You are on page 1of 8

ArjunJale

IR1/3/11AP
1/17/16

CompiledAnnotations

Beuchelt,Gerald,CoryCasanve,andVijayMehra.AdvancesinOperationalRiskandThreat
Modeling.
NationalCybersecurityInstituteJournal
1.3:n.pag.Print.

Inthisdocument,theauthorsanalyzethevariouswaystoproperlypredictattacksandprevent
them.Themostessentialstepintheirprocessistoanalyzewhattypeofthreatisattacking.The
journalusesagraphicalmodelofthreatassessmentthatwillallowpeopletoproperlyidentify
threatsandwhytypeofsolutionisrequiredtosolvetheproblem.Theauthorsalsostronglyrefer
tocontingencysystemsintheneedofafullsystemrestore.Theyalsoprovideaseparatesetof
instructionsforcorporatesystems,thatholdsmuchmoresensitivedata,whilebeingableto
affordhigherqualitysystems.Whilethejournalprovidesmanygraphicalinterpretations,most
aredifficulttoanalyzewiththedatainthetext.

Belk,Robert,JosephNye,andMonicaToft.OntheUseofOffensiveCyberCapabilities.
PolicyAnalysisonOffensiveUSCyberPolicy
:n.pag.Print.

ThisjournalfromHarvardisarecommendationtoanygovernmentonhowtheircybersecurity
canbeusedtocrippleothercountries.TheauthorsusetheOffensiveMilitaryCyberPolicyas
thebasisfortheirpolicy,tryingtostayasclosetothecurrentpolicyinordertocreateamore
feasibleplan.Theycreateausableframework,thathasnotbeentestingwhichmakesitveryhard
tocorroboratetheeffectiveness.Theauthorsaddressminimalandmoreextensiveframeworksto
makesuremultipletypesofsystemscanbeprotectedundertheiranalysis.Thejournalis
concludedwithmeansofusingtheframeworktoattackandcounterattackanyenemy.This
articleisincrediblybiasasRobertBelk,oneoftheauthorsisamemberoftheNavy.Thiswas
writtentotryandgetmorefundingformilitarystrikesandhasnoideasondefensebutonly
offense.

Cho,Yiseul.StrategicPhilanthropyforCyberSecurity:AnExtendedCostbenefitAnalysis
FrameworktoStudyCybersecurity.
MITJournal201206
:n.pag.Print.

InthisdocumentChoanalyzesthecostandbenefitofcybersecuritydevelopment.Heuses
resourcesoninternationaldevelopmentandstrategicphilanthropy.HeusesaKoreanSecurity
agencyashisexampleofhowaframeworkcanbeusedforidentifyingthreatsandfindingways
atsolvingthem.Choalsoanalyzestherelationshipbetweenpublicandprivateorganizations
duringthedevelopmentofsuchaframeworkandthepossibleramifications.Byputtingthis
frameworkthroughdifficultfieldtestsChohasconcludedthatthisframeworkwillbethebase
forthefutureofcybersecurity.Hehasfoundthatprivateorganizationscanbegreatlybenefited
byworkingwithpublicorganizationsbecausetheirpublicimage,resourcesandexperiencewill
beimproved.Anotherfindingisthatinternationaldevelopmentactivitiesworktoimprovecyber
security.Thisjournalusesrealfieldworkteststoshowthelegitimacyoftheargument.Thisis
crucialforfindingwaystostopcybersecurityattacks.


ArjunJale
IR1/3/11AP
1/17/16

Cunningham,Fiona.AssuringAssuredRetaliation:.
InternationalSecurity
:n.pag.Print.

