Verified Document

Dod And Cyber Attacks Term Paper

¶ … gathered on the DOD The tools and a description of the how they are used

What sort of attacks would work in this case? Give some examples and how you would carry them out

What social engineering and physical security aspects were discovered / devised? Give a detailed explanation

What methods could you employ to help secure these vulnerabilities? What suggestions would you make to the organization if you were a penetration tester?

Attack Project Paper

Over the last several years, the Department of Defense (DOD) has become the subject of cyber attacks. This is because of the information, which is possessed on their networks and the large turnover of people is exposing them to more threats. A good example of this can be seen with information compiled by the U.S. Department of Homeland Security. They found that the DOD is receiving a total of 10 million attacks per day. ("How Many Cyber Attacks Hit the U.S. last year," 2014) This is problematic, as it has the potential to create severe disruptions and a loss of sensitive information.

To address these issues a new strategy must be implemented. This involve analyzing the information which is gathered, the tools, the kinds of attacks that work, social engineering / physical security and the methods to deal with vulnerabilities. Together, these elements will illustrate the best avenues for preventing these kinds of attacks against the DOD.

The information that was gathered on the DOD

The various sources are showing how the DOD is vulnerable to a variety of cyber attacks. The most notable include: social engineering, password based, and Trojans...

Parts of this document are hidden

View Full Document
svg-one

Each one of them has been utilized in the past to disable their networks and make it difficult for personnel to access them. This exposes the DOD to major breaches, with hackers able to steal a number of classified documents in the process. (Insinna, 2013) To make matters, worse they are planning on rolling out their own version of 4G. This is supposed, to allow personnel to have access to greater amounts of information. However, the problem is that it exposes them to more threats with hackers being able to breach these devices and the information that is on them. (Roulo, 2013)
The tools and a description of the how they are used

There are a number of tools which are used by hackers to attack the DOD's network. The most notable include: social engineering, password based and Trojan types of attacks. Social engineering is when there is an attempt to use deception to gain access to information. This is achieved utilizing a number of tactics such as: cloning IDs or emails to tricking an individual into thinking it is from an important source. Once this happens, is when they can gain access to employee names, numbers or passwords. Password-based techniques are trying to break into the site through trying a series of user names and passwords. This is used in conjunction with social engineering or brute force to find methods that are successful. A Trojan is when a malicious email is sent to individuals inside the organization. The basic idea is to encourage them to open it and visit the link inside. This will enable the hackers to gain access to organization's information. (Amoroso, 2012) (Pelt, 2014)

What sort of attacks would work in this case? Give some…

Sources used in this document:
References

How Many Cyber Attacks Hit the U.S. last year? (2014). Next Gov. Retrieved from: http://www.nextgov.com/cybersecurity/2013/03/how-many-cyberattacks-hit-united-states-last-year/61775/

Amoroso, E. (2012). Cyber Attacks. Oxford: Butterworth.

Insinna, V. (2013). Department of Defense Infrastructure still Vulnerable. National Defense Magazine. Retrieved from: http://www.nationaldefensemagazine.org/archive/2013/June/Pages/DefenseDepartmentInfrastructureStillVulnerabletoCyber-Attacks, CriticsSay.aspx

Pelroth, N. (2014). Cyber Espionage Attacks. New York Times. Retrieved from: http://bits.blogs.nytimes.com/2014/05/29/cyberespionage-attacks-tied-to-hackers-in-iran/?_php=true&_type=blogs&_r=0
Roulo, C. (2013). DOD must stay ahead of Cyber Threat. Department of Defense. Retrieved from: http://www.defense.gov/news/newsarticle.aspx?id=120379
Santos, A. (2013). China is Winning the Cyber War. The Wire. Retrieved from: http://www.thewire.com/global/2013/05/china-hackers-pentagon/65628/
Cite this Document:
Copy Bibliography Citation

Related Documents

Attacks on Pearl Harbor and the World
Words: 8509 Length: 27 Document Type: Term Paper

Attacks on Pearl Harbor and the World Trade Center had similar historical events surrounding each attack. Franklin Delano Roosevelt and George W. Bush used similar policies to combat further attacks and unite the nation The paper highlights the entwined American reactions to the September 11 attacks and the Pearl Harbor attacks. The paper illustrates the similarities in which the over-prevailing backgrounds of each event created reactions to the devastating measures that

Attack on Pearl Harbor Lessons
Words: 973 Length: 3 Document Type: Essay

Yamamoto noted that "the war would continue for several years, our supplies would be exhausted, our ships and arms would be damaged and ultimately we would not be able to escape defeat." (Akira, 1990, pp.133-134). Masaru (1990) added that another difficulty between the two nations was America's attitude during the U.S.-Japanese negotiations on the eve of the outbreak of war. In particular, Masaru points to the hard line position of

Attack of the Butterflies Mark
Words: 1763 Length: 5 Document Type: Essay

The trick is not to focus on any of this, but to focus on preparation and then on the real thing. Do you think you're afraid to talk in front of other people? Guess what? The average person says 15,000 words per day. Unless you're in solitary confinement, those words are spoken to other people, sometimes two, three or more at the same time. You speak to family, friends, fellow

Attack in 2001 Was in
Words: 3433 Length: 10 Document Type: Term Paper

Such an attitude is part cultural clash and part resp0onse to external events, but it fosters a way of thinking that only leads to more conflict over time. U.S. support for Israel is often cited as the key element in explaining Islamic hatred of America, but that is only one element. The way the U.S. fails to understand Islam is another element that creates tension. Also, actions such as those

Attack of 911 Has Posed a Serious
Words: 4017 Length: 10 Document Type: Term Paper

attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to

Attack Causality in Internet-Connected Cellular Networks, Internet...
Words: 796 Length: 2 Document Type: Essay

Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now