Beruflich Dokumente
Kultur Dokumente
Abstract
The Cyber World is a rapidly developing virtual world within our physical world. The
Cyber World has been intertwined with reality, it has become a place for individual,
organizational, and governmental operations, where everything from personal experiences to
personal finances are stored. Society relying so much on Cyber space has resulted in the need for
increased Cyber Security, as the amounts of threats and intrusions are on the steady incline. The
purpose of this literary review is to find out what has caused a high demand of Cyber Security
Analysts in the military and private sector, and the need of defined characteristics of threats, in
order to come up with methods to keep cyber-intruders out of all networks, as efficiently as
possible.
Introduction
In todays day and age, internet based technology is just about everywhere you look, it is a
necessity because it is required in all aspects of life, from academics to the professional world
you must have access to the world wide web in order to be successful. Since the internet is so
regularly used, it has opened the door to a whole new virtual threat which possibly can be
harmful to your life in the real-world. Cyber security can be broken down into a couple
subtopics, to include home potential identity theft, which could result in your financial
information being at risk, and home network monitoring limitations, where the youth has access
to information and videos which could be harmful to the developing human.
Cyber security is based on an opposed threat to all internet users, therefore the topic falls
under multiple discourse communities, such as academic, professional, family, and more. This is
a relevant and vital topic to these specific discourse communities because they all require
internet usage, where their identity, financial information and other personal information quite
possibly could be at risk. These risks are significant because they could be detrimental to an
individual or an entire organizations credit, finances, and dignity. Cyber Security threats can also
cause trouble for a military unit
This literature review will use multiple sources to answer certain questions in regards to
cyber security issues in 2015. The questions that this paper will seek to answer are to follow:
In a recent interview with a U.S. Army Chief Warrant Officer, who is in charge of cyber
security for the 2nd Brigade Combat Team on Fort Bliss, questions were answered in regards to
how one becomes an Army Cyber Security Analyst and how they operate day to day in multiple
scenarios, due to security reasons, this individuals name can not be exposed and will be referred
to by their rank only. According to
the
Army.
Furthermore, it is not an easy task to become a
military Cyber Security Analyst because in the
modern society, we are not only engaged in hand to hand combat, but we are also faced with
cyber warfare. Chief is faced with many crucial responsibilities, such as monitoring the network
traffic within his unit, specifically to ensure that signal soldiers maintain criteria to manage
systems on their network and end make sure all individuals on the network maintain the proper
credentials to be on the net. When in a deployment setting the tone of the job becomes even more
serious, since a military Cyber Security Analyst is then responsible for additional tasks, such as
ensuring that the network is also secure from outside intruders who may be seeking classified
military intelligence.
When the Chief detects a threat, the hardest part of his job then begins, since he has to
implement the newest and latest patches and update all of the networks security features, to
include re-establishing the firewalls. The types of threats that come across a military network
include individuals who are attempting to retrieve passwords, in order to infiltrate classified
intelligence for the purpose of having the upper hand in a possible combat setting. When a threat
is detected, immediate action takes place, which includes tracing the IP address of the computer
used in the attack. (U.S. Army Chief Warrant Officer, personal communication, October 02,
2015).
What are the characteristics of a cyber-threat or attack?
If you take a second and think about it, you will realize the fact that financial transactions
are becoming more and more digitalized as time progresses. Most people pay with cards rather
than cash, simply use the payment method straight from their phone, make online purchases, and
have direct access to their bank accounts through a phone application. The risk of an individual
or an entire organizations financial information stolen over a network is increasing, which is why
Anca Dinicu of The Land Forces Academy says, nowadays, the cyber threat is one of newest
and most challenging threats to security, being able to jeopardize not only the safety of a state
entity, but also the functioning of the international organizations, of the international
organizations, of the economic and financial companies. (2014, p. 110)
The New York Times article; Hacking Linked to China Exposes Millions of U.S. Workers,
reveals a serious occurrence of Chinese based hackers stealing personal information from U.S.
federal employees, to include social security numbers. But are those individuals who are
responsible going to be dealt with? A F.B.I. spokesman by the name of Joshua Campbell,
confirmed that they would be, we take all potential threats to public and private sector systems
assessment methodologies is growing. However, a survey conducted by the ARC Group this year
revealed that most companies were not adhering strictly to the wording of these. (p. 17, 2006)
This claims that many companies are not complying with set protocols to keep intruders out of
their networks and instead taking matters into their own hands.
Roger Darby, the author of Cyber Defense in Focus: Enemies Near and Far or Just
Behind the Firewall: The Case for Knowledge Management argues that rather than just the four
domains of warfare, (land, sea, air, and space) that there actually is five domains now, adding
cyberspace to the mix. (p. 523, 2012) This goes to show that just like all other aspects of our
national defense, cyber security should be treated just as seriously, which could call for security
beyond virus protection and firewalls.
Conclusion
In conclusion, this literary review has identified a great increase in threats within the cyber
world, and answered multiple questions having to do with cyber security occupations and
defense. The issue of total cyber security seems to be un-solvable, just as total security within the
physical world seems to be un-solvable, since there will always be gaps in security and crimes
never stop taking place. Individuals, organizations, and the government must defend in all ways
possible against cyber-attacks, so as much important information as possible can be safeguarded.
One must take the steps to become a cyber security analyst within the military, to include gaining
experience in the signal corps, and completing the training courses to gain certificates, the
characteristics of a cyber-attack include financial information being compromised and a drastic
increase in threats, threats which need to be stopped by setting up firewalls, employing cyber
security representatives and sticking to protocol.
References
Darby, R. (2012). Cyber defence in focus: Enemies near and far or just behind the firewall: The
case for knowledge management. Defence Studies,12(4), 523-538.
doi:10.1080/14702436.2012.745964
DINICU, A. (2014). Cyber threats to national security. Specific features and actors
involved. Buletin Stiintific, 19(2), 109-113.
Marsh, P. (2006). Controlling the threat [industrial control system cyber-security]. Computing &
Control Engineering, 17(2), 12-17. doi:10.1049/cce:20060201
Sanger, D. E., & Davis, J.H. (2015, June 04). Hacking linked to china exposes millions of u.s.
workers. The New York Times. Retrieved from
http://www.nytimes.com/2015/06/05/us/breach-in-a-federal-computer-system-exposespersonnel-data.html?_r=0