ThisdocumentanalyzestheneedfortheUnitedStatestoincreaseitseffectivenessinthe
internationalcyberwarfarespaceinordertosecurepeace.Chinacurrentlyhasasmallnuclear
weaponsforcethatcanbecrippledthroughtheforceofcyberattack.ThiswouldremoveChinas
abilitytothreatentheUnitedStates.Thisplanwillalsopreventthecostofanarmsrace,similar
totheonethatleadtothecreationofthesenuclearweapons.Acyberracewouldcost
significantlylessandcanholdmuchmorepromisingresults.ThearticleassumesthatChinawill
continueitsweaponsraceaswellasdevelopcyberdefense.Thiswillcostasignificantamount
ofmoney.TheauthordoesalotofguessingonChinaspartanditisdifficulttoestimateifwhat
theauthorbelievesChinawilldowillactuallyhappen.Thearticlealsodoesnotcontainmany
sourceswhichlimitstheeffectivenessofthearticle.

Geer,DanielE.,Sc.D.CybersecurityandNationalPolicy.
HarvardLawSchoolNational
SecurityJournal
:n.pag.Print.

Thisjournaldocumentsthechangesinnationalpolicyascyberattackshavegrownmore
dangerousandprevalentaswellastheethicsbehindsuchpolicies.GeerwritesabouttheUS
NationalTreasurysfailuretotrackbillsduetoacyberattack.Theattackwasshortlived,butif
carriedoutinamorepowerfulway,itcouldcripplethedollarsintegrity.Geeracknowledgesthe
contingencyplansthegovernmenthasinplaceincaseofanycyberattack.Hestatesthathedoes
nottrustthestatessystemasafulloncyberattack,istohim,inevitable.Thejournalconcludes
withaseriesofscenarios,inwhichhediscussespossiblemethodstheUnitedStatescanuseto
preventcyberattacks.Thisjournalwasopinionbases,whichlowersitscredibilitycompletely.

Gupta,Ravi."CrowdsourcingCybersecurity:APropertyRightsViewofExclusionandThefton
theInformationCommons."InternationalJournaloftheCommons.UtrechtUniversity
LibraryOpenAccessJournals,21Dec.2015.Web.21Dec.2015.

ThisdocumentfromtheCenterofSecurityStudiesanalyzesthedifferentattitudesassociated
withenhancedinternationalcybersecurity.Thedocumentrecognizesthebasicneedforthe
internetforeconomicgrowthandtheimportanceoftheinternetforbasiccommunicationacross
longdistances.Ravithencontinuestoanalyzethecurrentproblemsthatcurrentsystemsarenot
abletopreventhackersfromgainingcrucialinformationandpresentsalistofstepsthatcanbe
takentopreventhackers.Theentirearticleisbasedontheviewthatitisimportanttoanalyzethe
currentmoodofthepeopletoseewhatrestrictionsarenecessary.Hebelievesthatthe
internationalcommunityshouldemployaneedbasisinwhichwhenattacksaremoreprevalent,
therebestrongerrestrictionsandwhentheyarelessactive,thereshouldbelessrestrictions.He
referencesthemusicindustrywhichisnowtrackingIPaddressestopreventpiracyandhowthis
canbeliftedwhenpiracyisnolongeraproblem.Thisarticlehasimportantinformationforthe


ArjunJale
IR1/3/11AP
1/17/16

researchpaper.Theauthordoesnotspendtoomuchtimecounteringtheideathatacountrywill
bevulnerablewhentheirsecurityisloweredbutitdoespresentadifferentopinioncomparedto
alltheotherresearchpaperscurrentlyanalyzed.

Hathaway,MelissaE.WhyAmericaShouldCareaboutCybersecurity.
StrategicAdvantage
:
n.pag.Print.

InthisdocumentHathawayanalyzestheneedforcybersecurityandwhythereshouldbea
higheremphasisonit.Shelistsalltheinfrastructurethatneedsstrongcybersecuritytobekept
runningandtheproblemsthatcanbeassociatedifthereislesssecurity.Herargumentisrelated
toagameofChineseWeiChiinwhichthenumberofpossiblemovesdoesnotmatter,allone
needsisacorrectmove.Shearguesthatthegovernmentneedstoworkwithotherorganizations
tostrengthentheaveragenationalcybersecurity.HathawayusestheConfickerworm,avirus
thatforcedthegovernmenttoworkwithmanycompanies,ashowrelationsbetweenprivate
organizationscanhelpussecureoursystems.Thiscanalso,sheargues,helpidentifywhat
hackersareafter,whetheritbeadvancedtelecommunicationsdesignsorweaponsfromprivate
organizations.Theauthorbringsauniqueperspectiveinwhichshedoesnotusewarasareason
toincreasecybersecuritybutrathertheneedforbasicinfrastructure.Theexampleofthe
Confickerwormwillbecrucialtoconvincingpeoplethatthegovernmentneedstotakeamore
activeroleinournationaldefense.

