Term Paper on "Technology Issue in Information Assurance"

Term Paper 10 pages (3012 words) Sources: 15

[EXCERPT] . . . .

Technology Issue in Information Assurance

Cyberwars: The Virtual Battlefield of the 21st Century

In the very near future, many conflicts will not take place on the open field of battle, but rather in spaces on the Internet, fought with the aid of information soldiers.... This means that a small force of hackers is stronger than the multi-thousand force of the current armed forces. --Former Duma member Nikolai Kuryanovich

The recent denial of service attacks on Amazon, PayPal, MasterCard, and Visa by supporters of Wikileaks founder Julian Assange made it abundantly clear that even major corporations with the most sophisticated information security measures in place remain highly vulnerable to cyber attacks that can disrupt operations in major ways. While these so-called cyber attacks merely represented a temporary -- but expensive -- inconvenience for these companies, the attacks highlighted the need for increased measures that can prevent their recurrence in the future. Unfortunately, the virtual battlefield of the 21st century resembles warfare throughout the ages wherein new defense measures are quickly matched by new counter-offensive methods. Kings built their castle walls higher and thicker in the Middle Ages, for example, but siege weapons such as catapults and trebuchets made short work of these improved defenses. Similarly, privately motivated and government-sponsored terrorists are constantly searching for weaknesses in national defense computer security systems and these trends are expected to continue well into the foreseeable future. To determine how cyberwars are being waged in the 21st century, what form they take and what can be done abou
Continue scrolling to

download full paper
t them, this paper provides a review of the relevant juried and scholarly literature, followed by a summary of the research in the conclusion.

Review and Analysis

Background and Overview

As the term implies, cyberwar involves malicious attacks on information systems that typically occur over the Internet. According to Jurich (2008), "Cyberwarfare, as these attacks are described, represents the emerging use of the Internet to disrupt national security as cyberspace has become better developed and increasingly accessible to all parts of the world" (p. 276). Likewise, Trendle reports that, "Modern information and communications technology has created the phenomenon of cyberwar - information warfare waged over the Internet. It is increasingly recognized in government, military and business circles as a potential grave threat" (2002, p. 7). As the term specifically applies to governments and national defense, the definition provided by Cimbala (2002) indicates that cyberwar is "The conducting of a military campaign or plan of operations on cybernetic principles. This essentially means exploiting information technology in order to deny to the enemy a coherent picture of the battle while, at the same time, providing for one's own side the most comprehensive picture of the same engagement" (2002, p. 20). Prosecuting cyberwar can assume a wide range of tactics, including both physical infrastructure as well as information systems. In this regard, Cimbala adds that, "Cyberwar can include tactics as diverse as the physical destruction of command-control centers or air defense radars, on one hand, or the invasion of enemy computer networks with viruses, worms, and other hostile cyberbugs in order to disrupt or confuse those networks and the information they carry" (2002, p. 20).

While there is a growing body of knowledge concerning what forms cyberwarfare can assume and its potential for destruction, there remains a serious gap between what is known and what is taking place in other countries and among non-state actors who may be mounting a Manhattan Project level effort to disrupt the nation's defenses (Korns & Kastenberg, 2008). Indeed, Williams (2009) emphasizes that, "In many ways, cyber warfare is in its 'Billy Mitchell' days, analogous to the advent of airpower prior to World War II. We are aware of potential and actual risks in this new domain but do not fully understand them" (p. 21). What is understood is the enormous impact that cyberattacks can have on a nation's defenses and what form these attacks assume. For instance, according to Trendle, "Cyberwar at its most benign involves distributing information through websites or e-mail to raise awareness, mobilize support and create global networks. Beyond this propaganda aspect, it can also include infiltrating and disrupting an enemy's computer networks and databases" (2002, p. 7). In the Age of Information, these types of attacks can mean real problems, of course, and a number of methods have been developed to exploit the vulnerabilities of the information highway. For instance, Trendle notes that, "In this area, cyberwar has introduced a host of new weapons such as viruses, worms and trojan horses, which can wreak havoc on computer systems" (2002, p. 7).

