Professional Documents
Culture Documents
IR1/3/11AP
1/17/16
CompiledAnnotations
Beuchelt,Gerald,CoryCasanve,andVijayMehra.AdvancesinOperationalRiskandThreat
Modeling.
NationalCybersecurityInstituteJournal
1.3:n.pag.Print.
Inthisdocument,theauthorsanalyzethevariouswaystoproperlypredictattacksandprevent
them.Themostessentialstepintheirprocessistoanalyzewhattypeofthreatisattacking.The
journalusesagraphicalmodelofthreatassessmentthatwillallowpeopletoproperlyidentify
threatsandwhytypeofsolutionisrequiredtosolvetheproblem.Theauthorsalsostronglyrefer
tocontingencysystemsintheneedofafullsystemrestore.Theyalsoprovideaseparatesetof
instructionsforcorporatesystems,thatholdsmuchmoresensitivedata,whilebeingableto
affordhigherqualitysystems.Whilethejournalprovidesmanygraphicalinterpretations,most
aredifficulttoanalyzewiththedatainthetext.
Belk,Robert,JosephNye,andMonicaToft.OntheUseofOffensiveCyberCapabilities.
PolicyAnalysisonOffensiveUSCyberPolicy
:n.pag.Print.
ThisjournalfromHarvardisarecommendationtoanygovernmentonhowtheircybersecurity
canbeusedtocrippleothercountries.TheauthorsusetheOffensiveMilitaryCyberPolicyas
thebasisfortheirpolicy,tryingtostayasclosetothecurrentpolicyinordertocreateamore
feasibleplan.Theycreateausableframework,thathasnotbeentestingwhichmakesitveryhard
tocorroboratetheeffectiveness.Theauthorsaddressminimalandmoreextensiveframeworksto
makesuremultipletypesofsystemscanbeprotectedundertheiranalysis.Thejournalis
concludedwithmeansofusingtheframeworktoattackandcounterattackanyenemy.This
articleisincrediblybiasasRobertBelk,oneoftheauthorsisamemberoftheNavy.Thiswas
writtentotryandgetmorefundingformilitarystrikesandhasnoideasondefensebutonly
offense.
Cho,Yiseul.StrategicPhilanthropyforCyberSecurity:AnExtendedCostbenefitAnalysis
FrameworktoStudyCybersecurity.
MITJournal201206
:n.pag.Print.
InthisdocumentChoanalyzesthecostandbenefitofcybersecuritydevelopment.Heuses
resourcesoninternationaldevelopmentandstrategicphilanthropy.HeusesaKoreanSecurity
agencyashisexampleofhowaframeworkcanbeusedforidentifyingthreatsandfindingways
atsolvingthem.Choalsoanalyzestherelationshipbetweenpublicandprivateorganizations
duringthedevelopmentofsuchaframeworkandthepossibleramifications.Byputtingthis
frameworkthroughdifficultfieldtestsChohasconcludedthatthisframeworkwillbethebase
forthefutureofcybersecurity.Hehasfoundthatprivateorganizationscanbegreatlybenefited
byworkingwithpublicorganizationsbecausetheirpublicimage,resourcesandexperiencewill
beimproved.Anotherfindingisthatinternationaldevelopmentactivitiesworktoimprovecyber
security.Thisjournalusesrealfieldworkteststoshowthelegitimacyoftheargument.Thisis
crucialforfindingwaystostopcybersecurityattacks.
ArjunJale
IR1/3/11AP
1/17/16
Cunningham,Fiona.AssuringAssuredRetaliation:.
InternationalSecurity
:n.pag.Print.
