1 / 12

Tomorrow’s Battleground

Tomorrow’s Battleground. Nicholas Jabbour Alice Culbertson. Is America ready for this? Are YOU?. http://www.youtube.com/watch?v=OXDv68NGWxM. Cyber Warfare. Type of Information Warfare. Obama made this America’s top priority.

sakamoto
Download Presentation

Tomorrow’s Battleground

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tomorrow’s Battleground Nicholas Jabbour Alice Culbertson

  2. Is America ready for this? Are YOU? http://www.youtube.com/watch?v=OXDv68NGWxM

  3. Cyber Warfare • Type of Information Warfare. • Obama made this America’s top priority. • Hackers breaching America’s computer networks to steal sensitive information or shutting down the system to cripple us • Both dangerous and useful

  4. National Security Agency Keith B. Alexander Commander U.S. Cyber Command Director National Security Agency Chief Central Security Service John Chris Inglis Deputy DirectorNational Security Agency

  5. 2007 Electronic Pearl Harbor Hackers infiltrated networks of… • Department of Commerce • Department of State • Department of Defense • NASA • Military agencies terabytes of information were stolen, equal to the amount stored in the library of congress.

  6. America’s Response • The NSA and Central Security Service is training the US government to defend against cyber attacks via the Information Security Assurance Training and Rating Program (ISATRP) • They are improving overall defensive software to destroy viruses and prevent cyber attacks • They are developing means of offense to use cyber tactics against enemies in return

  7. Threats to the USA Al Qaeda • Not a real threat • Never truly good at cyber tactics • Most computer experts captured or killed China • A great threat • Very seasoned in cyber tactics • Has accused America of using cyber attacks against them • Has admitted to having a cyber warfare division

  8. The Deadly Consequences http://www.youtube.com/watch?v=RmD9HY8L9h8&feature=related AMERICA IS NOT READY FOR THIS!!!

  9. The End Result • Cyber Warfare is the latest frontier of war • It has already started under the radar • The potential Armageddon

  10. Work Cited "Are NSA InfoSec Efforts Enough to Defend America in Cyber Warfare?." Top Secret Writers. N.p., n.d. Web. 3 Aug. 2011. <http://www.topsecretwriters.com/2011/07/are-nsa-infosec-efforts-enough-to-defend-america-in-cyber-warfare/>. Borg, Scott. "Why Al Qaeda Has Failed at Cyberwarfare." Scientific American. Scientific American Magazine, 12 July 2011. Web. 1 Aug. 2011. < http://www.scientificamerican.com/article.cfm?id=al-qaeda-and-the-internet>. Bright, Arther. "Estonia accuses Russia of 'cyberattack'." The Christian Science Monitor. The Christian Science Monitor, 17 May 2007. Web. 3 Aug. 2011. <http://www.csmonitor.com/2007/0517/p99s01-duts.html>. "Can the NSA Defend America Against Cyber Attacks?." Infosec Island. N.p., 27 July 2011. Web. 1 Aug. 2011. <https://www.infosecisland.com/blogview/15295-Can-the-NSA-Defend-America-Against-Cyber-Attacks.html>. "China 'has .75M zombie computers' in U.S.." UPI.com. N.p., 17 Sept. 2007. Web. 3 Aug. 2011. <http://www.upi.com/Top_News/Special/2007/09/17/China-has-75M-zombie-computers-in-US/UPI-73941190055386/>.

  11. Works Cited (Continued) Elliot, Steven. "Cyberwarfare - Fact or Fiction?." Infosec Island. N.p., 27 Aug. 2010. Web. 1 Aug. 2011. <https://www.infosecisland.com/blogview/6845-Cyberwarfare-Fact-or-Fiction.html>. Farrell, Liam. "Clarke: More defense needed in cyberspace ." The Capital. The Capital, 10 Sept. 1924. Web. 3 Aug. 2011. <http://www.hometownannapolis.com/news/top/2010/09/24-11/Clarke-More-defense-needed-in-cyberspace.html>. "Is a 'digital Pearl Harbor' in our future?." Cyber Security Girl Strikes Again!. N.p., 7 Dec. 2009. Web. 3 Aug. 2011. <http://cybersecuritygirlstrikesagain.blogspot.com/2009/12/is-digital-pearl-harbor-in-our-future.html>. "National Security Agency - NSA/CSS." National Security Agency - NSA/CSS. N.p., n.d. Web. 1 Aug. 2011. <http://nsa.gov>. Richmond, Riva. "Malware Hits Computerized Industrial Equipment." NYTimes.com. The New York Times, 24 Sept. 2010. Web. 1 Aug. 2011. <http://bits.blogs.nytimes.com/2010/09/24/malware-hits-computerized-industrial-equipment/>.

  12. Acknowledgements • Appalachian State University • Dr. Rahman Tashakkori • Dr. Barry Kurtz • Summer Bridge Program • Summer Bridge Faculty and Students

More Related