These cyber weapons have leveled the playing field for belligerents seeking to harm the United States in some fashion, allowing an individual or small group of computer engineers with minimal resources to attack a superpower, frequently with impunity. As the United States continues to invest enormous amounts of money in high-tech tactical weaponry that can be deployed to every corner of the world, computer engineers or even a single person can wreak havoc on these conventional -- and expensive -- weapons. In this regard, Trendle notes that this type of cyberwarfare is known as asymmetric warfare: "This digital warfare comes under what military theorists increasingly refer to as asymmetric warfare, where unconventional tactics are used by smaller players to counter the overwhelming conventional military superiority of an adversary" (2002, p. 7). In this environment, some military strategists today might be lamenting the absence of the "good ol' days" of the Cold War when America's enemies were other nations which were well-known and which had definite geographic locations. As Tendle concludes, cyberwarfare has changed all of that: "Like a classic guerrilla struggle, which is a conflict of the weak against the strong, cyberwar can enable an individual to damage the computer system of a government or 'down' the website of a multinational corporation. The weapon of choice can be nothing more than a laptop computer wired to the Internet" (2002, p. 7). Perhaps the most alarming aspect of cyberwarfare is its insidious qualities wherein attackers can be other countries, terrorist groups or even an adolescent at home mimicking these efforts by others (O'Rourke, 2010). Moreover, in sharp contrast to conventional warfare where it requires significant amounts of time to mount an assault, cyber attacks can take place quickly. For instance, Clemmons and Brown (1999) note that, "Warfare by computer has no 'front line,' and with the low cost of technology, anyone can play. The problem we face is that, far from taking months to assemble the war machine necessary to carry out a huge conventional attack, a cyberattack could cause the same damage instantly. Further, the attack could emanate from a great distance, giving little warning or opportunity for defense" (p. 36). Taken together, it is clear that cyberwarfare is a growing threat to the United States and its interests at home and abroad, an assertion that is supported by current trends in cyberwarfare which are discussed further below.

Current Trends in Cyberwarfare

One of the most alarming aspects as cyberwarfare is the wide range of opportunities that cyberspace provides individual hackers and organized elements, including countries, to prosecute attacks on the United States' security infrastructure in ways that have never been possible in the past. In this regard, Jurich cautions that, "Cyberspace's many uses -- and an increasing global reliance on the application of these uses-leaves myriad potential methods available to attackers" (2008, p. 275). Moreover, as the Internet continues to create integrated networks of information systems from all sectors of countries, the potential for disrupting or even destroying these systems becomes even more pronounced. According to Jurich, "The intertwined nature of cyberspace's infrastructure places military, government, financial, and civilian uses into a single channel. Within this channel, technological breakthroughs create vulnerabilities for all users, who are open to opponents' exploitation. These opponents may range from economic, political, and military competitors to terrorists and criminals" (2008, p. 275). This integrated quality of information systems also means that even as new protections are developed against cyber threats, belligerents can develop new ways of defeating them, comparable to the build bigger walls and deepen the moat trends that were countered by siege weaponry that characterized feudal warfare. As Jurich points out, "Each technological breakthrough, moreover, opens all users of the infrastructure to attacks from any individual opponent. Meanwhile, opponents can develop offensive strategies against a variety of targets simultaneously because of a shared protocol within the infrastructure" (2008, p. 276).

Notwithstanding the clear and present threat represents by cyber attacks, the inexorable march toward ubiquitous computing continues, and the threats to these vital information systems continue to increase as well (Liptak, 2009). These trends can be easily discerned by the initiatives undertaken by the Chinese and American governments to develop cyber weapons of their own, both to counter attacks from others as well as prosecute them as part of their overall strategic operations. According to Jurich:

The Chinese government has committed itself to developing an 'informationalized' army, comprised of individuals manning computer… READ MORE

Quoted Instructions for "Technology Issue in Information Assurance" Assignment:

Style

In all questions, follow the Publication Manual of the American Psychological Association. Graduate student should have a copy. Otherwise, check out www.apastyle.org. In Web Tycho, do the APA tutorial.