ThisdocumentanalyzestheneedfortheUnitedStatestoincreaseitseffectivenessinthe
internationalcyberwarfarespaceinordertosecurepeace.Chinacurrentlyhasasmallnuclear
weaponsforcethatcanbecrippledthroughtheforceofcyberattack.ThiswouldremoveChinas
abilitytothreatentheUnitedStates.Thisplanwillalsopreventthecostofanarmsrace,similar
totheonethatleadtothecreationofthesenuclearweapons.Acyberracewouldcost
significantlylessandcanholdmuchmorepromisingresults.ThearticleassumesthatChinawill
continueitsweaponsraceaswellasdevelopcyberdefense.Thiswillcostasignificantamount
ofmoney.TheauthordoesalotofguessingonChinaspartanditisdifficulttoestimateifwhat
theauthorbelievesChinawilldowillactuallyhappen.Thearticlealsodoesnotcontainmany
sourceswhichlimitstheeffectivenessofthearticle.
Geer,DanielE.,Sc.D.CybersecurityandNationalPolicy.
HarvardLawSchoolNational
SecurityJournal
:n.pag.Print.
Thisjournaldocumentsthechangesinnationalpolicyascyberattackshavegrownmore
dangerousandprevalentaswellastheethicsbehindsuchpolicies.GeerwritesabouttheUS
NationalTreasurysfailuretotrackbillsduetoacyberattack.Theattackwasshortlived,butif
carriedoutinamorepowerfulway,itcouldcripplethedollarsintegrity.Geeracknowledgesthe
contingencyplansthegovernmenthasinplaceincaseofanycyberattack.Hestatesthathedoes
nottrustthestatessystemasafulloncyberattack,istohim,inevitable.Thejournalconcludes
withaseriesofscenarios,inwhichhediscussespossiblemethodstheUnitedStatescanuseto
preventcyberattacks.Thisjournalwasopinionbases,whichlowersitscredibilitycompletely.
Gupta,Ravi."CrowdsourcingCybersecurity:APropertyRightsViewofExclusionandThefton
theInformationCommons."InternationalJournaloftheCommons.UtrechtUniversity
LibraryOpenAccessJournals,21Dec.2015.Web.21Dec.2015.
ThisdocumentfromtheCenterofSecurityStudiesanalyzesthedifferentattitudesassociated
withenhancedinternationalcybersecurity.Thedocumentrecognizesthebasicneedforthe
internetforeconomicgrowthandtheimportanceoftheinternetforbasiccommunicationacross
longdistances.Ravithencontinuestoanalyzethecurrentproblemsthatcurrentsystemsarenot
abletopreventhackersfromgainingcrucialinformationandpresentsalistofstepsthatcanbe
takentopreventhackers.Theentirearticleisbasedontheviewthatitisimportanttoanalyzethe
currentmoodofthepeopletoseewhatrestrictionsarenecessary.Hebelievesthatthe
internationalcommunityshouldemployaneedbasisinwhichwhenattacksaremoreprevalent,
therebestrongerrestrictionsandwhentheyarelessactive,thereshouldbelessrestrictions.He
referencesthemusicindustrywhichisnowtrackingIPaddressestopreventpiracyandhowthis
canbeliftedwhenpiracyisnolongeraproblem.Thisarticlehasimportantinformationforthe
ArjunJale
IR1/3/11AP
1/17/16
researchpaper.Theauthordoesnotspendtoomuchtimecounteringtheideathatacountrywill
bevulnerablewhentheirsecurityisloweredbutitdoespresentadifferentopinioncomparedto
alltheotherresearchpaperscurrentlyanalyzed.
Hathaway,MelissaE.WhyAmericaShouldCareaboutCybersecurity.
StrategicAdvantage
:
n.pag.Print.
InthisdocumentHathawayanalyzestheneedforcybersecurityandwhythereshouldbea
higheremphasisonit.Shelistsalltheinfrastructurethatneedsstrongcybersecuritytobekept
runningandtheproblemsthatcanbeassociatedifthereislesssecurity.Herargumentisrelated
toagameofChineseWeiChiinwhichthenumberofpossiblemovesdoesnotmatter,allone
needsisacorrectmove.Shearguesthatthegovernmentneedstoworkwithotherorganizations
tostrengthentheaveragenationalcybersecurity.HathawayusestheConfickerworm,avirus
thatforcedthegovernmenttoworkwithmanycompanies,ashowrelationsbetweenprivate
organizationscanhelpussecureoursystems.Thiscanalso,sheargues,helpidentifywhat
hackersareafter,whetheritbeadvancedtelecommunicationsdesignsorweaponsfromprivate
organizations.Theauthorbringsauniqueperspectiveinwhichshedoesnotusewarasareason
toincreasecybersecuritybutrathertheneedforbasicinfrastructure.Theexampleofthe
Confickerwormwillbecrucialtoconvincingpeoplethatthegovernmentneedstotakeamore
activeroleinournationaldefense.