Kello,Lucas.PerilstoTheoryandStatecraft.
TheMeaningoftheCyberRevolution
.Vol.38.
N.p.:PresidentandFellowsofHarvardCollegeandtheMassachusettsInstituteof
Technology,2013.N.pag.Print.

Inthisdocument,Kellousesvariouspiecesofevidencetoprovethatwearelivingina
dangerouseraofcyberwarfare.Thetwomainpointsinthisarticlearethatpoliticsisfailingto
dealwiththeincreasingnumberofcybercrimesandthatitiseasiertoattackthandefend.Kello
supportshisargumentwiththefactthatinthepastfewyears,inwhichpoliticshastakenthe
spotlight,nationalcybersecurityhasfallen.Healsoshows,throughdiagramsandcharts,that
attackingismucheasiertodefendbecausewhendefendingthereislotsofgroundtoprotect.The
journaldocumentstheideathateducationisrequiredinthenextgenerationofstudentstoprotect
ourcountry.KelloreferencestheRussianattackonGeorgiain2008toshowhowrespectable
militarygesturesdonotapplywhenthewarisonline.Whilethedocumentisstraightforward,
therearemanynuancesandundertonesthatmakereadingthisarticleharder.

Kessler,GaryC.,andJamesD.Ramsey.
JournalofHomelandSecurityEducation
.N.p.:ERAU,
2012.Print.Vol.2.

ThisdocumentbyGaryKesslerandJamesRamseydiscussestheeffectivenessatteaching
studentsatayoungagetheskillsneededtoprotectthemselvesagainstcyberattacks.Kesslerand


ArjunJale
IR1/3/11AP
1/17/16

Ramseydiscusstheneedofcombininghighschooltechnologyeducationprogramswithcyber
securitydefenselessonstoproperlydefendstudentsagainstanevergrowingdangeronthe
internet.Theyalsodiscusstheregulationsandproceduresinthecriminallawcodethatdeals
withcyberattacksandtheroleofteachingstudentstheconsequencesofsuchanattack.Thetwo
authorsreferenceaevergrowingpresenceofterroristorganizationsonsocialmedia.Thejournal
doesnotdiscussthenumberofschoolsalreadyemployingacybersecurityclass,whichlowers
itsneed.Whilethisdocumentdoesnotdiscusstheeffectsofcyberwarfare,itevaluatesaplanto
preparestudentsagainstcyberterror,whichwillhopefullypreventmanyfrombeinghacked.

LeClair,Jane,EdD,RandallSylvertooth,andKevinP.Newmeyer.ElementsofNationalCyber
SecurityStrategyforDevelopingNations.
NationalCybersecurityInstituteJournal
1.3:
n.pag.Print.

Inthisdocumenttheauthorsanalyzethestepsdevelopingcountriesshouldtakeandaretakingto
protectthemselvesagainstcybersecurity.Theauthorssupporteachoftheirclaimswith
statisticaldata.Theystatethatthereasonforsuchmeasuresisthegrowingnumberofcyber
securitythreatsaffectingtheworld.Thejournalshowsthecorrelationbetweentherateof
developmentandcybersecuritydefensestrength.Inalmosteverycase,thestrongerthedefense
systems,themoredevelopedthecountry.Theauthorssummarizetheeffectivenessofthe
EuropeanUnionscybersecuritycommissionof2013.Thecommissionhaspreventednumerous
attackersfromgainingentrytosecuredatastreams.Thedocumentconcludeswithvarious
statisticaldataandrecommendationsofantivirussoftwareforpersonaluse.

