Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
I realize that we pay less attention to what is important in our lives. We don’t mind if unauthorized people know about our secrets. In fact, we are neither criminals nor terrorists. The fact that encryption is being broken implies that no one is safe. We conduct many transactions online, such as banking, sending and receiving messages, and making phone calls, yet we assume that everything is well. We might be astonished one day to discover that someone has our bank and credit card information. According to NSA, they are improving security when in the real sense; they are actually making us more vulnerable to cyber attacks.
First, he is concerned that encryption is no longer secure as it used to be. If the national security agency is decrypting them without consent from citizens, then it means that no one utilizing encryption is secure. The secrecy in the codes is no longer the case. Secondly, the activity of FBI removing devices from cell phone poles is in itself unlawful. That is against the rights of the citizens. It infringes on people’s right to confidentiality of what is being communicated to them. It is a case that should not be underestimated. Everyone must be concerned that their private space is no longer theirs alone. As much as the NSA have the authority to monitor conversations, they have to treat all the data involved with a lot of confidentiality (Fienberg, 2008). To make matters worse, they are campaigning against encryption. Through this, the NSA is weakening American encryption products. As such information centers on the internet are no longer protected (Green, 2014).
Perhaps they just hear about it but have not taken the time to understand what that is all about. Well, the adversary is way above and is taking advantage of that ignorance. In fact, Mr. Green states that if you told people you are studying cryptography, they would assert that to making maps. We send and receive messages without caring about our confidentiality. The thing is, someone could be keeping an eye on you.
One, citizens should demand the government to ensure privacy and confidentiality of persons (Fienberg, 2008). There is no way the NSA that is supposed to provide security is the same rendering citizens insecure. It is rather ironical in a way. Two, the encryption algorithms should be strengthened so that decryption by someone else may not be feasible (O’Brien & Yasnoff, 1999). Three, creating awareness of the importance of encryption of data among the public (Snell, 2017).
An example of cyber warfare campaign is one that involves curbing hacking. Hacking seems to be the 21st-century internet curse. Many hackers are prowling the internet to access confidential data of individuals, government and private companies. Therefore a campaign against the vice would involve:
The level includes laying down the direction on defining our strategy which is mitigating hacking. First, we are doing this to reduce hacking incidences that have led to loss and corruption of valuable information of companies and individuals. The activities include:
The main goals of the warfare are laid down at the national level. This is done in the backdrop of state power and political aims (Canan, Kucukkaya, & Balci, 2016).
Security policies geared towards eradicating hacking are created. These also involve the development of systems to ensure that they can operate securely. This is also done in the light of dynamism of technology (Boundless, 2016).
Resources are allocated in terms of manpower, finances and national power instruments (Canan, Kucukkaya, & Balci, 2016).
A campaign execution plan is laid down. In the cyber world, new threats and risks emerge that require a dynamic approach (Bhasin, 2016).
This level links warfare strategy and tactics through the establishment of operational objectives. The implementation of strategy by:
The personnel involved in the conduct of campaigns are assigned their duties. In point of fact, this is where major operations occur.
Under this level, tasks and resources are allocated to tactical operations (Dunn, 2017).
Skill, experience, knowledge and creativity of intelligence forces is aligned by integration of ends, ways and means.
Information system owners are sensitized to monitor access controls, strengthen passwords, installing antivirus software, patching among others (Dunn, 2017).
Nationwide monitoring of all internet users are done at a centralized place by the military besides the frequent monitoring at information system centers in different companies. Log files and honeypots come in handy in this task.
Here, the campaign engagements are brought into action through rigorous planning and execution. In other words, the how question is answered. Strategic objectives determine the activities at this level. Here, activities focus on ordered campaign goals. Also, understanding their implementation is vital to meeting the set policy requirements. The activities are:
Contrary to traditional wars, cyber warfare actualization is complicated. As such it will involve incidence response, business continuity and disaster recovery of hacked systems and corrupted confidential data (Canan, Kucukkaya, & Balci, 2016).
