-
Essay / Cybersecurity - 1798
President Obama declared that "the cyber threat is one of the most serious economic and national security challenges we face as a nation" and that "America's economic prosperity in the 21st century will depend on cybersecurity. » Cybersecurity is more important than ever; more and more people are using remote access instead of coming into the office. Hard drives, both mechanical and SSD, are being replaced by “cloud computing/storage”. A quick look through Google shows many ways to compromise a system. To help understand these threats, we will look at the types of threats and they can be used; legislation that has/is under review and possible recommendationsWhat are the threats to cybersecurity? There are three main threats to cybersecurity: First) a naturally occurring or man-made EM pulse. 2) computer viruses/malware, the installation of which is passive; an application is ready to be downloaded by a user; or active, when one or more people target a specific system hack. 3) From the inside. Each of these actions has its unique way of sowing chaos through an orderly system, thereby compromising national security. .EM PulseOne, The quickest way to disable a cybernetic system, power grid, or anything else that runs on electricity or programming is with an electromagnetic pulse or EM pulse. An EM pulse can be caused both by natural means (this is what gives us the Northern Lights and can be relatively benign), or can be man-made. An artificial EM pulse was first experimented with during early high-altitude nuclear weapons tests. The phenomenon is characterized by a short but powerful burst of electromagnetic waves which propagate from the device in decreasing waves of intensity, in short it is in the middle of a paper ...... y, if the past is By any guide, a major disaster such as an EM pulse or a rogue drone attacking a major civilian target will have to occur before anything significant is done. A possible scenario. It's 2020, threat forces have managed to obtain an American drone large enough for their objectives - disrupting American infrastructure. The drone payload is a dirty EM device. Thanks to a cyberlink, the vehicle is launched. Undetected, the craft approaches the drone's estimated flight distance and launches the device toward Miami, Florida. Once at altitude and still undetected, the drone explodes creating an EM pulse (shock wave). The consequences are devastating for both life and property. Emboldened by their success, the threatening force prepared another created by reverse engineering the first; this time a ransom is demanded or another American city is attacked.