NationalSecurityAgency.APracticalStrategyforAchievingInformationAssurancein
TodaysHighlyNetworkedEnvironments.
DefenseinDepth
:n.pag.Print.

ThisisaarticlewrittenbytheNationalSecurityAgency(NSA)tocorporationstoprovideabase
frameworkfortheirsystems.Thissystemistheperfectbalancebetweenstrength,costand
effectiveness.TheNSAusesaDomainStructureMatrix(DSM)tointegratecyberspaceand
internationalrelations.ThisisduetothebadpublicimagetheNSAhasreceivedinthepastfew
years.AttackersandMotivationsareoutlinedtoexplaintopeoplewhypeoplehack.Information
assuranceisguaranteedfromthissystem,whichmeansthatyourdatawillneverbelostdueto
multiplebackups.Thearticlehasalistofresourcesandelementsneededtocreatethesystem
described.Thiswillbeessentialtoteachingpeoplehowtodefendthemselves.Thisarticledoes
notprovidetoomuchdetailonwhatcyberattacksarebutitdoesprovideawaytostopthem.

NICCS."NationalInitiativeforCybersecurityCareersandStudies"NationalInitiativefor
CybersecurityCareersandStudies(NICCS).HomelandSecurity,7Dec.2015.Web.7
Dec.2015.


ArjunJale
IR1/3/11AP
1/17/16

Thiswebsitecontainsresourcesforteachersandstudentstocreateacybersecuritycoursein
theirschool.Thiswillbecrucialfortheresearchprojectbecauseaportionofmypaperand
websitewillbededicatedtoshowingreadershowtoimplementcybersecurityintotheirdaily
lives.NICCSbeginsbydescribingwaystoengagestudentstolearnaboutcybersecurityand
howtofostercybercommunities.Thebestwaytoengagestudentsisbyinteractingwiththem
andgivinghandsonactivities.Thenextstepistogetteacherstosupportyourcause.Thisis
especiallyimportantasteacherswillbetheonesteachingthestudentsandwithouttheirsupport,
theentiresystemwillfallapart.Thedocumentthengoesontoshowexamplesofsuccessful
casesofcybersecurityclasses.Thisdocumentisareliablesourcefromthenationalgovernment
andiscrucialtomyresearch.Itcontainsimportantinformationonhowtostartacybersecurity
program.Thestrengthofthisdocumentcanbeincreasedbyaddingsources.

NewYorkTimesEditorialBoard.ArmsControlforaCyberage.
NewYorkTimes
.NewYork
TimesCompany,26Feb.2015.Web.26Oct.2015.

Thisdocumentevaluatestheracebetweencountiestoempowerthemselveswithcyberprotection
andattackingpowertoattackothercountriesinthecaseofaninternationalincident.This
documentmainlyfocusesonIran,unlikemanyotherdocumentsthatfocusonChinabecause
Chinaisourbiggestfoe.TheUnitesStateshasanticipatedattacksfromtheIraniangovernment
andplantedfalseinformationaboutitsnuclearprogramtotryanddiscourageIranfrom
followingtheUnitedStatesinthenuclearrace.Thearticleemphasizestheblurredlineinwhich
cyberwarfarelivesandhowitisimpossibletopredictorcompletelydefendagainstsuchattacks.
WhilefollowingthewhereaboutsofEdwardSnowden,oneoftheworldsbesthackers,theNSA
hasfoundthattheUnitesStateshashackedIran,andIranisconsideringitthefirstattackofthe
war.Whiletensionshavedieddown,ithasdemonstratedtheeaseatwhichcyberwarfarecan
leadtointernationaldisaster.TheEditorialBoarddoesnotconsiderthepreviousincursionsthe
UnitedStateshashadwithIran,whichcouldhaveescalatedtensions.

Nichols,James.NationalCybersecurity1.2(2008):n.pag.ExcelsiorCollege.Excelsior,2Nov.
2008.Web.7Nov.2015.