Kello,Lucas.PerilstoTheoryandStatecraft.
TheMeaningoftheCyberRevolution
.Vol.38.
N.p.:PresidentandFellowsofHarvardCollegeandtheMassachusettsInstituteof
Technology,2013.N.pag.Print.
Inthisdocument,Kellousesvariouspiecesofevidencetoprovethatwearelivingina
dangerouseraofcyberwarfare.Thetwomainpointsinthisarticlearethatpoliticsisfailingto
dealwiththeincreasingnumberofcybercrimesandthatitiseasiertoattackthandefend.Kello
supportshisargumentwiththefactthatinthepastfewyears,inwhichpoliticshastakenthe
spotlight,nationalcybersecurityhasfallen.Healsoshows,throughdiagramsandcharts,that
attackingismucheasiertodefendbecausewhendefendingthereislotsofgroundtoprotect.The
journaldocumentstheideathateducationisrequiredinthenextgenerationofstudentstoprotect
ourcountry.KelloreferencestheRussianattackonGeorgiain2008toshowhowrespectable
militarygesturesdonotapplywhenthewarisonline.Whilethedocumentisstraightforward,
therearemanynuancesandundertonesthatmakereadingthisarticleharder.
Kessler,GaryC.,andJamesD.Ramsey.
JournalofHomelandSecurityEducation
.N.p.:ERAU,
2012.Print.Vol.2.
ThisdocumentbyGaryKesslerandJamesRamseydiscussestheeffectivenessatteaching
studentsatayoungagetheskillsneededtoprotectthemselvesagainstcyberattacks.Kesslerand
ArjunJale
IR1/3/11AP
1/17/16
Ramseydiscusstheneedofcombininghighschooltechnologyeducationprogramswithcyber
securitydefenselessonstoproperlydefendstudentsagainstanevergrowingdangeronthe
internet.Theyalsodiscusstheregulationsandproceduresinthecriminallawcodethatdeals
withcyberattacksandtheroleofteachingstudentstheconsequencesofsuchanattack.Thetwo
authorsreferenceaevergrowingpresenceofterroristorganizationsonsocialmedia.Thejournal
doesnotdiscussthenumberofschoolsalreadyemployingacybersecurityclass,whichlowers
itsneed.Whilethisdocumentdoesnotdiscusstheeffectsofcyberwarfare,itevaluatesaplanto
preparestudentsagainstcyberterror,whichwillhopefullypreventmanyfrombeinghacked.
LeClair,Jane,EdD,RandallSylvertooth,andKevinP.Newmeyer.ElementsofNationalCyber
SecurityStrategyforDevelopingNations.
NationalCybersecurityInstituteJournal
1.3:
n.pag.Print.
Inthisdocumenttheauthorsanalyzethestepsdevelopingcountriesshouldtakeandaretakingto
protectthemselvesagainstcybersecurity.Theauthorssupporteachoftheirclaimswith
statisticaldata.Theystatethatthereasonforsuchmeasuresisthegrowingnumberofcyber
securitythreatsaffectingtheworld.Thejournalshowsthecorrelationbetweentherateof
developmentandcybersecuritydefensestrength.Inalmosteverycase,thestrongerthedefense
systems,themoredevelopedthecountry.Theauthorssummarizetheeffectivenessofthe
EuropeanUnionscybersecuritycommissionof2013.Thecommissionhaspreventednumerous
attackersfromgainingentrytosecuredatastreams.Thedocumentconcludeswithvarious
statisticaldataandrecommendationsofantivirussoftwareforpersonaluse.
