24 Jul 2022

49

A Vulnerable USA: Sprawling Issue of Cyberattacks

Format: APA

Academic level: Master’s

Paper type: Research Paper

Words: 753

Pages: 3

Downloads: 0

The technology era has opened up many opportunities and worked to speed up globalization. However, even with the opportunities, there are other disadvantages that have cropped up thanks to technological advancement. A notable negative impact of technological advancement is cyber-attacks. Cyber-attacks have been described as deliberate and malicious attempts by individuals or organizations to breach the information systems of other organizations or individuals with the objective of the attacker getting some benefits from the disruptions (Taylor, Fritsch & Liederbach, 2015).

America has been a target of cyber-attacks with attackers in many cases seeking ransom or obliterating data and systems. Cyber-attacks directed at American systems involve malware that is malicious software that disrupts systems making them inoperable. Additionally, phishing forms another form of cyber-attacks that are most common in American computer systems.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

A deficit in cybersecurity expertise 

There are several reasons that have been floated as being the reasons behind America being more vulnerable to cyber-attacks than any other country in the world. First, cybersecurity talent has been shown to be very low not only in America but also globally ( Blokdyk, 2018) . Specialized expertise is required to design, implement, and maintain systems that are secure. Therefore, with limited expertise, it has become easy for anyone to launch an attack on systems coupled with the fact that it has become relatively easy to acquire malicious software form the dark web to launch attacks.

Complacency 

Another significant factor that has been cited as making America more vulnerable to cyber-attacks is complacency ( Blokdyk, 2018) . While people and organizations are well aware of the damages that cyber-attacks pose to their operations, few have taken the adequate precautionary measures to thwart potential attacks. There is a general tendency of organizations not to update operating software as well as employing the use of antivirus software making systems vulnerable to cyber-attacks.

Limited viable deterrents 

Studies are pointing out that America is having limited viable deterrents for keeping belligerents from launching attacks on American systems. Unlike in military strength where few countries in the world can match America, cyber warfare has proven to level quickly noting that any country can launch an attack. Further research shows that even though America can retaliate and mount its own cyber-attacks there proves to be little that can actually be done to prevent worse retaliations ( Moallem, 2018) . Often, diplomacy, as well as economic sanctions, have been shown as the most effective deterrents but in most cases only when there is significant economic parity between the countries involved. For example, Russia has continued cyber-attacks on American systems despite many sanctions in addition to the country having many ways to retaliate should America launch its own cyber-attacks on Russia.

Critical infrastructure under threat 

Electricity infrastructure 

While previously critical infrastructure was viewed as being secure from cyber-attacks, recent studies are suggesting otherwise ( Moallem, 2018) . One of the critical infrastructures under the immense danger of attack is the electricity infrastructure. Reports of an attack to a New York dam have been made with attackers succeeding in accessing core command-and-control systems at the dam using a cellular modem. Such attacks on power dams have resulted in power outages to critical facilities such as hospitals that are utilizing electrical power to run patients’ health records as well as machines used in offering critical care.

Nuclear power plants 

Another critical infrastructure that is facing imminent danger from cyber-attacks is the nuclear power plants. In the recent past, there have been attacks meted on nuclear power plants such as the "Wolf Creek Nuclear Operating Corporation" in Kansas that came under attack. Most notably, a spear phishing attack was employed targeting persons with access to the plant's critical control.

Healthcare facilities 

Hospitals and healthcare facilities have not been left out in the list of critical infrastructures that have been targeted by cyber attackers. Noting that such facilities are utilizing information technology systems to run basic office functions as well as operating physical equipment, the challenge of cyber-attacks can never be more real.

The consequence of security breaches on critical infrastructure 

There are numerous consequences of security breaches, especially on critical infrastructure. Hacking into nuclear power plants poses an immense risk such as the risk of potential enemies taking control of nuclear facilities. When the enemy assumes such control, there is a threat to weaponize such critical infrastructure against the nation which would lead to farfetched destruction not only in the present but also in the future.

Noting that electricity generation is critical on commerce as well as facilitating the running of critical facilities, scathing attacks on such infrastructure has the potential of hurting business ( Blokdyk, 2018) . The facilities such as hospitals, train services that rely on electricity to run can record accidents as well as deaths from cyber-attacks. Additionally, there is a risk of patient records being inaccessible which would compromise service delivery in healthcare facilities. Moreover, casualties are bound to be recorded resulting from wrong medication in facilities dependent on information systems to provide prescriptions.

References 

Blokdyk, G. (2018).  Cybersecurity Risk Management a Complete Guide - 2019 Edition . 5starcooks. 

Moallem, A. (2018).  Human-Computer Interaction and Cybersecurity Handbook . Boca Raton, FL: CRC Press. 

Taylor, R., Fritsch, E., & Liederbach, J. (2015). Digital crime and digital terrorism (4th ed., pp. 49-71). Upper Saddle River, NJ: Pearson/Prentice Hall

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). A Vulnerable USA: Sprawling Issue of Cyberattacks.
https://studybounty.com/a-vulnerable-usa-sprawling-issue-of-cyberattacks-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration