and helping others with their electronic devices I became curious in computers. When this happened, a copious amount of incidents involving cyber attacks on corporations and the federal government had occurred, and that had intruded upon individuals’ privacy and their well-being. As a result of these events, I had wanted to find a way to assist and to protect the citizens of this nation from possible future incidents such as those that had taken…

    • 100 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Thesis: Security is a big concern as hackers have reasons to obtain personal data for monetary gain. Network security risks are increasing and becoming more complex, resulting in many obstructions for information systems specialists. Security threats appear to accompany every new technology invented. I. Security Policy Guidelines Policies are considered highest level of documentation, from which the other major standards, procedures, and guidelines run. Security policy changes over time, and there is a policy life-cycle.…

    • 942 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction Critical infrastructure is the fundamental structure of modern society. Human beings largely depend on systems for survival in the harsh economic environment. Everything around, tangible and intangible alike, has a purpose of making life easier for humanity. As time progresses, the Infrastructures continue to develop and become more sophisticated. More advanced inventions have more functionalities than the less complex ones.…

    • 3013 Words
    • 13 Pages
    Improved Essays
  • Improved Essays

    Abstract This paper presents information derived from peered reviewed works on the topic of cyber warfare that was gathered using the Virginia Wesleyan College Online Library. Cyber warfare is often categorized with nuclear, chemical and biological weapons as a potential weapon of mass destruction (WMD). Cyber warfare is at its basic level the gathering of electronic information. The term cyber warfare is often exploited to describe a new type of warfare and to create the notion that computers and networks are a new battlefield.…

    • 225 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Cyber-attacks is as old as the internet, cyber-space has become an essential part of our daily life, we have broadband signals, wireless networks, local network in school and businesses, all are vulnerable to the cyber-criminal (Warnes, 2017). The denial of services is a form of major hacking, is designed to paralyze the computer system, websites and financial network, these hackers targets government and private networks (Warnes, 2017). The Department of Defense Cyber Crime Center have suggested, computer criminals in China and Russia have accessed the United States electrical grid by using software that has the ability to damage at any time; social security numbers banking and credit card information are useful tools for the cyber-criminal (Warnes, 2017). Cyber-criminals are just as sophisticated as the computer system, the military intelligence network provides protection for the United States and it depends on the World Wide Web for this information; along with other major countries, the United States have joined forces to prevent and eliminate cyber criminals (Warnes,…

    • 1394 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    When it comes to our national security, there are many threats. For instance, some may believe that biological weapons are the biggest threat, while others feel transnational crimes are. In my opinion, though, I believe that cyber-attacks are our biggest threat when it comes to national security. Cyber-crime, as well as cyber terrorism proceeds to be the most accelerated threat to citizens of the United States. Our digital foundation is so accessible when it comes to being attacked which is just one of the reasons why it is more crucial than ever before that we keep ourselves, as well as our personal data safe from the exceeding danger of hackers (Nozzolio, 2015).…

    • 1118 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    What the Military Can Teach the Private Sector About Cybersecurity Data breaches within the United States have hit an all-time high. The Identity Theft Resource Center estimates that the year-over-year increase for cyberattacks is 27.5%. Nowadays, it’s not a question of whether an attack will happen, but when. As a result, businesses should take a military-approach to cybersecurity.…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    As technology evolves, so will the methods that criminals and terrorists utilize to achieve a personal gain. In the United States and throughout the most countries, technology plays a significant role in the way our economy operates, how cities obtain power, and how information is shared. If technology was used to disrupt this state of living, this could lead to a detrimental chain of events that could cripple the very existence of how we live. The technology we rely upon has numerous strengths, but there are also weaknesses that come along with it. The biggest threat to technology is the growing concern of a potential cyber attack that would disrupt critical infrastructures.…

    • 805 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    bstract An analysis is performed of global interconnectivity around cybersecurity and its impact on the pursuit of global commerce. Cultural influences, practices, and perspectives are reflected upon as they incorporate ethical, political, and social viewpoints. Cultural philosophical perspectives integrate attitudes, beliefs, values, and political agendas which help navigate tangible or intangible formations of a particular culture. As a result, products involve underlying beliefs and values and cultural practices.…

    • 1383 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Threats

    • 983 Words
    • 4 Pages

    October is the designated "National Cybersecurity Awareness Month," in the United States and Canada, to educate and engage the community, from government agencies, private enterprise to external audiences, about the need to protect against emerging cyber threats. Today, we need to use Internet more than ever, to do everything from shopping, banking, to socializing, and in this interconnected world, we are constantly sharing sensitive information, which cyber criminals are always on the lookout for. Cyber threats are continually improving in sophistication and advancing capabilities, from both state and non-state actors, therefore everyone has to be increasingly diligent, vigilant and aware of the consequences of their online activities. No matter where or what device we are connecting from, our choices can enable or prevent cyber intrusions. In a cyber security strategy, people may be the weakest link but they can be continually educated to be cyber aware by following simple steps in their daily activities to…

    • 983 Words
    • 4 Pages
    Improved Essays