Cyber-attacks are the greatest threat that the USA is currently facing. The nation has most recently been vulnerable to various cyber-attacks primarily from China and Russia (Insuan et al., 2018). One of the major incidences that took place in the USA is the hacking of U.S institution and using the information acquired to influence the last general election in the USA. This action was carried out by putting malicious software in the computer system to capture data. According to the report provided by the Task Force on Cyber Deterrence, the report indicated that there had been an increase in cyber attacks carried out in the USA in the last ten years (Insuan et al., 2018). The factors that have led to the increase in cyber attacks are that foreign countries are spying on the US military and their infrastructure. For example, the putter panda case study conducted on the US military system indicated that this malicious software is always being used to attack the systems.
Moreover, the Havex attack used by the Russians was different from the putter panda attack. The Havex attack influenced the election results in the USA, and even some officials have agreed to that notion. On the contrary, the putter panda attack was carried out by the Chinese people who were members of the Chinese military. As stated above, these individuals were spying on the USA military systems and also carrying out economic cyber espionage attacks against American institutions (Insuan et al., 2018). This action was different from the mentioned Russian cyber-attack that was aimed to attack the US infrastructure and to impact on the key results such as the American general election. Other cyber attacks that the USA has faced in the recent past are the WannaCry and NotPetya that affects most organizations in the USA making these firms to lose their confidential information and money (Insuan et al., 2018).
The measures that the government should put in place to prevent cyber crimes is to secure its networks and computers. Besides, the government is supposed to come up with abroad powerful intelligence capabilities that can inform them on any planned cyber-intrusions (Pipyros et al., 2018). The government should correct market failures that promoted cyber attacks. This action should be done by passing laws and regulation relating to cyber crimes (Choo et al., 2018). Moreover, the US government should fully monitor its sea, space, and air from any potential foreign cyber attacks. The Congress should also help the government in the cyber-attack wars because they have passed laws that have limited the government access to private communication (Pipyros et al., 2018). General Alexander one of the senior members in the Trump's government say that the USA can only fight cyber-attack if only it is allowed to have access to all networks.
In the short-term, the U.S government should concentrate on educating the public on the reasons as to why they should not access unsecure websites for example http. The reason is that most of the websites are not secure making the public to be prone to cyber attacks (Choo et al., 2018). Secondly, the government should put the systems to be immune to cyber attacks. This action can be done through ensuring that all systems have strong passwords and should be private and confidential at all time. In the long-term, the Congress should pass laws that allow the government to monitor all networks from the private telecommunication organizations (Choo et al., 2018). This action would enable the government to monitor all communications and other activities the public take part in. Moreover, the government should also monitor its space, air, and sea to keep the cyber threats at bay.
Choo, K. K. R., Bishop, M., Glisson, W., & Nance, K. (2018). Internet-and cloud-of-things cybersecurity research challenges and advances.
Insua, D. R., Vieira, A. C., & Musaraj, K. (2018). Some Risk Analysis Problems in Cyber Insurance Economics. Estudios de economia aplicada, 36(1), 181-194.
Pipyros, K., Thraskias, C., Mitrou, L., Gritzalis, D., & Apostolopoulos, T. (2018). A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual. Computers & Security, 74, 371-383.
Cite this page
Cyber-Attacks Essay Example. (2022, Jun 27). Retrieved from https://speedypaper.com/essays/cyber-attacks-essay-example
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Research Paper Sample on Technology in Education
- Game of Thrones - Free Essay with a Review of a Television Program
- Free Essay: Education Issues for Children with Learning Disabilities
- Free Essay on Whether College Athletes Should Be Paid
- Essay Sample on Differences of Collaboration in Information Visualization
- Essay Sample on Deceptions and Misleading Concepts of the Film Industries
- The Harvest of Empire. Paper Example