NationalSecurityAgency.APracticalStrategyforAchievingInformationAssurancein
TodaysHighlyNetworkedEnvironments.
DefenseinDepth
:n.pag.Print.
ThisisaarticlewrittenbytheNationalSecurityAgency(NSA)tocorporationstoprovideabase
frameworkfortheirsystems.Thissystemistheperfectbalancebetweenstrength,costand
effectiveness.TheNSAusesaDomainStructureMatrix(DSM)tointegratecyberspaceand
internationalrelations.ThisisduetothebadpublicimagetheNSAhasreceivedinthepastfew
years.AttackersandMotivationsareoutlinedtoexplaintopeoplewhypeoplehack.Information
assuranceisguaranteedfromthissystem,whichmeansthatyourdatawillneverbelostdueto
multiplebackups.Thearticlehasalistofresourcesandelementsneededtocreatethesystem
described.Thiswillbeessentialtoteachingpeoplehowtodefendthemselves.Thisarticledoes
notprovidetoomuchdetailonwhatcyberattacksarebutitdoesprovideawaytostopthem.
NICCS."NationalInitiativeforCybersecurityCareersandStudies"NationalInitiativefor
CybersecurityCareersandStudies(NICCS).HomelandSecurity,7Dec.2015.Web.7
Dec.2015.
ArjunJale
IR1/3/11AP
1/17/16
Thiswebsitecontainsresourcesforteachersandstudentstocreateacybersecuritycoursein
theirschool.Thiswillbecrucialfortheresearchprojectbecauseaportionofmypaperand
websitewillbededicatedtoshowingreadershowtoimplementcybersecurityintotheirdaily
lives.NICCSbeginsbydescribingwaystoengagestudentstolearnaboutcybersecurityand
howtofostercybercommunities.Thebestwaytoengagestudentsisbyinteractingwiththem
andgivinghandsonactivities.Thenextstepistogetteacherstosupportyourcause.Thisis
especiallyimportantasteacherswillbetheonesteachingthestudentsandwithouttheirsupport,
theentiresystemwillfallapart.Thedocumentthengoesontoshowexamplesofsuccessful
casesofcybersecurityclasses.Thisdocumentisareliablesourcefromthenationalgovernment
andiscrucialtomyresearch.Itcontainsimportantinformationonhowtostartacybersecurity
program.Thestrengthofthisdocumentcanbeincreasedbyaddingsources.
NewYorkTimesEditorialBoard.ArmsControlforaCyberage.
NewYorkTimes
.NewYork
TimesCompany,26Feb.2015.Web.26Oct.2015.
Thisdocumentevaluatestheracebetweencountiestoempowerthemselveswithcyberprotection
andattackingpowertoattackothercountriesinthecaseofaninternationalincident.This
documentmainlyfocusesonIran,unlikemanyotherdocumentsthatfocusonChinabecause
Chinaisourbiggestfoe.TheUnitesStateshasanticipatedattacksfromtheIraniangovernment
andplantedfalseinformationaboutitsnuclearprogramtotryanddiscourageIranfrom
followingtheUnitedStatesinthenuclearrace.Thearticleemphasizestheblurredlineinwhich
cyberwarfarelivesandhowitisimpossibletopredictorcompletelydefendagainstsuchattacks.
WhilefollowingthewhereaboutsofEdwardSnowden,oneoftheworldsbesthackers,theNSA
hasfoundthattheUnitesStateshashackedIran,andIranisconsideringitthefirstattackofthe
war.Whiletensionshavedieddown,ithasdemonstratedtheeaseatwhichcyberwarfarecan
leadtointernationaldisaster.TheEditorialBoarddoesnotconsiderthepreviousincursionsthe
UnitedStateshashadwithIran,whichcouldhaveescalatedtensions.
Nichols,James.NationalCybersecurity1.2(2008):n.pag.ExcelsiorCollege.Excelsior,2Nov.
