Sie sind auf Seite 1von 10

Running Head: CYBER SECURITY

Cyber Security: Literature Review


Brandon T. Dawson
The University of Texas at El Paso

CYBER SECURITY: LITERATURE REVIEW

Abstract
The Cyber World is a rapidly developing virtual world within our physical world. The
Cyber World has been intertwined with reality, it has become a place for individual,
organizational, and governmental operations, where everything from personal experiences to
personal finances are stored. Society relying so much on Cyber space has resulted in the need for
increased Cyber Security, as the amounts of threats and intrusions are on the steady incline. The
purpose of this literary review is to find out what has caused a high demand of Cyber Security
Analysts in the military and private sector, and the need of defined characteristics of threats, in
order to come up with methods to keep cyber-intruders out of all networks, as efficiently as
possible.

CYBER SECURITY: LITERATURE REVIEW

Introduction
In todays day and age, internet based technology is just about everywhere you look, it is a
necessity because it is required in all aspects of life, from academics to the professional world
you must have access to the world wide web in order to be successful. Since the internet is so
regularly used, it has opened the door to a whole new virtual threat which possibly can be
harmful to your life in the real-world. Cyber security can be broken down into a couple
subtopics, to include home potential identity theft, which could result in your financial
information being at risk, and home network monitoring limitations, where the youth has access
to information and videos which could be harmful to the developing human.
Cyber security is based on an opposed threat to all internet users, therefore the topic falls
under multiple discourse communities, such as academic, professional, family, and more. This is
a relevant and vital topic to these specific discourse communities because they all require
internet usage, where their identity, financial information and other personal information quite
possibly could be at risk. These risks are significant because they could be detrimental to an
individual or an entire organizations credit, finances, and dignity. Cyber Security threats can also
cause trouble for a military unit
This literature review will use multiple sources to answer certain questions in regards to
cyber security issues in 2015. The questions that this paper will seek to answer are to follow:

What does it take to be a Cyber Security Analyst in the military?


What are the characteristics of a cyber-threat or attack?
How do you keep network intruders out?

What does it take to be a Cyber Security Analyst in the military?

CYBER SECURITY: LITERATURE REVIEW

In a recent interview with a U.S. Army Chief Warrant Officer, who is in charge of cyber
security for the 2nd Brigade Combat Team on Fort Bliss, questions were answered in regards to
how one becomes an Army Cyber Security Analyst and how they operate day to day in multiple
scenarios, due to security reasons, this individuals name can not be exposed and will be referred
to by their rank only. According to

Figure 1: U.S. Army Cyber Command logo

the

Chief, in order to become a Cyber


Security Analyst in The United States Army, one
must first gain experience by working within the
signal corps military occupation specialty, where
they will then gain multiple security certifications
and must pass the Army Cyber Security Course,
which he referred to as the hardest course in the

(U.S. Army Cyber Command, 2015)

Army.
Furthermore, it is not an easy task to become a
military Cyber Security Analyst because in the
modern society, we are not only engaged in hand to hand combat, but we are also faced with
cyber warfare. Chief is faced with many crucial responsibilities, such as monitoring the network
traffic within his unit, specifically to ensure that signal soldiers maintain criteria to manage
systems on their network and end make sure all individuals on the network maintain the proper
credentials to be on the net. When in a deployment setting the tone of the job becomes even more
serious, since a military Cyber Security Analyst is then responsible for additional tasks, such as
ensuring that the network is also secure from outside intruders who may be seeking classified
military intelligence.

CYBER SECURITY: LITERATURE REVIEW

When the Chief detects a threat, the hardest part of his job then begins, since he has to
implement the newest and latest patches and update all of the networks security features, to
include re-establishing the firewalls. The types of threats that come across a military network
include individuals who are attempting to retrieve passwords, in order to infiltrate classified
intelligence for the purpose of having the upper hand in a possible combat setting. When a threat
is detected, immediate action takes place, which includes tracing the IP address of the computer
used in the attack. (U.S. Army Chief Warrant Officer, personal communication, October 02,
2015).
What are the characteristics of a cyber-threat or attack?
If you take a second and think about it, you will realize the fact that financial transactions
are becoming more and more digitalized as time progresses. Most people pay with cards rather
than cash, simply use the payment method straight from their phone, make online purchases, and
have direct access to their bank accounts through a phone application. The risk of an individual
or an entire organizations financial information stolen over a network is increasing, which is why
Anca Dinicu of The Land Forces Academy says, nowadays, the cyber threat is one of newest
and most challenging threats to security, being able to jeopardize not only the safety of a state
entity, but also the functioning of the international organizations, of the international
organizations, of the economic and financial companies. (2014, p. 110)
The New York Times article; Hacking Linked to China Exposes Millions of U.S. Workers,
reveals a serious occurrence of Chinese based hackers stealing personal information from U.S.
federal employees, to include social security numbers. But are those individuals who are
responsible going to be dealt with? A F.B.I. spokesman by the name of Joshua Campbell,
confirmed that they would be, we take all potential threats to public and private sector systems

