Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: The Threat Of Terrorism In Cyber Space - 858 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Experts believe fallout from September 11 could continue through computer infiltration. In the Internet Age, when communications speed across national boundaries, terrorist groups are winning the cyber space battle. Leading security experts predict that it is only several years before a terrorist or rouge nation is capable of an online hacker-style attack against the United States, causing massive failure of such crucial elements as banking for the financial markets, transportation systems, the power grid or telecommunications. A cyber terrorist can range from anti-American masterminds to co-workers.

Fifteen year olds are breaking into systems, but many are worried about the forty-five year old whos mad at the world and takes a companys intellectual property. The Defense Department acknowledges hundreds of successful cyber attacks on its networks in recent years, some of which trace back to the Persian Gulf area. It is feared that cyber terrorists will turn our systems against us. For instance, if terrorists wanted to attack a coal-fired power plant, they might hack their way into a seemingly unrelated railroad computer system to shut down real traffic. That would prevent coal from reaching the plant.

Some areas that are in danger of infiltration are: banking and financial services, telecommunications, electric power, oil and gas delivery, transportation, water, emergency services and government services. These are the essential, interdependent services upon which society relies, the kind of services upon which society relies, the kind of services that if disrupted, would create a series of cascading problems that would ripple across the nation. Cyber terrorism is not just as a future problem, but as a current threat to national security. In 1998, hackers tapped into Nasa's Jet Propulsion laboratory computer in Pasadena and accessed data about the commercial air traffic system. This intelligence could have told hackers the configuration of GPS navigation satellites and allowed them to jam the system during war. The hackers were also looking for information on stealth aircraft.

The United States is left vulnerable to cyber terrorism for many reasons. The United States has a woefully inadequate investment in computer security. Few top researchers have been drawn to the field of computer security, which has remained essentially unchanged in its failed approaches since its inception. The federal government has no agency that is focused on, and responsible for ensuring that the necessary research and implementation are undertaken to improve computer security. Market forces have given private industry little incentive to invest in computer security even as their reliance on the inter net grows. The nation also is vulnerable to cyber attacks because there is no national clearinghouse to analyze vital information gathered by countless government agencies that dont always speaks to each other and by private industry that often is disinclined to pass along proprietary information.

In addition, terrorists can hide their communications with encryption software. They can also set up web sites to help raise money for their operations. Terrorists are given access to data by operating on the inside. A recent Department of Treasury report noted that sixty percent of all computer security breaches are internal. Employees have clearance and they take information and misuse it. Americas intelligence agencies are frozen it time.

The problem is demonstrated by our National Security Agency. The NSA operates spy satellites and gathers information from radio, microwave, television, telephone and internet signals outside the United States. For three days last year the Nsa's entire computer system went down because of antiquated overloaded software linking devices and satellites. Fortunately for national security, the NSA kept the shutdown secret until the networks were up and running again.

The Agency says its spending billions of dollars to update aging computer and cryptographic tools, but experts fear updates will not keep up with changing technology. Lifetime employment at the agency and relatively low pay discourage technologically savvy workers from joining. Vulnerability is due to lack of action. America has adjusted too slowly to the threats the internet brings.

The public really has not focused on the fragility and vulnerability of the infrastructure, and there will not be much action until something major happens, said Bill Nunn, who serves as chairman of the commissions civilian oversight panel (). There are steps being made to protect Americas security. Politicians have questioned whether laws designed to protect civil liberties -- which also inhibit investigators from aggressively pursuing suspects online should be changed, and the Bush administration is asking for expanded powers and is adding funds to track down terrorists. The Bush administration has put together the Commission on Critical Infrastructure Protection. It will create partnerships between government and industry to jointly solve the cyberspace security problems.

Under such a partnership, industry would be able to anonymously disclose where it suffered security breaches and, with the governments support and research, identify ways to plug holes. Congress is holding hearings on cyber security. They are developing commissions to research, examine and propose legislation to address security shortcomings. The Information Security Act is presently being voted upon. The act would encourage private industry to pass along information to the federal government. The government in turn would analyze the data to determine any potential threat and send out alerts.


Free research essays on topics related to: private industry, cyber terrorism, bush administration, computer security, federal government

Research essay sample on The Threat Of Terrorism In Cyber Space

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com