Inthisjournal,theauthordiscussestheimportanceofcybersecuritydefenseclasses.Nichols
arguesthattheyoungergenerationsmustlearntheskillsneededtodefendthemselvesandto
learnhowtocreateaneffectiveworkplaceinthefuture.Whiletheneedtocreateaneffective
workplaceisunnecessarytomytopic,theneedtolearntodefendisalargetopicthatcanhelp
synthesismypaper.Intheend,thegoalofNicholsistohaveeveryhighschoolequippedwith
computersandreadytoteacheverystudentbasiccybersecurityskills.Hebackshisargument
withstatisticaldata,suchasthatover85%ofpeoplewithacomputerdonotknowhowto
managetheirantivirussoftware.Thisjournalusesdiagramstoshowhowtheentirenetworkcan
fallifevenonesystemishacked.Manyofthesewordswereimpossibletounderstand.


ArjunJale
IR1/3/11AP
1/17/16

Nissenbaum,Helen.
WhereComputerSecurityMeetsNationalSecurity
.N.p.:Springer,2005.
Print.

ThisdocumentprovidesanoverviewofcybersecuritysroleinprovidingdefensefortheUnited
StatesofAmerica(USA).Nissenbaumanalyzestherolesofvariouscompaniesandsecurity
firms,inholdingsecuredataandthestrengthoftheirprotection.Shealsoanalyzesthe
effectivenessofautonomousantivirussoftwareindefendingthesystems.Shearguesthat,if
keptproperandundercontrol,thereisahigherchanceofanautonomoussystemtoprevail
againsthumanattackersbecauseofacomputersspeed.Shethencounterarguesthatacomputer
lacksthehumanintuitionanddecisiveness.Theauthorspendstimediscussinginthelater
passagesthatnationalsecurityisamandateandshouldbeenforced.Shediscussesthelackof
antivirussoftwareinmostdevices,whichgrantshackersaneasywayintoourgovernmentand
manycorporations.Nissenbaumanalyzestheneedforfree,builtinantivirussoftwaretoprevent
suchintrusionsintoournationalsecuritynetwork.ThepaperrelatestoChinasevergrowing
nationalpresenceontheinternet.Thearticledoesnotanswerthequestionposedinthetitle
directly,butratherinferstheanswerthroughoutthepassage.Thereisalsoobviousbiasinher
argument,asifshehasbeencontractedbyasecurityfirmtowritethisarticle.

Powell,Benjamin.
IsCyberSecurityaPublicGood?EvidencefromtheFinancialServices
Industry
.Vol.1.N.p.:GeorgeMasonUniversitySchoolofLaw,2005.Print.

ThisdocumentbyBenjaminPowellanalyzestheneedofcybersecurityinnotonlygovernment
butalsohomesystems.Theneedforcomputerprotectionsoftwareinhomesiscrucialto
maintainingthestabilityofourgovernment.Mostcomputervirushacksstartbyhackingsmall
vulnerablepiecesoftechnologyandthenusetheirinfiltrationtofurthertheirprogress.Powell
writesabouttheneedformoderncomputersystemstomoveforDOSandmovetoamoresecure
systemsuchasC++orC#.Thisdataiscurrentlyoutdated,asthisdocumentwaswrittenin2001
andthecurrentsystemshavemovedfromDOSadecadeago.Itispossiblethisdocumentwill
notbeaviablesourceofinformationbecauseofitslackofcurrentknowledge.

Su,Edgar.ChinaRevealsItsCyberWarSecrets.
TheDailyBeast
.DailyBeast&Reuters,n.d.
Web.26Oct.2015.