This is where the actual implementation of security domains occurs. Things like designing intrusion detection systems, firewall types, filters among others are done (Whitman & Mattord, 2005).
These are policies and standards that explain system development, operational and management aspects.
Here, a decision is made whether the implementers will be outsourced or will be from the employees. After that, resources and funding will be assigned, and the software tested.
With all these measures being observed, systems can be impenetrable thus hacking incidences reducing significantly.
The publication provides the role and conduct of unified land operations which is the Army’s warfighting doctrine. It also describes how the army seizes, retains and utilizes operations in wars so as to create an atmosphere of resolving the underlying conflict. On its strategic context, it describes the operational environment that the men of the gun may work. Its operational variables as such include political, military, information, social, economic, infrastructure, environment and time. Importantly, the doctrine acts as a guiding tool to the Army (Army, 2011).
Notably, this operational variable is also determined by the mission at hand. In this case, the mission variables include the weather, terrain, time, civil considerations, the enemy and civil aspects. Soldiers are meant to understand that operational areas are different with their inherent challenges.
The doctrine also enshrines its foundations which stem from the initiative, decisive action, competencies and the mission command. Furthermore, the operations of the army are characterized by flexibility, integration, lethality, adaptability, depth and synchronization. The armies have to be both flexible in thought as well as plan for the success of their operations.
The operational art goes hand in hand with the strategic objectives followed by tactic actions. What matters here most is the opportunity to fulfill their core mandate under their commanders. Additionally, the operations process involves planning, preparation, execution and assessment. In warfighting, every member of the military has his or her role that they play. The most important thing is that forces are joined to accomplish missions. The functions include the mission command, Intelligence, Movement and Maneuver, Fires sustainment and protection. Intelligence, in particular, plays the crucial role of understanding the enemy, the terrain of the land and civil aspects of an operational base (Army, 2011).
Army. (2011, October). Retrieved March 3, 2017, from Unified Land Operations: https://www.army.mil/e2/rv5_downloads/info/references/ADP_3-0_ULO_Oct_2011_APD.pdf
Bhasin, H. (2016, Dec 4). Levels of strategy. Retrieved March 10, 2017, from http://www.marketing91.com/levels-of-strategy/
Boundless. (2016). Strategic, Tactical and Operational Control. Retrieved March 10, 2017, from Boundless.com: https://www.boundless.com/management/textbooks/boundless-management-textbook/control-8/types-of-control-62/strategic-tactical-and-operational-control-313-3960/
Canan, M., Kucukkaya, G., & Balci, M. (2016). Defining Military Levels for Cyber Warfare by Using Components of Strategy: Ends, Ways, and Means. 21st ICCRTS “C2 in a Complex Connected Battlespace” (pp. 1-13). Virginia: Old Domimion University.
Dunn, M. (2017). Levels of war. Retrieved March 10, 2017, from Clausewitz: http://www.clausewitz.com/readings/Dunn.htm
Fienberg, S. E. (2008). Homeland Insecurity. New York: Springer.
Green, M. (2014, Oct 20). Why the NSA is breaking our encryption -- and why we should care. Retrieved March 3, 2017, from Youtube: https://www.youtube.com/watch?v=M6qoJNLIoJI&feature=youtu.be
O’Brien, D. G., & Yasnoff, W. A. (1999). Privacy, confidentiality, and security in information systems of state health agencies. American Journal of Preventive Medicine , 16 (4), 351-358.
Snell, E. (2017). How Data Encryption Benefits Data Security. Retrieved March 3, 2017, from Health IT Security: http://healthitsecurity.com/features/how-data-encryption-benefits-data-security
Whitman, M. E., & Mattord, H. J. (2005). Principles of Information Security (Second ed.). Boston: Thomso/ Course Technology.
Hire one of our experts to create a completely original paper even in 3 hours!