This website uses cookies to ensure you have the best experience. Learn more

Defense Attacks Essay

2314 words - 10 pages

The Department of Defense (DoD) manages one of the largest and most targeted networks, up to 250,000 attacks per day. (Daniel Gouré, 2015) As a member of this organization, I see the low level applications set forth by the strategic minds of the DoD Chief Information Officer and Secretary of Defense. As the organization that laid the foundation for the internet, the DoD has evolved over the years reacting to the vulnerabilities and threats to their vast information systems. Past breaches have illustrated how vulnerable the networks are, and we can look at history to see the development of the defense networks and security.
The DoD made a large impact across the computer security field with ...view middle of the document...

As civilian organizations adopted this handbook, it was evident that heavy emphasis on preventing the disclosure of classified data dominates the security requirements, and there is a lack of business-minded requirements such as availability and integrity. This is due to the fact that the document was organic to defense and government organizations. The document has a strict guide of security demands, but does not go further to link them to specific security features. This model has been revisited and refined to the current governing document “DoD 8500.01,” for the security of the information systems used by the Department of Defense. (Claudio Agostino Ardagna, 2008)
One of the historical cyber events that affected the modern cyber strategy was the Morris worm. The worm was released November 1988, and was intended to gauge the size of the internet; however, it replicated itself and subsequently turned into one of the first denial of service attacks. The creator, a Cornell University graduate student, became the first prosecuted under the Federal Computer Fraud and Abuse Act of 1986. (Markoff, 1990) The reaction from the government was the creation of a computer emergency response team coordination center (CERT-CC) by the Defense Advanced Research Projects Agency (DARPA). The mission of the CERT-CC is to work with computer and software developers and government agencies to improve security and improve incident response. This was a major event setting the precedence for future cyber incidents, where the government turns to experts to analyze and respond. The CERT-CC falls under the Software Engineering Institute of Carnegie Mellon University, and has grown to over 150 cybersecurity professionals. Today it works closely with the Department of Homeland Security. (Kelty, 2011; CERT Division, n.d.)
In 2015, The DoD published the “The Department of Defense Cyber Strategy”, defining the strategic level goals for the organization going forward. The document defines three main goals for cyberspace: to defend the networks and information, to protect U.S. interests against cyber attacks, and to be prepared to conduct supporting or offensive operations. (Department of Defense, 2015) What makes the Department of Defense unique is that they need to be capable of offensive operations both unilaterally, and in support of other units across the DoD, Department of State, and Intelligence Communities. Building both offense and defense capabilities at the same time will prove challenging, as the recent breaches have exposed. (Department of Defense, 2015)
For any organization, the Advanced Persistent Threat (APT) is the most damaging and ominous type of hostile possibility. The Moonlight Maze attack, starting in 1998, was a year long Russian-sponsored intrusion into the Pentagon, Department of Energy, and National Aeronautics and Space Administration computer networks. (Drogin, 1999) The breach was on the unclassified network, however, the data was reported to be...

Other Papers Like Defense Attacks

Self-Defense Essay

903 words - 4 pages first to be able to learn how to properly defend one self. Through this bond, one can learn to remain calm during a difficult situation, dominate their instincts and adequately protect valuables, others or ideals without the need of violence. Just as well, one can defend their well-being without the fear of lacking the proper mechanics to fend off any incoming attacks. Self-defense has seen a wide use in our modern Western culture, specifically in

Comparing the United States, China, and Russia Defense Budget Expenditures

1632 words - 7 pages Over many years the three military powerhouses of the world are the United States, China, and Russia. The United States Armed Forces consist of five branches, the Army, Navy, Marine Corps, Air Force, and the Coast Guard. The President of the United States is the head of the military. Under the president is the Department of Defense which implements military polices. The DOD is lead by the Secretary of Defense, which is second in command to the Lab Cnaa

608 words - 3 pages site provides multiple resources, including a list of the top 20 Critical Security Controls for Effective Cyber Defense and the weekly @Risk: The Consensus Security Alert newsletter. This newsletter details new network attacks and vulnerabilities. In this lab, you will navigate to and explore the SANS site, use the SANS site to identify recent network security threats, research other websites that identify threats, and research and present the

Common Forms of Attacks on Microsoft Systems

600 words - 3 pages in itself has many different forms depending on what the attacker wants to accomplish. This virus alone can be a backdoor, denial of service, fake AV (program that simulates antivirus software), and banker (which steals your banking information like credit cards and e-payment systems). All in all, in order to stop these many different types of attacks on computer systems and networks a multilayered defense in necessary in order to reduce the