CYBER SECURITY: LITERATURE REVIEW


seriously, and will continue to investigate and hold accountable those who pose a threat in
cyberspace, (2015). The cyber related threats to federal organizations seems to be growing
drastically, in fact gathered data, from the years 2006-2014 will show a growth in amounts of
reported cyber security incidents by a staggering 1,121 percent.
Figure 2: Incidents Reported to US-CERT by Federal Agencies in Fiscal Years 2006-2014

CYBER SECURITY: LITERATURE REVIEW

(U.S. Government Accountability Office, 2015)

How do you keep network intruders out?


Imagine this, a multi-billion dollar companys headquarters, everything about this
company is inside of this building, all of their products, financial information, and more. This
building would require a great amount of security features, so they are not over-ran and
compromised. Now take this building and condense it into the form of a computer, it is just as
important to add serious security features to the network that this computer resides on, in order
for this information and productivity to not be compromised. This only difference is that instead
of cameras, metal detectors and security guards, you have virus protection, firewalls, and cyber
security representatives.
To continue, having seen evidence that shows how rapidly and how greatly the amounts of
cyber-attacks are occurring, one might be forced to believe that organizations must be taking all
of the proper steps to defend against such attacks. Contrary to this idea, in an article titled,
controlling the threat by Paul Marsh, he says, As progress is made towards understanding the
nature of the cyber-security risk, the volume of useful standards, security profiles and risk

CYBER SECURITY: LITERATURE REVIEW

assessment methodologies is growing. However, a survey conducted by the ARC Group this year
revealed that most companies were not adhering strictly to the wording of these. (p. 17, 2006)
This claims that many companies are not complying with set protocols to keep intruders out of
their networks and instead taking matters into their own hands.
Roger Darby, the author of Cyber Defense in Focus: Enemies Near and Far or Just
Behind the Firewall: The Case for Knowledge Management argues that rather than just the four
domains of warfare, (land, sea, air, and space) that there actually is five domains now, adding
cyberspace to the mix. (p. 523, 2012) This goes to show that just like all other aspects of our
national defense, cyber security should be treated just as seriously, which could call for security
beyond virus protection and firewalls.
Conclusion
In conclusion, this literary review has identified a great increase in threats within the cyber
world, and answered multiple questions having to do with cyber security occupations and
defense. The issue of total cyber security seems to be un-solvable, just as total security within the
physical world seems to be un-solvable, since there will always be gaps in security and crimes
never stop taking place. Individuals, organizations, and the government must defend in all ways
possible against cyber-attacks, so as much important information as possible can be safeguarded.
One must take the steps to become a cyber security analyst within the military, to include gaining
experience in the signal corps, and completing the training courses to gain certificates, the
characteristics of a cyber-attack include financial information being compromised and a drastic
increase in threats, threats which need to be stopped by setting up firewalls, employing cyber
security representatives and sticking to protocol.

CYBER SECURITY: LITERATURE REVIEW

References
Darby, R. (2012). Cyber defence in focus: Enemies near and far or just behind the firewall: The
case for knowledge management. Defence Studies,12(4), 523-538.
doi:10.1080/14702436.2012.745964
DINICU, A. (2014). Cyber threats to national security. Specific features and actors
involved. Buletin Stiintific, 19(2), 109-113.
Marsh, P. (2006). Controlling the threat [industrial control system cyber-security]. Computing &
Control Engineering, 17(2), 12-17. doi:10.1049/cce:20060201
Sanger, D. E., & Davis, J.H. (2015, June 04). Hacking linked to china exposes millions of u.s.
workers. The New York Times. Retrieved from
http://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposespersonnel-data.html?_r=0

CYBER SECURITY: LITERATURE REVIEW


10
U.S. Army Cyber Command. (2015, October 14). U.S. army cyber command logo. Retrieved
from http://www.arcyber.army.mil/
U.S. Government Accountability Office. (2015, Febuary 11). Ensuring the security of federal
information systems and cyber critical infrastructure and protecting the privacy of
personally identifiable information. Retrieved from http://www.gao.gov/highris
k/protecting_the_federal_government_information_systems/why_did_study#t=1

Das könnte Ihnen auch gefallen