3. IDENTIFY THE STATE AND NON-STATE ACTORS THAT REPRESENT THE BIGGEST CYBER THREAT TO THE UNITED STATES External global threats are on the rise. Cyber attacks against the US government are particularly targeted for intrusions focused on information exfiltration, some of which are attributed to the Chinese government military (Kirk, 2013). Information stolen from China can be valuable to defense and technology, to US policymakers in China, and to military planners. (Kirk, 2013). Note that cyber warfare capabilities can intercept military response operations by limiting an adversary's communications and commercial activities. (Kirk, 2013). The Department of Defense reports that Russia and China are playing a disruptive role within international media in creating transparency in cyberspace, essentially because each has the technology to do so. Additionally, both nations are promoting an Information Code of Conduct that gives both governments authority over content and information on the Internet, an effort that is being scrutinized. (Kirk, 2013). The private sector owns approximately 85-90% of our IT infrastructure, a cohesive government-private partnership is needed to ensure security. Individuals (both internal to the organization and agency), political groups, religious groups, and organized crime groups pose a threat to the United States and are considered a cyber threat. To assess the overall threat level, it is necessary to evaluate intentions and technological capabilities unambiguously that insider threats promote great risks. Surveillance of data processing raises the question of how employees can steal data, i.e. can someone put it on a USB stick, or do the emails contain PII information and leave the company outside? (Geer, 2013). Although the pedagogical strategy...... half of the document ......http://www.dhs.gov/xlibrary/assets/nipp-ssp-banking.pdfUnited States. Department of Homeland Security. (2009). National infrastructure protection plan. Retrieved from http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdfUnited States. Executive Office of the President. (1998, May 22). Presidential Decision Directives / NSC-63. Retrieved from http://www.fas.org/irp/offdocs/pdd/pdd-63.htmUnited States. Sandia National Laboratories. (2012, April 24). National supervisory control and data acquisition (SCADA). Retrieved from http://energy.sandia.gov/?page_id=859United States. Sandia National Laboratories. (2012, April 24). History of SCADA. Retrieved from http://energy.sandia.gov/?page_id=6972Wilson, C. (2007). Information operations, electronic warfare and cyber warfare: capabilities and related policy issues. Retrieved from http://www.fas.org/sgp/crs/natsec/RL31787.pdf
tags