Research Paper on "Internet Globalization Good or Bad"

Research Paper 6 pages (1813 words) Sources: 5

[EXCERPT] . . . .

Internet

The globalization of the Internet has spawned a rash of cyberattacks on the U.S. Department of Defense and a number of its contractors. One such example was the Poison Ivy attack on Booz Allen Hamilton, which was designed to pull sensitive data out of the company's computer network via an email attachment (Grow, Epstein & Tschang, 2008). Poison Ivy, along with other trojans and viruses, represents a new class of e-espionage, one that threatens the security of the United States. The Internet cat cannot be put back into the bag -- it has gone global and we are past the point of debating the merits of that. The real issue is how the United States can deal with these threats.

The Department of Defense created the Internet as a communications tools, and it has reshaped the world in many ways. Its usage is commonplace for the transmission of information. While initially the Internet may have been a safe means of transmitting information, once it was opened up to the world it has become an increasing source of risk -- and opportunity -- for America. Hackers routinely attempt to gain access to sensitive information using the Internet. They use deficiencies in major software platforms such as Microsoft's Outlook and Internet Explorer to plant viruses and gain access to sensitive information. This is possible because both in the Department of Defense and in its numerous contractors the use of email and Internet browsers is commonplace. Even if weak software such as Internet Explorer is not used directly to access sensitive information, it can still provide a pathway for a virus to enter a computer or a network. The information is then accessed via the virus. Callaham (2012
Continue scrolling to

download full paper
) notes that Internet Explorer is particularly vulnerable to such attacks. The German government has even called for its citizens to avoid the browser because of its security holes (Richmond, 2012).

In a report aimed at its corporate clients, Price Waterhouse Coopers outlined the threat that e-spionage, as electronic espionage is known, poses to its clients. It defines e-spionage as "unauthorized and usually criminal access to confidential systems and information for the purpose of gaining a commercial or political advantage." The threat apparently comes from multiple different quarters, not just China but other nations as well that are seeking to benefit from access to classified information (PWC, n.d.)

Hacking

Poison Ivy represents one of the more serious hacking threats in recent years. Grow et al. (2008) note that it can be delivered via email attachment, and it is also known to be disseminated via Internet Explorer. The authors note that the United States has become victim to an "unprecedented rash of similar cyberattacks" since 2006. In 2007, for example, there were nearly 13,000 cybersecurity incidents reported by government agencies to the Department of Homeland Security. At least seven U.S. government agencies and a host of defense contractors have been targeted specifically in attempts to gain access to sensitive information.

The People's Republic of China has long been considered a major cybersecurity threat. The state sponsors professional hackers and has them employed to gather data from around the world. A number of intrusions have been tracked to the PRC in recent years. In true espionage fashion, the Chinese admit no wrongdoing, but nor would they. The Chinese government was implicated in hacking attacks on the Tibetan government-in-exile, for example, and is known to have hacked into sensitive networks in India, South Korea, Japan and the U.S. (Chaudhury, 2009).

Poison Ivy is one example of such a threat. The trojan's code was embedded in a routine email attachment, such that when the attachment was opened the virus would have been introduced to Booz Allen's secure network. Poison Ivy would not only gather information, but leave open a back door allowing the transmission of that information back to the virus' originators. This threat was caught because it was relatively unsophisticated, but these types of threats work when performed on a mass scale. Within any organization, there will always be somebody who makes a mistake and when that occurs the virus begins to do its work. Harley (2009) notes that there are even more sophisticated threats now. A technique known as 'spearfishing' embeds a virus or trojan within an otherwise innocuous .doc or .pdf file. These file types are not considered by users to be threats, so the risk that the file will be opened and the virus introduced to the system is far greater using this technique.

The virus threat is also an opportunity. The U.S. And Israel allegedly created the Stuxnet virus in order to slow down the progress of the Iranian nuclear program. This virus disabled much of that country's nuclear infrastructure. The attack was successful in disabling a number of centrifuges, but the virus escaped and caused damage to networks in other countries as well (Nakashima & Warrick, 2012). The use of e-spionage is something that works both ways. The Department of Defense originally felt that it would always have the upper hand in the use of e-spionage, but reportedly the Chinese threat has the rethinking that position and questioning if they have "created a monster." (Grow, et al., 2008).

China in particular poses a threat because of its capabilities. Drawing on its massive population and modern technological capabilities, China has the ability to employ up to 40,000 hackers to work on a variety of projects, from building new virus and trojan threats to finding creative ways to deliver those threats to targets. The United States has excellent capacity for e-spionage as well, but some of its best talent will be diverted to the private sector, something that China does not have to worry about as much, given the limited number of great opportunities in that country for similarly-talented individuals, and the totalitarian nature of the government.

The Monster Question

The Internet has become an incredible tool for freedom, particularly with respect to the flow of information. The trouble with flowing information is that it is precisely during the course of these flows that information becomes vulnerable. The encrypting and protecting of sensitive data harkens to the code-breaking of World War Two. The Allies gained significant competitive advantages in that conflict by breaking enemy codes and having unbreakable codes of their own. The monster in question today is the possibility that other nations will have superior e-spionage abilities and will therefore be better equipped to gain access to sensitive information. As the Booz Allen case illustrates, the use of email attachments and browsers to convey sensitive information is commonplace, even within the DoD and among major defense contractors.

