Thursday, June 11, 2020

Current Homeland Security Issue Term Paper Assignment - 1650 Words

Current Homeland Security Issue Term Paper Assignment (Term Paper Sample) Content: Cyber WarfareAuthors Name:University Name:Course:Date:Technological advancements have steadily increased the computational inventions in the computing industry. New sophisticated ways of doing distinct activities have been brought up by todays high tech innovations. As a result, the power manifested by the field of computing has continuously increased hence creating new favorable avenues for automation of numerous tasks in pursuit of making work easier for man. These tasks include communication, production, business transactions, marketing and manufacturing. Computer technology is utilized to make programs which are embedded within machinery in order to carry out heavy duty tasks with extreme automation and efficiency. This is made possible by the integration of computational concepts with robotics technology which is also highly reliant on computer programming. The internet has metamorphosed the entire globe to seemingly look like one community living very close to e ach other in terms of communication CITATION Lee16 \l 1033 (Lee, 2016). The internet is a noticeable and compulsory contributing factor, alongside digital communication and networking technology, to creation of the cyberspace. Cyberspace is basically the realm within which people communicate over extremely expansive geographical distances in split time CITATION Wil17 \l 1033 (Gibson, 2017). Herein, people are able to send each other images, text emails, large size or small size files, videos and audios. Moreover, cyberspace allows computers to transact information to each other over wide distances. This is made possible by the internal architectural design of the cyberspace which assumes a virtual world in which objects can coexist and ready to be fetched by computers. For example, information residing in the internet is said to exist in the cyberspace which is itself intangible and virtually implemented. Due to the fact that people all over the world rely so much on the internet in order to conduct business ventures and communicate with the rest of the globe for other monetary transactions, cyberspace is a rich hub for hacker activities. Consequently, cybercrime has for long being a major concern for many cyber security teams who aim at stopping internet based thefts or system breaches in organizations or institutions which often lead to loss of personal property and monetary assets. Hackers are often driven by the urge of infiltrating classified data and information from the highly secured company repositories. This activities are particularly propelled and funded by competitors who aim at attaining a larger market share in the sales of a certain product as well as obtain the largest customer base. Cybercrime therefore has adversely affected the profitability and expansiveness of many businesses in the U.S.A. as well as other countries across the world. Homeland Security is an organization that focuses at protecting the U.S.A. citizens from cyber-crimes C ITATION www1712 \l 1033 (, 2017). Databases servers and repositories are the main focus of attack and unauthorized intrusion by hackers. This is because they contain crucial data and information related to the businesss production methods as well as competitive strategies. Once hackers access the repositories, they collect the data and sell it to interested competitors who would like to make better products with unsurpassed quality since they will have the knowhow of how well to modify their approaches of production and/or product design. On an international domain, cybercrimes take a more extensive and more dangerous routine which incorporates the launch of attacks from other countries in order to destroy government owned information networks. This is known as cyber warfare. According to Richard A. Clarke, cyber warfare refers to secretive activities conducted by a certain group, nation or state to intrude into another countrys computer networks or information systems for the purpo se of causing large scale destruction or theft of highly sensitive information CITATION Cla10 \l 1033 (Clarke, 2010). Furthermore, cyber warfare might incorporate a widespread attack of a particular nations systems by non-governmental organizations such as political parties, extremists or NGOs (non-governmental organizations). These groups which commit cybercrimes against the nations government are often interested in debasing the countrys intelligence system as well as avenge certain actions by the authorities. These actions include enactment of certain laws which oppress a particular group of people, unwanted amendments or unjudicial prosecutions. In fact, politically oriented cyber warfare incorporates the notion of searching for a higher power or more authority over a certain population proportion. Herein, a political party might be interested in destroying or stealing valuable information from its adversaries in pursuit of paralyzing their positive development in terms of garn ering more followers within a certain region or community. In case the cyber-attack is successful, the victims plans to positively progress its campaigns are deteriorated whereas the attacker utilizes the stolen information to perk up its campaigning strategies. More so, it enjoys conducting its campaigns in a less competitive race due to the fact that its victims are rendered powerless without their data or better strategies. In addition, influential political leaders and/or parties might utilize cyber warfare to swindle elections results. This is done by launching cyber based hacks on database servers or machines which are utilized to count and store election results. Since elections are a very important activity in the U.S.A., the Homeland Security deems this form of elections rigging as a serious crime that must be condemned strongly. Other countries which oppose the U.S.A. might launch cyber-attacks in order to change the outcome of elections so that a weak, less intelligent or lenient leader might lead the country so that they can defeat U.S.A. in terms of economic dominance and overall power or authority over the entire world. Due to the level of criticality and amount of funds needed to launch undetectable and highly potentially successful attacks on the U.S.A. government, a great degree of expertise and technological advancements are adopted in the design of these attacks. Therefore, the U.S. government prioritizes cyber security. This is evidenced by the steady and hefty funding invested in further development and better training of Homeland Security personnel. Moreover, the government is always interested in improving the tactical force innovativeness by creating more opportunities to learn and practice new technology on defending cyberspace based attacks more proactively. Homeland Security is deeply interested in buttressing its personnel and experts. For instance, it exposes them to utilizing new technology and encourages them to focus on a comple te masterly of source codes and scripts that are essential in detecting and deterring harmful aftermaths of cyber hacks. Also, Homeland Security is always vigilant of learning new tricks that might be used by potential attackers. This is done by studying the nature and structure of captured attacks regardless of how insignificant they may seem. The United States of America has encountered many threats from other countries even before it gained independence about four centuries ago. It has therefore learnt a lot of tactics to curb attempts by its opponents. The U.S.A. has learnt how to be always ready for any form of attack. In fact, it has learnt that the best weapon against its enemies is improvising the enemies weapons to yield a more sophisticated and lethal weapon than theirs. For this reason, it aspires to be in the forefront in terms of military strategizing and cyber defense. For instance, Russia has been a constant threat to U.S.A. since the conflict of communism versus demo cracy. Currently, Russia has been aiming at creating computer programs that are aimed at attacking the U.S. governments top classified information CITATION www168 \l 1033 (, 2016). Allegedly, Russia is aspiring to conquer U.S.A. in terms of power superiority and be termed as the worlds supper power. Therefore, U.S.A.s Homeland Security department has been continuously inventing more complex means of buttressing its cyber defense mechanisms against Russias cyber warfare threats. Also, the former has declared cyber warfare as a bigger threat compared to ground or physical terrorism conspiracies. The issue arising from the topic of cyber warfare is that Homeland Security is bombarded with numerous responsibilities arising from the increased number of specialized cyber-attacks. Technology is advancing at a very high rate which is paving way for creation of more complex cyber warfare tactics. Therefore, Homeland Security is expected to exhibit unwavering determination and focus on carry ing out more in-depth research on ways of increasing the technological competence or efficiency of defense mechanisms meant to curb these attacks. Terrorism has been a great challenge that has brought immense destruction of property and loss of many lives. Cyber warfare is also adopted by terrorists to effectually improve their strategies and mannerism of executing attacks. Most prevalently, terrorists utilize viruses and malicious codes to hack into governmental agencies and military based networks in order to garner high level inte...