2008.Web.7Nov.2015.
Inthisjournal,theauthordiscussestheimportanceofcybersecuritydefenseclasses.Nichols
arguesthattheyoungergenerationsmustlearntheskillsneededtodefendthemselvesandto
learnhowtocreateaneffectiveworkplaceinthefuture.Whiletheneedtocreateaneffective
workplaceisunnecessarytomytopic,theneedtolearntodefendisalargetopicthatcanhelp
synthesismypaper.Intheend,thegoalofNicholsistohaveeveryhighschoolequippedwith
computersandreadytoteacheverystudentbasiccybersecurityskills.Hebackshisargument
withstatisticaldata,suchasthatover85%ofpeoplewithacomputerdonotknowhowto
managetheirantivirussoftware.Thisjournalusesdiagramstoshowhowtheentirenetworkcan
fallifevenonesystemishacked.Manyofthesewordswereimpossibletounderstand.
ArjunJale
IR1/3/11AP
1/17/16
Nissenbaum,Helen.
WhereComputerSecurityMeetsNationalSecurity
.N.p.:Springer,2005.
Print.
ThisdocumentprovidesanoverviewofcybersecuritysroleinprovidingdefensefortheUnited
StatesofAmerica(USA).Nissenbaumanalyzestherolesofvariouscompaniesandsecurity
firms,inholdingsecuredataandthestrengthoftheirprotection.Shealsoanalyzesthe
effectivenessofautonomousantivirussoftwareindefendingthesystems.Shearguesthat,if
keptproperandundercontrol,thereisahigherchanceofanautonomoussystemtoprevail
againsthumanattackersbecauseofacomputersspeed.Shethencounterarguesthatacomputer
lacksthehumanintuitionanddecisiveness.Theauthorspendstimediscussinginthelater
passagesthatnationalsecurityisamandateandshouldbeenforced.Shediscussesthelackof
antivirussoftwareinmostdevices,whichgrantshackersaneasywayintoourgovernmentand
manycorporations.Nissenbaumanalyzestheneedforfree,builtinantivirussoftwaretoprevent
suchintrusionsintoournationalsecuritynetwork.ThepaperrelatestoChinasevergrowing
nationalpresenceontheinternet.Thearticledoesnotanswerthequestionposedinthetitle
directly,butratherinferstheanswerthroughoutthepassage.Thereisalsoobviousbiasinher
argument,asifshehasbeencontractedbyasecurityfirmtowritethisarticle.
Powell,Benjamin.
IsCyberSecurityaPublicGood?EvidencefromtheFinancialServices
Industry
.Vol.1.N.p.:GeorgeMasonUniversitySchoolofLaw,2005.Print.
ThisdocumentbyBenjaminPowellanalyzestheneedofcybersecurityinnotonlygovernment
butalsohomesystems.Theneedforcomputerprotectionsoftwareinhomesiscrucialto
maintainingthestabilityofourgovernment.Mostcomputervirushacksstartbyhackingsmall
vulnerablepiecesoftechnologyandthenusetheirinfiltrationtofurthertheirprogress.Powell
writesabouttheneedformoderncomputersystemstomoveforDOSandmovetoamoresecure
systemsuchasC++orC#.Thisdataiscurrentlyoutdated,asthisdocumentwaswrittenin2001
andthecurrentsystemshavemovedfromDOSadecadeago.Itispossiblethisdocumentwill
notbeaviablesourceofinformationbecauseofitslackofcurrentknowledge.
Su,Edgar.ChinaRevealsItsCyberWarSecrets.
TheDailyBeast
.DailyBeast&Reuters,n.d.
Web.26Oct.2015.
