Bill Research Outline

3
Sample Bill Research Outline Bill Topic: Establishing a Cyber-Defense Branch What point is your research trying to make? Cyber-terrorism is a threat serious enough to warrant the creation of a new federal branch dedicated to combating it. Source Number 1: August 7, 2011,  NYT , “U.S. Agents, an Aerial Snoop and Teams of Hackers” List information that you received from this source: 1. A cyber-defense branch would create jobs, thus bolstering the US economy 2. The United States Cyber Command, the Pentagon’s Internet defense arm, “has a work force issue,” said Daron Hartvigsen, special agent with the Air Force Office of Special Investigations. 3. We have needs that some in this community can solve. We need folks with skills.” 4. “Government agencies especially need computer professionals with cybersecurity skills. Source Number 2 : July 22, 2011, BBC News, “Cyber security major issue in Georgia's national security  blueprint” List information that you received from this source: 1. Cyber attacks could harm the US’s digital infrastructure irreparably and slow down government functions. 2. In 2011, cyber attacks have replaced terrorism, and have targeted international organizations 3. The potential of a cyber attack is no less important than that of weapons of mass destruction like nuclear, chemical, and biological weapons. 4. Earlier this year, the IMF was hit by a very sophisticated cyber attack designed to create a digital insider presence (This sheet is your bibliography – it must be completed and turned in with your bill on March 21 st ) Source Number 3 : August 4, 2011, BBC Monitoring Asia Pacific, “South Korea seeks to boost cyber security with master plan”

Transcript of Bill Research Outline

Page 1: Bill Research Outline

8/2/2019 Bill Research Outline

http://slidepdf.com/reader/full/bill-research-outline 1/3

Sample Bill Research Outline

Bill Topic: Establishing a Cyber-Defense Branch

What point is your research trying to make?

Cyber-terrorism is a threat serious enough to warrant the creation of a new federal branchdedicated to combating it.

Source Number 1 :

August 7, 2011,  NYT , “U.S. Agents, an Aerial Snoop and Teams of Hackers”

List information that you received from this source:

1. A cyber-defense branch would create jobs, thus bolstering the US economy

2. The United States Cyber Command, the Pentagon’s Internet defense arm, “has a work force

issue,” said Daron Hartvigsen, special agent with the Air Force Office of Special

Investigations.

3. We have needs that some in this community can solve. We need folks with skills.”

4. “Government agencies especially need computer professionals with cybersecurity skills.

Source Number 2 :

July 22, 2011, BBC News, “Cyber security major issue in Georgia's national security

 blueprint”

List information that you received from this source:

1. Cyber attacks could harm the US’s digital infrastructure irreparably and slow downgovernment functions.

2. In 2011, cyber attacks have replaced terrorism, and have targeted international organizations

3. The potential of a cyber attack is no less important than that of weapons of mass destruction

like nuclear, chemical, and biological weapons.

4. Earlier this year, the IMF was hit by a very sophisticated cyber attack designed to create adigital insider presence

(This sheet is your bibliography – it must be completed and turned in with your bill on

March 21st)

Source Number 3 :

August 4, 2011, BBC Monitoring Asia Pacific, “South Korea seeks to boost cyber security

with master plan”

Page 2: Bill Research Outline

8/2/2019 Bill Research Outline

http://slidepdf.com/reader/full/bill-research-outline 2/3

List information that you received from this source:

1. Other leading nations are also implementing some form of a cyber defense within thegovernment.

2. The government [of South Korea] is pushing to build an integrated system for responding tocyber attacks to make the responses more swift and effective

3. After suffering a spate of very large hacks, including one affecting 35 million accounts on asocial network, as well as a high profile attack on a government-backed bank, the Korea

Communications Commission (KCC) has outlined a national cyber security strategy.

4. The new plan would give control over cyber security at the government level to the NationalCyber Security Centre, run out of the National Intelligence Service (their spy agency).

Source Number 4 :

January 26, 2010, New York Times, “CYBERWAR; In Digital Combat, U.S. Finds No EasyDeterrent”

List information that you received from this source:

1. The government has been largely incompetent when it comes to tackling cyberattacks.

Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the nation's power grids, its communications systems or its financial

networks

2. The enemy had all the advantages: stealth, anonymity and unpredictability. No one could pinpoint the country from which the attack came, so there was no effective way to deter further 

damage by threatening retaliation.

3. The military commanders noted that they even lacked the legal authority to respond .

4. ''States, terrorists and those who would act as their proxies must know that the United Stateswill protect our networks,'' Hillary Clinton

Source Number 5 :

August 27, 2009, New York Times, “Defying Experts, Rogue Computer Code Still Lurks”

List information that you received from this source:

1. Inexperience threatened US cyber systems when the Conficker virus was released

2. A rogue software program that glided onto the Internet last November has confounded the

efforts of top security experts to eradicate the program and trace its origins and purpose,exposing serious weaknesses in the world’s digital infrastructure.

3. Conficker uses flaws in Windows software to co-opt machines and link them into a virtual

computer that can be commanded remotely by its authors. Now has more than five million of 

Page 3: Bill Research Outline

8/2/2019 Bill Research Outline

http://slidepdf.com/reader/full/bill-research-outline 3/3

these zombies now under its control — government, business and home computers in more

than 200 countries

4. Researchers speculate that the computer could be employed to generate vast amounts of 

spam; it could steal information like passwords and logins by capturing keystrokes on infected

computers