Pos/355 Week5 Individual

978 words - 4 pages , like overwriting a stored user ID. The attacker can also overwrite the pointers on the heap when a buffer overflow occurs, allowing the attacker to potentially substitute different or change data. Overflows on the heap are more difficult for attackers to exploit, but preventative and protective measures must be put in place to defend against all forms of buffer overflow attacks. The first line of defense is for programmers to carefully inspect

Executive Summary- Boeing

627 words - 3 pages been geared towards the commercial airplane division. Boeing faced a decrease in their sales after the terrorist attacks of September 11th. People were afraid to fly. The demand for flights decreased, and, therefore, the need for new airplanes decreased. However, after the terrorist attacks, the United States entered into war. This would increase the demand for defense airplanes. Boeing could implement the e-Enabling Advantage they have

Intrusion Detection

1098 words - 5 pages along with other preventive security mechanisms, such as access control and authentication, as a second line of defense that protects information systems. Intrusion detection provides a way to identify and thus allow responses to, attacks against these systems. Second, due to the limitations of information security and software engineering practice, computer systems and applications may have design flaws or bugs that could be used by an intruder

Internet Mitigation

906 words - 4 pages the bad. For instance, an incoming IP address might make a request for pages that don't exist on the server. The software would block that IP address from making further requests until it began behaving normally again. Another migration strategy would be to simulate attacks as an exercise. Examine the company’s network through the eyes of a hacker to determine where defenses are weak (Paquette 2012). Organizations should build DDOS defense into

Does Using Drones to Attack Terrorists Globally Violate Interenational Law?

1584 words - 7 pages permits. Some, like State Department legal advisor Harold Koh, take the position that beyond the battlefield, we can attack only those “high-value individuals” who are actually engaged in plotting attacks on the United States, and only where their threats are specific enough to allow the US to claim the right to self-defense granted to all states under the UN Charter. The Charter permits nations to use unilateral military force only in self-defense

Identifying Potential Risk, Response and Recovery

1294 words - 6 pages needs to be an antivirus installed on the network like Norton or Symantec which blocks threats targeting the vulnerabilities. Your firewall, which is your first line of defense, is susceptible to two common types of attacks. First there are attacks against the firewall itself with the purpose of the attacker being to take control of the firewalls functionality and then launching a DoS attack. The second type of attack against firewalls is an

Security Attaks

1273 words - 6 pages (for example, “Click here to update the records for your credit card to make it more secure.”). The phisher hopes that a few people will take the bait, connect to the illegitimate website, and enter information such as their name, address, credit card number, social security number (in the U.S.), or other national government ID number. The best defense for phishing attacks may well be better user training and more awareness about the exposure.  Malware: This refers to a broad class of malicious viruses, including spyware. The solution to these and the many other security issues not mentioned here is to provide security in depth throughout the network.

Related Essays

Ethical Hacking Essay

1144 words - 5 pages things work Hands-On Ethical Hacking and Network Defense 6  Tiger box  Collection of OSs and hacking tools  Usually on a laptop  Helps penetration testers and security testers conduct vulnerabilities assessments and attacks Hands-On Ethical Hacking and Network Defense 7  White box model  Tester is told everything about the network topology and technology  Network diagram  Tester is authorized to

Web Server Application Attacks Essay

1674 words - 7 pages DDoS attacks cannot be prevented outright, organizations are not defenseless. By working with their Internet service providers and deploying specialized DDoS defense technologies and services, government and political organizations can mitigate the effects of DDoS attacks to ensure that election-based information, voting details, and general political services remain available over the Internet. There are several steps that government agencies

Rlot Task 2 Essay

1004 words - 5 pages RLOT Task 2 With the availability of open source tools and resources to cybercriminals, it has become extremely difficult to combat distributed denial of service (DDoS) attacks. Typically DDoS attacks occur at the network layer by SYN flooding, ICMP flooding, and UDP flooding. Some times DDoS attacks fail at the network layer when this happens cybercriminals shift to application layer attacks. Application attacks occur by sending an

Sociology Essay

1437 words - 6 pages very few attacks on U.S. soil have had any measure of success. Since 9/11 the frequency of attacks initially increased and then generally decreased after 2001. Protecting Americans from terrorist attacks remains an ever changing challenge for the department of Defense and Homeland Security. It is now important more than ever to understand that there is no silver bullet for thwarting terrorist attacks. No single method can disrupt terrorist attacks