The data mining operation was so successful that, while detected, still managed to make-off with a significant amount of information.
Since the attack, the United States responded in a number of critical ways. Almost immediately upon learning of the threat, the Pentagon required all defense employees to change sensitive passwords, though this requirement was even hacked by the attackers, allowing them to change their tactics accordingly (Vistica, 1999; Bridis, 2001). Other, longer-range responses will hopefully have more success in preventing future attacks such as the Moonlight Maze attack. For instance, the assistant secretary of defense for command, control, communications and intelligence -- Arthur Money -- stated that the Pentagon's primary unclassified computer system was so significantly compromised by the attacks as to render it unusable. Within a few months of discovery of the infiltration of the system, the Department of Defense decided to route all of the communications that previously went through that network through eight large electronic gateways, in the hope that this will make monitoring of traffic and access easier. The Pentagon has also ordered that $200 million be spent on new encryption technology for all systems, including intrusion detection technology, new firewalls, and password encryption (Drogin, 1999). These efforts are designed to cinch up many of the cybersecurity "holes" discovered in the wake of the Moonlight Maze incident. Of course, all of these efforts occurred after sensitive data had already been pilfered over a period of years.
The most usual response of the government, and the ultimate aim of its efforts, has been punitive in nature: track down the offenders and punish them. If the hackers prove to be civilians, then the U.S. government is prepared to fully prosecute them for this intrusion in their systems. if, on the other hand, the perpetrator is found to be another nation, then the government will likely consider a retaliatory cyber-attack against that nation in retaliation. To that end, new offensive protocols have been added to the agency that controls the military's computer systems, and increased funding has been provided for such operations over the coming years (Bridis, 2001). Perhaps, the most significant effect to emerge from the Moonlight Maze incident was increased communication and coordination between various law enforcement and intelligence agencies such as the FBI, CIA, NSA, and others. Up until this point, coordination of information between these agencies had been mediocre at best (Bridis, 2001; Kitfield, 2000).
Moonlight Maze demonstrated how an uncoordinated response would be ultimately ineffective against such a coordinated attack on sensitive military computer systems. This increased cooperation and coordination that emerged after Moonlight Maze, in fact, ultimately led to the Department of Homeland Security in the wake of the September 11th attacks, to further improve inter-agency coordination. Whether or not the enhanced coordination between these agencies as well as the increased security measures at the Department of Defense will deter or help ward off cyber-attacks is, as of yet, unclear.
Case Study #2: Fermilab File-Sharing Fiasco
In June 2002, computer system administrators at the Fermi National Accelerator Laboratory near Chicago, Illinois discovered that an unidentified hacker had broken into the computer system at the laboratory (Van, 2003). This breach of data security was treated with extreme caution and concern. Immediately, the lab issued a full alert and shutdown of the computer systems for three days while determinations could be made as to the extent of the presumed attack. Fermilab is responsible for the integrity of the United States nuclear arsenal. As such, any breach of data security at the lab stands as a significant break of national security. If the case had evolved into an example of malicious hacking or directed terrorism, the results for national security could have been exceptionally disastrous. As the case makes evident, however, this breach of data security occurred for very different reasons that we might ordinarily expect and consisted of no real malicious intent. Nonetheless, the apparent ease with which the hacker was able to exploit a weakness in such a crucial system of the U.S. Department of Energy should give us pause. If this had been a willfully malicious hack of Fermilab, the results for national security could have been extremely adverse.
Technicians at Fermilab first discovered that there might be a problem after noticing that scheduled backups of the system were taking much longer than normal...
Cyber Security Vulnerabilities in Space Vehicles Cyber Security VulnerabilitiesAbstract 1Introduction 3Background 4Overview of Space systems 4The developing threat in Cyberspace 5Space Vehicles attack surface 6Cyber Security Vulnerabilities in Current Space Systems 6Advanced Persistent Threats 7Improperly secured ground facilities 11Space Segments Vulnerabilities 12Small Satellites Vulnerabilities 12Current Cyber Security Mitigation Techniques 13Conclusion 16AbstractThe advancement of innovations, views, and funding alters the outer milieu by making it more accessible to many individuals. The
Essay Topic Examples 1. The Role of Information Management in Healthcare Efficiency: This essay could explore how effective management of patient records, treatment data, and research information can streamline operations in healthcare facilities, improve patient outcomes, and facilitate medical advances. 2. Information Management Strategies in Disaster Response: Discuss the importance of information management during natural disasters or crises, including the coordination between agencies, the rapid dissemination of information, and the use of
CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past
Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison
His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive
Physical Security in Public AreasAbstract/SummaryThis paper examines the effectiveness of physical security measures in public areas, by looking at spaces such as schools, airports, stadiums, and malls. It discusses current strategies, including surveillance cameras, metal detectors, and access control systems. It also examines the need customized approaches since all spaces are different. Schools require security that balances safety with an open, welcoming environment, whereas airports can use stricter, more invasive
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now