Wednesday, June 10, 2020

Essay Topics On the Wonderful Chinese Cinderella Story

Essay Topics On the Wonderful Chinese Cinderella StoryCinderella is one of the most well-known fairy tales that is being used as a theme for stories on essay topics. Cinderella, a poor girl who wished to be with the Prince Charming, set off with her little carriage and very bad luck. However, the journey does not go according to plan, the Queen took her to a far away land called 'Wiseland', that is made up of black mud.The Mud - Poor girl ended up in this place because she misbehaved, never being nice to anyone ever. Now, in this place there was no one around to stop her from doing so. The poor girl could do whatever she wanted and never got any better. It's because of her bad luck that she has been made to be here in the first place.The Enchanted Castle - The poor girl started to enter into a real fairy tale with the help of the Prince. She could now start a new life. She would be able to live a normal life in a place where she was loved. But that was not enough, she wants to be abl e to follow the prince, not just go on dates with him, but to be with him all the time. So, she ends up chasing after him until he is finally taken to another place called 'The Enchanted Castle'.The Fairy Godmother - The poor girl ends up going back to the Queen and telling her that she has gotten herself into a terrible situation. However, she was eventually pardoned by the Queen who said that she is actually helping her daughter learn about taking care of one's self. It is because of the Fairy Godmother, that the poor girl has managed to get out of her misery.The Rich and the Poor - The girl will be able to find a way to make the money to start a new life, where she was not so far off from getting the Prince that she had wanted. As a young lady, Cinderella will be able to work hard and start a new life with the Prince.The Vows - The curse that lies on Cinderella was actually a curse that was placed on her by the Queen because of her bad luck. As a result, she became a dark witch, who kept setting people up against her and in order to get revenge. The punishment that comes with this curse is that she will always be set on making the most evil actions possible.The Waltz - The cursed shoes that the poor girl is wearing is actually a reflection of herself, turning her into the wicked fairy. Her hands turn into steel needles, and the dark magic that is not on her side turns her into a zombie. The poor girl also loses her beauty as well, due to her twisted and cursed state.As a great fairy tale, Cinderella is full of twists and turns. This article will give you some tips on how to write an essay on this topic.