Matches in SemOpenAlex for { <https://semopenalex.org/work/W1488399923> ?p ?o ?g. }
Showing items 1 to 70 of
70
with 100 items per page.
- W1488399923 startingPage "38" @default.
- W1488399923 abstract "[ILLUSTRATION OMITTED] SIGO! WAS THE CRY that went up at the dining-in when the cantankerous public address microphone on the dais at the officers' club ballroom failed to work. The meat eaters the unit would laugh or smile relief as the poor SIGO (signal officer) valiantly struggled to get the malfunctioning feature of the podium to work as it should have. That is how some of us have approached the subject of cybersecurity: it is that wire-head guy's bailiwick, and thank goodness! Well, if it ever was so, then it is no more. When Director of National Intelligence James R. Clapper issued the 2013 Worldwide Threat Assessment of the US Intelligence Community to the Senate Select Committee on Intelligence, cyberthreats appeared ahead of terrorism and weapons of mass destruction its list of global threats to U.S. national security. (1) Indeed, cyberattacks are constantly the news. Cybersecurity expert and Finnish reserve officer Mikko H. Hypponen posits that developed countries, people are more likely to be victims of crime online than crime in real life. (2) With the ubiquitous nature of online interactions modern life, the cyberthreat is a top security threat to individuals and the nation. So, how is that frantic SIGO doing anyway, with his efforts to make the funky thing work properly? Well, let's take a look at the difficult situation our SIGO faces. First, simple terms, three typical kinds of cyberattackers pose a threat: criminals, ideologues, and nation states. Usually, professional criminals are motivated by greed. They fall under the jurisdiction of law enforcement although the technology they use tends to be beyond the capabilities of ordinary police agencies. Next are the ideologues and so-called hacktivists, such as WikiLeaks or Anonymous, who generally are motivated by their political or philosophical worldview, or perhaps by cynicism. They often announce their targets and, sometimes, conduct attacks merely to gain attention or to get a laugh. The law treats them as criminals, too. The third type is nation states, which usually are motivated by security, economic, or other interests. They can plan and execute coordinated cyberattacks against their enemies. Normally, they have access to more resources than criminals and ideologues. It is not always easy to assign cyberattackers to neat categories, however. Further muddying the water is the open question of whether a cyberattack is a use of force. Moreover, determining which specific cyberthreats are most dangerous to U.S. national security and which are most likely to do damage is difficult. Specific cyberthreats arise unexpected ways. For example, Stuxnet, the fiendishly destructive malware that targeted centrifuges at the uranium enrichment facility Natanz, Iran, now poses a threat well beyond its original purpose. This is because code used to build Stuxnet (discovered 2010 and widely considered a state-sponsored cyberattack) was leaked inadvertently onto the Internet. Some analysts believe its descendants (such as Duqu and Flame) or their progeny could already be residing the databases of critical infrastructure worldwide. (3) The bad things going on are beyond any SIGO's skill set or resources. How should we respond at this point? More Bureaucracy? The typical, and even mandatory, response of government is to give an office or agency the responsibility and resources to fix a problem. This predictable, slow, and top-down approach to problem solving at the national level is ineffective against an uncertain, fast-changing, and bottom-up problem. For example, the Department of Defense established United States Cyber Command (USCYBERCOM), a subunified command subordinate to United States Strategic Command. The service components are duly organized to provide support. The Army has the U.S. Army Cyber Command, the Navy has the U.S. Fleet Cyber Command, the Air Force has the Twenty-Fourth Air Force (Air Forces Cyber), and the Marine Corps has the Marine Forces Cyber Command. …" @default.
- W1488399923 created "2016-06-24" @default.
- W1488399923 creator A5053162519 @default.
- W1488399923 date "2014-05-01" @default.
- W1488399923 modified "2023-09-26" @default.
- W1488399923 title "Cybersecurity: It Isn't Just for Signal Officers Anymore" @default.
- W1488399923 hasPublicationYear "2014" @default.
- W1488399923 type Work @default.
- W1488399923 sameAs 1488399923 @default.
- W1488399923 citedByCount "0" @default.
- W1488399923 crossrefType "journal-article" @default.
- W1488399923 hasAuthorship W1488399923A5053162519 @default.
- W1488399923 hasConcept C105702510 @default.
- W1488399923 hasConcept C144024400 @default.
- W1488399923 hasConcept C161191863 @default.
- W1488399923 hasConcept C17744445 @default.
- W1488399923 hasConcept C199539241 @default.
- W1488399923 hasConcept C203133693 @default.
- W1488399923 hasConcept C2776459890 @default.
- W1488399923 hasConcept C2777189325 @default.
- W1488399923 hasConcept C2777855551 @default.
- W1488399923 hasConcept C38652104 @default.
- W1488399923 hasConcept C39549134 @default.
- W1488399923 hasConcept C41008148 @default.
- W1488399923 hasConcept C528167355 @default.
- W1488399923 hasConcept C71924100 @default.
- W1488399923 hasConceptScore W1488399923C105702510 @default.
- W1488399923 hasConceptScore W1488399923C144024400 @default.
- W1488399923 hasConceptScore W1488399923C161191863 @default.
- W1488399923 hasConceptScore W1488399923C17744445 @default.
- W1488399923 hasConceptScore W1488399923C199539241 @default.
- W1488399923 hasConceptScore W1488399923C203133693 @default.
- W1488399923 hasConceptScore W1488399923C2776459890 @default.
- W1488399923 hasConceptScore W1488399923C2777189325 @default.
- W1488399923 hasConceptScore W1488399923C2777855551 @default.
- W1488399923 hasConceptScore W1488399923C38652104 @default.
- W1488399923 hasConceptScore W1488399923C39549134 @default.
- W1488399923 hasConceptScore W1488399923C41008148 @default.
- W1488399923 hasConceptScore W1488399923C528167355 @default.
- W1488399923 hasConceptScore W1488399923C71924100 @default.
- W1488399923 hasIssue "3" @default.
- W1488399923 hasLocation W14883999231 @default.
- W1488399923 hasOpenAccess W1488399923 @default.
- W1488399923 hasPrimaryLocation W14883999231 @default.
- W1488399923 hasRelatedWork W1437276374 @default.
- W1488399923 hasRelatedWork W1527762547 @default.
- W1488399923 hasRelatedWork W153910249 @default.
- W1488399923 hasRelatedWork W1551265420 @default.
- W1488399923 hasRelatedWork W1885524 @default.
- W1488399923 hasRelatedWork W1991568239 @default.
- W1488399923 hasRelatedWork W2268871241 @default.
- W1488399923 hasRelatedWork W2335775277 @default.
- W1488399923 hasRelatedWork W2415643539 @default.
- W1488399923 hasRelatedWork W2498646331 @default.
- W1488399923 hasRelatedWork W2547587938 @default.
- W1488399923 hasRelatedWork W2607204512 @default.
- W1488399923 hasRelatedWork W2803249698 @default.
- W1488399923 hasRelatedWork W280536784 @default.
- W1488399923 hasRelatedWork W2994095965 @default.
- W1488399923 hasRelatedWork W3116359250 @default.
- W1488399923 hasRelatedWork W3125025700 @default.
- W1488399923 hasRelatedWork W3188914780 @default.
- W1488399923 hasRelatedWork W899145504 @default.
- W1488399923 hasRelatedWork W3186713190 @default.
- W1488399923 hasVolume "94" @default.
- W1488399923 isParatext "false" @default.
- W1488399923 isRetracted "false" @default.
- W1488399923 magId "1488399923" @default.
- W1488399923 workType "article" @default.