References and Bibliography

Cite references in your text by using the author-date method. Examples

Walker (2000) compared reaction times.

In a recent study of reaction time (Walker, 2000).

You will no doubt be using internet references. In the website mentioned above, click on *****electronic references***** for the correct manner of stating internet sources in your bibliography. In the manual, refer to page 270.

Format

All work must be typed.

Use 1*****" margins on all sides of the paper (8.5 x 11 or A4)

Use Times New Roman, 12 points.

Use double spacing.

Use appropriate headings and subheadings. (pages 10-11) The first word of each new paragraph should be indented from the margin.

Number each page in the bottom right corner. The cover page should not be numbered.

Use a cover page (title page) for the paper. See page 10. In the center of the page, in this order, double spaced, put:

Your Name

Course Number and Name

Title of the the paper

English Style and Grammar

All of the errors listed below have occurred and continue to occur.

In the discussion on p.37-39, notice that the Manual does not even consider the use of the word *****you,***** because such an error does not even occur to the author. Do not use the pronoun *****you***** in your paper! This is a serious breach of style. Example:

*****Having your identity attached to your every thought and opinion .. will surely deter open ended and honest discussions about governmental policies.*****

Do not use the pronoun *****we***** in your paper. You are not royalty, nor may you assume that I am helping you or agree with you! Perhaps the following joke will help the point stick in your mind.

The Lone Ranger and Tonto are surrounded by hostile Indians.

The Lone Ranger turns to Tonto and says, *****What do we do now, Tonto?*****

Tonto replies, *****What do you mean by *****˜we*****, paleface?

The section on grammar (p. 40-61) is well worth reading. Unfortunately, once again the Manual does not even consider errors which are commonplace in student papers. I refer, for example, to sentence fragments, which lack either a subject, or a verb, or sometimes both:

*****Not to mention that criminal*****s records are also made public.*****

*****Which applies to the authors of original works of authorship which includes literary, dramatic, musical, artistic, and intellectual works.*****

Other common student errors are:

Its vs. it*****s

There vs. their vs. they*****re

You*****re vs. your

Whether vs. weather

Agreement: *****Every PC user should install encryption on their PC.***** (Should be *****his PC***** or *****his or her PC*****

Use of commas:

The boy, and the girl went to the store. (no comma after *****boy*****)

The boy went to the store, the girl went home. (Wrong)

The boy went to the store; the girl went home. (right)

The boy went to the store and the girl went home. (right)

The boy went to the store, while the girl went home. (right)

The following is both a rhetorical question (bad style) and a run-on sentence:

*****My question to you is the FBI considered a friend or an enemy?*****

In this regard, refer to this Wikipedia article http://en.wikipedia.org/wiki/Complex_sentence and also the articles on simple and compound sentences. Many students have considerable difficulties with regard to sentence structure. There is no obligation to use compound and complex sentences if one has difficulty in using them correctly.

Finally, the following sentence is taken from a published book! This is clumsy, confusing, and illogical.

*****Every company won*****t have to have an IDS*****.

Write in a neutral, unemotional, and professional manner. Avoid appeals to patriotism, motherhood, or whatever you think everyone agrees with. Avoid rhetorical questions.

Example

For an example of a good, impersonal, professional style, consult the following document:

*****Guide to Intrusion Detection and Prevention Systems***** Recommendations of the National Institute of Standards and Technology.

http://csrc.nist.gov/publications/nistpubs/800-94/SP800-94.pdf

--------------------------------------------------------------------------------------------------------------------------------------------------------------------------

***** A. Christie

INFA610

Computer Security, Software Assurance, Hardware Assurance, and Security Management

Title of the MIDTERM paper

INFA 610 First Paper ***** CHRISTIE 24JAN2011 to 01MAY2011

First Individual Paper: 20%

You will be graded on two short papers of 5-6 pages in good APA style.

