You are on page 1of 8

Running Head: CYBERSECURITY AND NATIONAL SECURITY 1

Cybersecurity and National Security

Tracie White

Arkansas Tech University


CYBERSECURITY AND NATIONAL SECURITY 2

Introduction

The internet has completely changed the way we live, work, and communicate. Because

of the internet, we can communicate to another person on the other side of the world; we can

look for the menu of a local restaurant, or get directions and traffic information with the touch of

a few buttons. The internet has leveled the playing field between large corporations and small

businesses. Global communication and online collaboration are possible because of the internet.

The internet has an abundance of benefits; however, we dont often think about the dark side of

the internet. The internet has opened the door to cyber-attacks and cyber-criminals, and now we

must consider the cybersecurity of our nation. Questions such as these must be considered: Can

someone hack into my bank and steal my identity? Can someone hack into a business database

and steal personal information? Can someone from another country hack into a national airport

control room? Can the internet be used to manipulate individuals, groups, or countries to commit

violent crimes of hate? Can the internet be used for espionage, illegal transactions, and

terrorism? Can the internet be used to attack our country? Sadly, the answer to these questions

are yes. The issue of national cybersecurity must be addressed.

Literature Review

National cybersecurity has been a topic of interest since the 1990s. Information

technology analysts have stated cyberspace could be the next domain used for warfare.

Cyberspace is defined by Merriam-Webster as the online world of computer networks and

especially the Internet (Cyberspace, 2017). The Department of Defense defines cyberspace as

a global domain within the information environment consisting of the interdependent network

of information technology infrastructures, including the Internet, telecommunications network,

computer systems, and embedded processors and controllers. (Reveron, 2012).


CYBERSECURITY AND NATIONAL SECURITY 3

In 1998 President Clinton signed the Presidential Decision Directive 63. The directive

was to establish a structure to coordinate action to take all necessary measures to swiftly

eliminate any significant vulnerability to both physical and cyber-attacks on our critical

infrastructures, including especially our cyber systems (Reveron, 2012). In 2008, the National

Defense Strategy stated individual hackers or groups of politically motived hackers, also called

hacktivists, can attack vulnerable points in cyberspace and disrupt commerce and daily life in

the United States, causing economic damage, compromising sensitive information and materials,

and interrupting critical services such as power and information networks (National Defense

Strategy, 2008). Cyber warfare can level the playing field when it comes to nations. Smaller

nations without a large military force, tanks, and aircraft, can have an advantage in cyberspace.

In 2010, NATO stated, cyber warfare is one of the most serious threats to the alliance and the

countries that are part of it. (Heickero, 2013). According to the 2010 Quadrennial Defense

Review, cyberspace is now a domain like land, air, sea, and space that can be used in

warfare. David Fidler, a legal scholar, refers to cyberspace as a new dimension (Reveron,

2012)

The first time cyberspace was used to attack a nations security was 2008. Russia used

cyber-warfare during the invasion of Georgia in 2008. The result of the cyber-attack was not

devastating, however, it added to the chaos of the physical attack. In 2010, the Stuxnet worm was

created for the specific purpose of targeting an industrial computer system that would attack

power plants, communication systems, and factories to disrupt Irans nuclear program (Reveron,

2012). Although, no person, group, or nation admitted to creating the Stuxnet worm. Experts

propose Stuxnet was created by a joint effort between the United States and Israel (Heickero,

2013)
CYBERSECURITY AND NATIONAL SECURITY 4

Cybercrimes are growing exponentially in many countries, including the United States.

Crimes like industrial espionage, fraud, theft of information and money, cyber-terrorism,

counterfeiting, impersonation and concealment of identity, extortion, and electronic money

laundering are on the rise. Cyber warfare is just one small step away.

The United States has started to prepare to use cyberspace in warfare. United States

Cyber Command (USCYBERCOM) was created in 2010 to be the cyber support for the Army,

Navy, Airforce, and Marines. In 2011, the Department of Defense Strategy for Operating in

Cyberspace was drafted and included the following initiatives (Reveron, 2012):

Strategic Initiative 1: Treat cyberspace as an operational domain to organize, train, and

equip so that DoD can take full advantage of cyberspaces potential

Strategic Initiative 2: Employ new defense operating concepts to protect DoD networks

and systems

Strategic Initiative 3: Partner with other U.S. government departments and agencies and

the private sector to enable a whole-of-government cybersecurity strategy

Strategic Initiative 4: Build robust relationships with U.S. allies and international partners

to strengthen collective cybersecurity

Strategic Initiative 5: Leverage the nations ingenuity through an exceptional cyber

workforce and rapid technological innovation

In 2016 President Obama released a FACT SHEET: Cybersecurity National Action Plan

(CNAP). The primary purpose of the CNAP was to protect the United States in cyberspace the

new cyber domain. More specifically the CNAP addressed the need to increase the level of

cybersecurity for the United States and its citizens, increase online privacy, improve the security

and resilience of Americas infrastructure, secure technology by investing in science and


CYBERSECURITY AND NATIONAL SECURITY 5

technology, deter malicious activity in cyberspace, improve cyber incident response, protect the

privacy of individuals, and fund cybersecurity (Factsheet, 2016).