ThisarticledescribesthepositionoftheUnitedStatesincyberattacks,againstChinaaswellas
othercountries,andhowtheUnitedStatesisdefendingitself.Chinahasrevealedtheir
specializedtaskforce,builttocombatandattackcountriesthroughcyberattacks.TheUnited
Statesrespondedbyacknowledgingtheinformationandrespondingthattheyalreadyknewdue
tospiesinkeypositionsintheChinesegovernment.TheChinesegovernmentwillevaluatethis
response,anditmaycreatealingeringimplicationsontherelationshipbetweenthesetwo
superpowers.Chinahasvariousorganizations,suchasAxiom,thatarebuilttoattackUSFortune
500CompaniestogiveChinesecompaniesabetterchanceintheglobalmarket.Sudiscussesthe
speedofwhichcountriesareemployingcybersecurityprofessionalstodefendthecountry.


ArjunJale
IR1/3/11AP
1/17/16

While,itstatesthatIranandRussiaarethenexttwoleadersincyberwarfare,thereaderisnever
toldwhy.

Smith,JamesF.""ConfrontingComplexCyberSecurityChallenges""ConfrontingComplex
CybersecurityChallenges.BelferCenter,JulyAug.2013.Web.14Dec.2015.

ThisdocumentisareportofhowstudentsfromHarvardandMITareworkingonaglobalcyber
securityinitiativetostandardizeinternetrules.Thiscomesfromtheeverlastingproblems
associatedwithdifferentcountrieshavingdifferentpoliciesinpiracy,hackingandhardware
manipulation.Theuniversityhasgivenmorethan10milliondollarstofundresearchinfiguring
outtheperfectcommongroundbetweencountriesintheirrules.Theprojectisalsospending
resourcesonfindinginternationalrelationsbasedoncyberissues.ZacharyTumin,aleading
researcherhasdevelopedacasestudytofindasolution..Hethenprogrammedanalgorithmthat
willanalyzethreatsandfindtheperfectsolution.Thisdocumentwillbeessentialtorefutethat
cybersecurityattackswillalwaysbeprevalent.Itisafirstpersonsourceandeveryauthorhasa
doctoraldegreeThedocumentcanbeimprovedbyprovidingexamplesofhowtheprojectwill
work.

SystematicApproachestoCyberInsecurity
.Print.

Themaintopicofthisjournalisanalyzingthedependencyandvulnerabilityofinfrastructurethat
requirecybersystems.Goldsmithattemptstocreateasystemwhichcreatesarealworld
implementationforcyberdefensesystems.Thisisoneofthebiggestreasonswhydefense
systemsfail.Theydonothavetheproperfieldtestingandhackersalwaysfindawaytobreak
thefirewallthroughaunexpecteddesignflaw.Theauthorconcludesthataspeoplearebecoming
moredependentoncyberinfrastructure,theneedforstrongercybersecurityneedstoincrease
becausethevulnerabilityofthesesystemsalsoincrease.Thisarticlebasesitsentireclaimonreal
worldscenariosthathavehappenedinthepastwhichstrengthenstheclaimitmakes.These
scenarioscanbeusedtoconvincepeopleofthedangersthatvirusesposeandtheneedtoprotect
themselves.

Valeriano,Brandon.ATaleofThreeCyberSecurityArticles.
DuckofMinerva
.Duckof
Minerva,5May2014.Web.26Oct.2015.

Valerianoanalyzestheneedofcybersecurityinthemodernworld.Hebelievesthatthenation
needstobespendingmoreresourcesondefendingitselfinsteadofattackingothercountries.He
referstoattacktheUSconductedonIranandthelackofaneffectontheirnuclearmissile
program.TheseattackscosttheUSmorethantheygetoutoftheattack.Notonlythat,butifthey
arediscovered,relationswiththecountryreachatippingpoint.Themostrecentexample
ValerianostatesisChinasattempttoattacktheDepartmentofAgriculture.Whilethisattack
failed,itledmanytobelievethatChinaisfundingprivatehacktivistgroupstodoitsbidding.


ArjunJale
IR1/3/11AP
1/17/16

ThisjournalapprovesthisdecisionandbelievestheUSshouldfollowinChinasfootstepsto
saveresources.Valerianowriteswithaclearconservativebias,whichlowerstheeffectivenessof
hisdelivery.

You might also like