The first paper is to be on a technology issue in information assurance.

Format

All work must be typed.

Use 1*****" margins on all sides of the paper (8.5 x 11 or A4)

Use Times New Roman, 12 points.

Use double spacing.

Use appropriate headings and subheadings. (pages 10-11) The first word of each new paragraph should be indented from the margin.

Number each page in the bottom right corner. The cover page should not be numbered.

Use a cover page (title page) for the paper. See page 10. In the center of the page, in this order, double spaced, put:

Your Name

Course Number and Name

Title of the paper

http://iase.disa.mil/

Information Assurance ***** Info is there in its integral form when needed.

Technology issue ***** talk about the Iranian worm powerplant issue. How it originated, grew, and concluded.

They used different computer systems to *****¦ it can be put into your computer and do nothing*****¦. Put in iran power plant it will crash it.

http://www.google.com/search?hl=en&safe=active&rls=com.microsoft%3Aen-us%3AIE-SearchBox&rlz=1I7ADBS_en&q=Internet+security+flaws&aq=f&aqi=g10&aql=&oq=

http://www.sans.org/top-cyber-security-risks/

http://www.cs.berkeley.edu/~daw/papers/endpoint-security.html

http://www.nytimes.com/2008/07/30/business/worldbusiness/30iht-flaw.4.14893974.html

http://www.crn.com/news/security/18808689/experts-list-top-10-internet-security-flaws.htm;jsessionid=4P2bxFIlGfDgCdfzlU7XLQ**.ecappj01

http://resources.metapress.com/pdf-preview.axd?code=w6p14188v172g63p&size=largest

http://www.defensesystems.com/Articles/2010/07/14/Navy-cybersecurity-information-assurance-directive.aspx

http://www.fas.org/sgp/spb/whitepap.html

Read that magazine: The Economist, titled, *****Cyberwar Threat from the internet***** and see where you can use or get some key information.

http://www.economist.com/node/16478792

What will cyberwar look like? In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes. Computer bugs bring down military e-mail systems; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery.

(Murphy, 2010)

Murphy, M. (2010, July 01). War in the fifth domain. Then Economist, 396(8689), 3.

http://www.economist.com/node/16481504

http://www.economist.com/node/16481504/comments

http://blog.cybersecuritylaw.us/2010/07/the-economist----cyberwar-the-threat-from-the-internet.html

http://www.time.com/time/covers/0,16641,19950821,00.html

http://www.time.com/time/specials/packages/article/0,28804,2037744_2037563_2037736,00.html

http://www.google.com/search?q=Time+magazine%27s+cover+story+on+%22CYBER+WAR%22&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en

Google Search: http://www.google.com/search?q=The+Economist+The+threat+from+the+internet&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en

Good summary: http://en.wikipedia.org/wiki/Information_assurance

Google Search: http://www.google.com/search?q=Information+Assurance+issues+of+today&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en

Look in and research via your membership with ACM & Microsoft TechNet and see if you can come up with anything.

Site the Bruce Willis Movie, *****Live Good, Die Hard*****

INFA 610 First Paper ***** CHRISTIE 24JAN2011 to 01MAY2011

First Individual Paper: 20%

You will be graded on two short papers of 5-6 pages in good APA style.

The first is to be on a technology issue in information assurance.

http://www.fas.org/sgp/spb/whitepap.html

Read that magazine: The Economist, titled, *****Cyberwar Threat from the internet***** and see where you can use or get some key information.

http://www.economist.com/node/16478792

What will cyberwar look like? In a new book Richard Clarke, a former White House staffer in charge of counter-terrorism and cyber-security, envisages a catastrophic breakdown within 15 minutes. Computer bugs bring down military e-mail systems; oil refineries and pipelines explode; air-traffic-control systems collapse; freight and metro trains derail; financial data are scrambled; the electrical grid goes down in the eastern United States; orbiting satellites spin out of control. Society soon breaks down as food becomes scarce and money runs out. Worst of all, the identity of the attacker may remain a mystery.

