President Obama declared that “the cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend from cybersecurity. " Cyber security is more important than ever; more and more people are using remote access instead of coming into the office. Hard drives, both mechanical and solid state, are being replaced by “cloud computing/storage”. A cursory look via Google shows many ways to compromise a system. To help understand these threats, we will look at the types of threats and could be used; legislation that has been considered and possible recommendations. What are cybersecurity threats? One) an EM impulse caused by nature or man. 2) computer viruses/malware, the installation of which can be done passively; people target a specific system hack. 3) From within. Each of these actions has its own unique way of managing chaos through an orderly system, thus compromising national security. .EM PulseOne The quickest way to disable a computer system, a power grid, or anything else that runs on energy or a program is via an electromagnetic pulse or an EM pulse. An EM pulse can be caused either by natural means (this is what the Aurora gives us and can be relatively benign), or it can be caused by humans. An artificial EM pulse was first tested during the first high-altitude nuclear weapons tests. The phenomenon is characterized by a brief but powerful explosion of electromagnetic waves that propagate from the device in waves of decreasing intensity, in short this i...... middle of paper ......y, if the past is any drive, a major disaster such as an EM pulse or an unauthorized drone attacking a major civilian target will have to occur before anything serious is done. One Possible Scenario In the year is 2020, threat forces have managed to obtain a US drone large enough for their goals: destroying US infrastructure. The drone's payload is a dirty EM device. Through a computer connection the vehicle is launched. Without being detected, the vessel approaches the drone's estimated flight distance and launches the device towards Miami, Florida. Once at altitude and still undetected, the drone explodes creating an EM pulse (shock wave). The results are devastating to both life and property. Encouraged by their success, the threat force prepares another created by reverse engineering the first; this time a ransom is demanded or another American city is attacked.
tags