Sie sind auf Seite 1von 3

Chatla 1

Vennela Chatla

10-12-18

Period 3

Title : Cyber Weapons used in Militaries

Research Question :

Is it possible to limit the accessibility of cyber-weapons and increase security of other systems

and databases along with decreasing the number of cyber attacks made by unethical hackers?

Hypothesis :

If promotion of white hat hacking and regulations were in place to limit cyber weapons there

would be less cyber attacks and our security and private information would be safer and harder

to hack.

Background/History of the Issue:

A computer ​hacker ​is any skilled computer expert that uses their technical knowledge to

overcome a problem. ​Cyber weapons​ are becoming increasingly popular among the military.

The attacks can be used to disable financial systems and organizational systems by stealing or

altering classified data. Hackers can easily get access to sensitive information. ​D​enial-of-service

(DoS) attacks​, cybersecurity events that occur when attackers take action that prevents

legitimate users from accessing targeted computer systems, devices or other network resources.

Complete anonymity and encrypted access can be achieved by anyone, making firewalls and

other systems vulnerable to cyber attack. Many countries have yet to implement regulations of

Cyber-Weapons as they could have devastating impacts on the world. Some hackers use their
Chatla 2

ability to access and spread secretive information. For reasons such as expressing a political

motive and many more.

Rationale:

This problem is important because cyber attacks can have lasting effects on humanity and the

way society functions. Computer worms can infiltrate systems and disrupt the computers

drastically. I also want to inform others on the fact that all technology can be vulnerable to

hacks and that our private information will never be private online. I also want others to know

that this is no little problem and the leakage of our personal information can be very bad.

Basis of Hypothesis:

I focused my hypothesis on ethical hacking because I believe with ethical hacking we can

improve our security and get rid of loopholes that hackers can easily access. By finding these

loopholes ourselves, we can be better educated about cyber security thus being able to effectively

defend our private information away from hackers.

Operational Definitions:

A ​white hat hacker​ is a computer security specialist who breaks into protected systems and

networks to test and asses their security. ​White hat​ hackers use their skills to improve security

by exposing vulnerabilities before malicious hackers (known as black ​hat​ hackers) can detect

and exploit them. Placing regulations would limit the devastating and lasting impacts that cyber

attacks could have when used in the military

Descriptors Used for Literature Search:

- Cybersecurity on modern technology


Chatla 3

- Use of cyber weapons in militaries

- Impacts of cyber attacks

- Benefits of ethical hacking

- Statistics of cyber attacks

Das könnte Ihnen auch gefallen