ThisarticledescribesthepositionoftheUnitedStatesincyberattacks,againstChinaaswellas
othercountries,andhowtheUnitedStatesisdefendingitself.Chinahasrevealedtheir
specializedtaskforce,builttocombatandattackcountriesthroughcyberattacks.TheUnited
Statesrespondedbyacknowledgingtheinformationandrespondingthattheyalreadyknewdue
tospiesinkeypositionsintheChinesegovernment.TheChinesegovernmentwillevaluatethis
response,anditmaycreatealingeringimplicationsontherelationshipbetweenthesetwo
superpowers.Chinahasvariousorganizations,suchasAxiom,thatarebuilttoattackUSFortune
500CompaniestogiveChinesecompaniesabetterchanceintheglobalmarket.Sudiscussesthe
speedofwhichcountriesareemployingcybersecurityprofessionalstodefendthecountry.
ArjunJale
IR1/3/11AP
1/17/16
While,itstatesthatIranandRussiaarethenexttwoleadersincyberwarfare,thereaderisnever
toldwhy.
Smith,JamesF.""ConfrontingComplexCyberSecurityChallenges""ConfrontingComplex
CybersecurityChallenges.BelferCenter,JulyAug.2013.Web.14Dec.2015.
ThisdocumentisareportofhowstudentsfromHarvardandMITareworkingonaglobalcyber
securityinitiativetostandardizeinternetrules.Thiscomesfromtheeverlastingproblems
associatedwithdifferentcountrieshavingdifferentpoliciesinpiracy,hackingandhardware
manipulation.Theuniversityhasgivenmorethan10milliondollarstofundresearchinfiguring
outtheperfectcommongroundbetweencountriesintheirrules.Theprojectisalsospending
resourcesonfindinginternationalrelationsbasedoncyberissues.ZacharyTumin,aleading
researcherhasdevelopedacasestudytofindasolution..Hethenprogrammedanalgorithmthat
willanalyzethreatsandfindtheperfectsolution.Thisdocumentwillbeessentialtorefutethat
cybersecurityattackswillalwaysbeprevalent.Itisafirstpersonsourceandeveryauthorhasa
doctoraldegreeThedocumentcanbeimprovedbyprovidingexamplesofhowtheprojectwill
work.
SystematicApproachestoCyberInsecurity
.Print.
Themaintopicofthisjournalisanalyzingthedependencyandvulnerabilityofinfrastructurethat
requirecybersystems.Goldsmithattemptstocreateasystemwhichcreatesarealworld
implementationforcyberdefensesystems.Thisisoneofthebiggestreasonswhydefense
systemsfail.Theydonothavetheproperfieldtestingandhackersalwaysfindawaytobreak
thefirewallthroughaunexpecteddesignflaw.Theauthorconcludesthataspeoplearebecoming
moredependentoncyberinfrastructure,theneedforstrongercybersecurityneedstoincrease
becausethevulnerabilityofthesesystemsalsoincrease.Thisarticlebasesitsentireclaimonreal
worldscenariosthathavehappenedinthepastwhichstrengthenstheclaimitmakes.These
scenarioscanbeusedtoconvincepeopleofthedangersthatvirusesposeandtheneedtoprotect
themselves.
Valeriano,Brandon.ATaleofThreeCyberSecurityArticles.
DuckofMinerva
.Duckof
Minerva,5May2014.Web.26Oct.2015.
Valerianoanalyzestheneedofcybersecurityinthemodernworld.Hebelievesthatthenation
needstobespendingmoreresourcesondefendingitselfinsteadofattackingothercountries.He
referstoattacktheUSconductedonIranandthelackofaneffectontheirnuclearmissile
program.TheseattackscosttheUSmorethantheygetoutoftheattack.Notonlythat,butifthey
arediscovered,relationswiththecountryreachatippingpoint.Themostrecentexample
ValerianostatesisChinasattempttoattacktheDepartmentofAgriculture.Whilethisattack
failed,itledmanytobelievethatChinaisfundingprivatehacktivistgroupstodoitsbidding.
ArjunJale
IR1/3/11AP
1/17/16
ThisjournalapprovesthisdecisionandbelievestheUSshouldfollowinChinasfootstepsto
saveresources.Valerianowriteswithaclearconservativebias,whichlowerstheeffectivenessof
hisdelivery.