Outside of nations, rogue groups of hackers also pose a threat. Any well-trained hacker with an agenda can seek to gain access to sensitive information and use it for whatever purpose it wants. The threat therefore cannot be understood specifically in geopolitical frames. Any rogue hacker poses a threat. Dealing with this treat is going to pose a significant challenge to the United States and the DoD specifically. There is no shortage of actors in the world who seek information about their activities and would benefit from tapping their knowledge. The power of the information pipeline is great, so its use cannot be scaled back too much. However, its use must also be carefully guarded against these threats. This presents a significant challenge.

The monster that is the ongoing threat of cyberattacks and e-spionage is going to be difficult to contain. New threats are emerging and there is the significant risk that some other nations will be able to develop superior capabilities. The United States will, if it wants to "win" the e-spionage war will need to be the one with the superior capabilities. In addition to augmented security and the ongoing development of top talent, the United States will need to find ways to avoid digitizing certain sensitive information. This tactic has been used by foreign corporations doing business in China for years -- keeping the most sensitive information offline and out of networks allows for that information to remain out of reach for those who would steal it. This solution is inelegant -- it slows down the flow of information, but it works for the most sensitive information.

Conclusion

If we are to evaluate whether the globalization of the Internet has been good or bad, it has been overwhelmingly good. It has allowed the United States unprecedented technological and economic gains to cement the nation's superior status for years to come. The United States also has incredible capabilities with respect to e-spionage. The country cannot simply arrive at the conclusion that because it is not the only player in the game that the game is inherently bad -- such a view is patently absurd. The reality is that there are just as many opportunities as there are threats. There are as many Stuxnets as there are Poison Ivies. The key to defending against attacks like the Poison Ivy attack against Booz Allen is to understand… READ MORE

Quoted Instructions for "Internet Globalization Good or Bad" Assignment:

Request is for a Research paper over the above topic as it pertains to Management Information Systems. The paper must be APA format, 6th edition; and at least five (5) pages in length, plus an abstract and the FREE reference pages. Please base the paper on BusinessWeek magazine*****'s probe into the rising attacks on America*****'s most sensitive computer networks, which uncovered security gaps. TSpecifically, the email message addressed to a Booz Allen Hamilton executive from the Pentagon was mundane--a shopping list of weaponry India wanted to buy. But the missive was a ***** fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidiuous piece of computer code, known as Poison Ivy, designed to suck sensitive data our of the $4 billion consulting firm*****'s computer network. Discuss the global threats of E-espionage, specifically the malicious code hidden inside the email attachment Poison Ivy and it*****'s devious capability known as a RAT, a remote administration tool. In the past several years, thousands of highly customized attack e-mails have landed on the laptops and PCs of US gov*****'t workers and defense contracting executives. According to sources familiar with the matter, the attacks targets sensitive information on the networks of at least seven agencies--the Defense, State, Energy, Commerce, Health and Human Services, Agriculture, and Treasury depts.--and also defense contractors Boeing, Lockheed *****, General Electric, Raytheoin, and General Dynamics. Did the Defense Dept., whose DARPA developed the Internet in the 1960s create a monster?

How to Reference "Internet Globalization Good or Bad" Research Paper in a Bibliography

Internet Globalization Good or Bad.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517. Accessed 1 Jul 2024.

Internet Globalization Good or Bad (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517
A1-TermPaper.com. (2012). Internet Globalization Good or Bad. [online] Available at: https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517 [Accessed 1 Jul, 2024].
”Internet Globalization Good or Bad” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517.
”Internet Globalization Good or Bad” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517.
[1] ”Internet Globalization Good or Bad”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517. [Accessed: 1-Jul-2024].
1. Internet Globalization Good or Bad [Internet]. A1-TermPaper.com. 2012 [cited 1 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517
1. Internet Globalization Good or Bad. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/internet-globalization/2084517. Published 2012. Accessed July 1, 2024.

Related Research Papers:

Is Globalization Good or Bad for Developing Countries? Term Paper

Paper Icon

Globalization and Developing Countries

As defined by the World Bank in its handbook on the subject, globalization is defined as "the growing integration of economies and societies around the world."… read more

Term Paper 2 pages (810 words) Sources: 1+ Topic: Economics / Finance / Banking


Globalization at General Electric: Discussion Questions Case Study

Paper Icon

Globalization at General Electric: Discussion Questions and Corporate Profile

Case Discussion Questions

GE has invested very aggressively in the foreign expansion of its company. There are several reasons why the… read more

Case Study 10 pages (3069 words) Sources: 10 Topic: Business / Corporations / E-commerce


Internet Business Plan Business Plan

Paper Icon

Internet Business Plan

What does the 'Internet' mean? The Internet is nothing but a global connection comprising of more than millions of computers, linking more than 100 countries from all… read more

Business Plan 15 pages (7291 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Comparing Assessing the Impact of Political or Economic Globalization Between Two Countries Thesis

Paper Icon

Political or Economic Globalization Between Two Countries: China and India

The following work is of the nature that focuses on comparison and assessment of the impact of political or economic… read more

Thesis 10 pages (3336 words) Sources: 9 Style: MLA Topic: Economics / Finance / Banking


Globalization and the Environment Term Paper

Paper Icon

Globalization and the Environment

This work in writing will examine and thoroughly analyze the impact that globalization has had on the environment of the world. "Global environmental problems are increasingly… read more

Term Paper 9 pages (2597 words) Sources: 1+ Topic: Environment / Conservation / Ecology


Mon, Jul 1, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!