Cyber Attack Challenges Paper Bruce Schneier, in his article “Schneier on Security Blogs” has analyzed matters of security especially on technology, which

Cyber Attack Challenges Paper Bruce Schneier, in his article “Schneier on Security Blogs” has analyzed matters of security especially on technology, which are cyber threats, especially in the US. In two of the articles that Schneier has written, “former FBI General Counsel Jim Baker chooses encryption over backdoors” and “Dark Web site taken down without breaking the encryption,” cyber threats have been analyzed. Regarding the week’s reading, Reveron (2012) states that there a lot of threats, opportunities, and power in the virtual world. The US, in the past decades, has been under cyber threats from countries like Russia and China trying to overturn the superpower title through gaining secret information.

With the analysis of Schneier (2019) on the above-mentioned articles, with the choice and preferences by former FBI general Jim Baker, it shows that cyber threats are real. Also, with significant choices such as encryption being opted by a national security agency counsel, it ascertains that cyber threats in the US have been overwhelming. In the next article that Schneier uses to demonstrate cyber threats, it shows the taken down of dark web child porn sites without encryption. It shows that the US security agencies have the capability of taking down all the cyber threats, but the political beneficiary has chipped, thus creating reluctance. These are the sites that other countries tend to use to get their way into the US security agencies.

According to Cilluffo (2010), the protection of the critical infrastructure of the US should be prioritized. It is because hackers from influential countries such as Iran, Russia, and China are on the verge of undoing what’s essential. The security agencies of the US have the capability of stopping cyber threats if prioritized. Failure to do this, in the near future, sensitive information of the US will be used against them. Therefore, cyber threats is a matter that needs to be prioritized and acted upon with all the means necessary to maintain security.

References

Cilluffo, F. (2010). Cyber Threats from China, Russia, and Iran: Protecting American

Critical Infrastructure. Journal of Information Security and Technologies. GWU.

Reveron, D. (2012). Cyberspace and National Security: Threats, Opportunities, and Power in

A Virtual World. Georgetown University Press.

Schneier, B. (2019). Schneier on Security Blogs. Retrieved From:

https://www.schneier.com/

Leave a Reply

Your email address will not be published. Required fields are marked *