(Murphy, 2010)

Murphy, M. (2010, July 01). War in the fifth domain. Then Economist, 396(8689), 3.

http://www.economist.com/node/16481504

http://www.economist.com/node/16481504/comments

http://blog.cybersecuritylaw.us/2010/07/the-economist----cyberwar-the-threat-from-the-internet.html

Google Search: http://www.google.com/search?q=The+Economist+The+threat+from+the+internet&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en

Good summary: http://en.wikipedia.org/wiki/Information_assurance

Google Search: http://www.google.com/search?q=Information+Assurance+issues+of+today&rls=com.microsoft:en-us:IE-SearchBox&ie=UTF-8&oe=UTF-8&sourceid=ie7&rlz=1I7ADBS_en

Look in and research via your membership with ACM & Microsoft TechNet and see if you can come up with anything.

Site the Bruce Willis Movie, *****Live Good, Die Hard*****

FIRE SALE

Myth?

3 step systematic attack on the entire national infrastructure

1. Take out all of the transportation

2. Financial base & telecoms

3. Get rid of all utilities; gas / water / electric / nuclear / pretty much anything that is run by computers (which today is almost everything).

4. That*****s why they call it a File Sale because everything must go

If you take out any one (x1) thing the system can recover, however, if you take it all down the system crashes.

*****You write one little piece of code and the world falls apart.*****

Virtual terrorism

Eastern Power Grid

Middleton, WV

http://www.imdb.com/title/tt0337978/goofs

http://www.filmsite.org/series-diehard4.html

http://www.nationalgrid.com/

How to Reference "Technology Issue in Information Assurance" Term Paper in a Bibliography

Technology Issue in Information Assurance.” A1-TermPaper.com, 2011, https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974. Accessed 6 Jul 2024.

Technology Issue in Information Assurance (2011). Retrieved from https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974
A1-TermPaper.com. (2011). Technology Issue in Information Assurance. [online] Available at: https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974 [Accessed 6 Jul, 2024].
”Technology Issue in Information Assurance” 2011. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974.
”Technology Issue in Information Assurance” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974.
[1] ”Technology Issue in Information Assurance”, A1-TermPaper.com, 2011. [Online]. Available: https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974. [Accessed: 6-Jul-2024].
1. Technology Issue in Information Assurance [Internet]. A1-TermPaper.com. 2011 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974
1. Technology Issue in Information Assurance. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/technology-issue-information-assurance/4865974. Published 2011. Accessed July 6, 2024.

Related Term Papers:

Information Security and Assurance Term Paper

Paper Icon

policy for accessing a system you can use a closed or open approach. Decide which policy you would select for a system that has access to confidential data (such as… read more

Term Paper 3 pages (1148 words) Sources: 6 Topic: Computers / IT / Internet


Computer Network Security -- Information Assurance Issues Essay

Paper Icon

Computer Network Security -- Information Assurance Issues

Discussion Question 1 - Information Assurance and IA-CMM.

In general, information assurance relates to the three "CIA" elements of information confidentiality, integrity, and… read more

Essay 2 pages (588 words) Sources: 2 Topic: Management / Organizations


Information Technology (IT) Issues in E-Business Research Paper

Paper Icon

role of information assurance on improving trust and efficiency in e-Business.

IT issues in E -Business

The field of Information technology has affected the way business is conducted across the… read more

Research Paper 16 pages (4099 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Technology for Management Essay

Paper Icon

Technology in Management

The Fargus Benevolent Fund is a regional specialty insurance company providing weekly-premium health insurance primarily to lower-income customers. They currently operate on a large mini-computer system that… read more

Essay 6 pages (2751 words) Sources: 6 Topic: Business / Corporations / E-commerce


Ethics Chapter

Paper Icon

Descriptive research attempts to define and understand what is happening in more detail and with more support. This attempt at descriptive research entails efforts to find common definitions and terms… read more

Chapter 3 pages (1012 words) Sources: 5 Topic: Computers / IT / Internet


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!