Furthermore, the CNAP listed the following action plans:

Establish a Non-partisan Commission on Enhancing National Security

Modernize government information technology and manage national security with the

Information Technology Modernization Fund and to create a position for a Federal Chief

Information Security Officer

Assist Americans to secure online accounts by using multi-factor authentication

Invest $19 billion on cybersecurity in the 2017 budget

The non-partisan Commission, established by the CNAP, included 12 members. Four of

the commission members were chosen by the party leaders from the Senate and the House of

Representatives. The other eight members had expertise in information technology,

cybersecurity, national security, research and development, higher education, law enforcement,

and US policies and procedures. Some of the members were leaders of global corporations, and

some members were military or government officials (Commission on Enhancing National

Security, 2016).

The Commission on Enhancing National Security report was released in December 2016

following the directive by the Cybersecurity National Action Plan. The commission recognized

the value of cyberspace for global communication, social change, and economic prosperity. The

commission also recognized the necessity in protecting cyberspace, and the United States

citizens privacy, public safety, economic and national security, while continually fostering the

development of new technology solutions. The commission addressed the need for cybersecurity

at all levels for individuals, small businesses, large corporations, non-profit organizations, and
CYBERSECURITY AND NATIONAL SECURITY 6

governments. The Commission on Enhancing National Security report included the following six

imperative actions (2016).

1. Protect, defend, and secure todays information infrastructure and digital

networks

2. Innovate and accelerate investment for the security and growth of digital

networks and the digital economy

3. Prepare consumers to thrive in a digital age

4. Build cybersecurity workforce capabilities

5. Better equip government to function effectively and securely in the digital age

6. Ensure an open, fair, competitive, and secure global digital economy

The Commission on Enhancing National Security report also included 16

recommendations and 53 action items. In the final section of the report the commission

communicated the need for urgency. National cybersecurity should be a top priority for everyone

individuals, small businesses, large corporations, non-profit organizations, government

agencies at all levels, and the new President and his administration. The commission firmly

stated the need for cooperation between government agencies and organizations in the private

sector. They also recommended measuring the outcomes for each one of the action plans. The

commissions final recommendation to the new presidential administration is to follow the

recommended action plans immediately to protect our nations cybersecurity (Commission on

Enhancing National Security, 2016).

Conclusion

It is imperative that we protect our national cybersecurity. Cyberspace is the new

dimension for criminals, terrorists, and warfare. We must meet this new challenge with a strong
CYBERSECURITY AND NATIONAL SECURITY 7

unified front and a definitive plan of action. We need to look beyond the numerous benefits of

cybersecurity, and prepare to protect our nation from the dark side of cyberspace. Implementing

the suggested actions recommended by the Commission on Enhancing National Security is a

good and strong beginning. We need to come together as a country and be part of the solution.

As long as cyberspace and information technology grows, we must meet that growth with

equally strong solutions.


CYBERSECURITY AND NATIONAL SECURITY 8

References

Commission on enhancing national cybersecurity: Report on securing and growing the digital

economy. (2016, December 1). Retrieved from

https://www.nist.gov/sites/default/files/documents/2016/12/02/cybersecurity-

commission-report-final-post.pdf

Cyberspace. (2017). Retrieved from https://www.merriam-webster.com/dictionary/cyberspace

Fact sheet: cybersecurity national action plan. (2016, February 9). Retrieved from

https://obamawhitehouse.archives.gov/the-press-office/2016/02/09/fact-sheet-

cybersecurity-national-action-plan

Heickero, R. (2013). The Dark Sides of the Internet: On Cyber Threats and Information Warfare.

Frankfurt am Main, Germany: Peter Lang AG. Retrieved from

https://libcatalog.atu.edu:443/login?url=http://search.ebscohost.com/login.aspx?direct=tr

ue&db=nlebk&AN=542525&site=ehost-live&scope=site

National Defense Strategy. (2008, June) Department of Defense. Retrieved from

https://www.defense.gov/Portals/1/features/defenseReviews/QDR/2008_National_Defens

e_Strategy.pdf

Reveron, D. S. (2012). Cyberspace and National Security: Threats, Opportunities, and Power in

a Virtual World. Washington DC: Georgetown University Press. Retrieved from

https://libcatalog.atu.edu:443/login?url=http://search.ebscohost.com/login.aspx?direct=tr

ue&db=nlebk&AN=491171&site=ehost-live&scope=site

You might also like