Bill Research Outline
-
Upload
triplea2012 -
Category
Documents
-
view
216 -
download
0
Transcript of Bill Research Outline
8/2/2019 Bill Research Outline
http://slidepdf.com/reader/full/bill-research-outline 1/3
Sample Bill Research Outline
Bill Topic: Establishing a Cyber-Defense Branch
What point is your research trying to make?
Cyber-terrorism is a threat serious enough to warrant the creation of a new federal branchdedicated to combating it.
Source Number 1 :
August 7, 2011, NYT , “U.S. Agents, an Aerial Snoop and Teams of Hackers”
List information that you received from this source:
1. A cyber-defense branch would create jobs, thus bolstering the US economy
2. The United States Cyber Command, the Pentagon’s Internet defense arm, “has a work force
issue,” said Daron Hartvigsen, special agent with the Air Force Office of Special
Investigations.
3. We have needs that some in this community can solve. We need folks with skills.”
4. “Government agencies especially need computer professionals with cybersecurity skills.
Source Number 2 :
July 22, 2011, BBC News, “Cyber security major issue in Georgia's national security
blueprint”
List information that you received from this source:
1. Cyber attacks could harm the US’s digital infrastructure irreparably and slow downgovernment functions.
2. In 2011, cyber attacks have replaced terrorism, and have targeted international organizations
3. The potential of a cyber attack is no less important than that of weapons of mass destruction
like nuclear, chemical, and biological weapons.
4. Earlier this year, the IMF was hit by a very sophisticated cyber attack designed to create adigital insider presence
(This sheet is your bibliography – it must be completed and turned in with your bill on
March 21st)
Source Number 3 :
August 4, 2011, BBC Monitoring Asia Pacific, “South Korea seeks to boost cyber security
with master plan”
8/2/2019 Bill Research Outline
http://slidepdf.com/reader/full/bill-research-outline 2/3
List information that you received from this source:
1. Other leading nations are also implementing some form of a cyber defense within thegovernment.
2. The government [of South Korea] is pushing to build an integrated system for responding tocyber attacks to make the responses more swift and effective
3. After suffering a spate of very large hacks, including one affecting 35 million accounts on asocial network, as well as a high profile attack on a government-backed bank, the Korea
Communications Commission (KCC) has outlined a national cyber security strategy.
4. The new plan would give control over cyber security at the government level to the NationalCyber Security Centre, run out of the National Intelligence Service (their spy agency).
Source Number 4 :
January 26, 2010, New York Times, “CYBERWAR; In Digital Combat, U.S. Finds No EasyDeterrent”
List information that you received from this source:
1. The government has been largely incompetent when it comes to tackling cyberattacks.
Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the nation's power grids, its communications systems or its financial
networks
2. The enemy had all the advantages: stealth, anonymity and unpredictability. No one could pinpoint the country from which the attack came, so there was no effective way to deter further
damage by threatening retaliation.
3. The military commanders noted that they even lacked the legal authority to respond .
4. ''States, terrorists and those who would act as their proxies must know that the United Stateswill protect our networks,'' Hillary Clinton
Source Number 5 :
August 27, 2009, New York Times, “Defying Experts, Rogue Computer Code Still Lurks”
List information that you received from this source:
1. Inexperience threatened US cyber systems when the Conficker virus was released
2. A rogue software program that glided onto the Internet last November has confounded the
efforts of top security experts to eradicate the program and trace its origins and purpose,exposing serious weaknesses in the world’s digital infrastructure.
3. Conficker uses flaws in Windows software to co-opt machines and link them into a virtual
computer that can be commanded remotely by its authors. Now has more than five million of
8/2/2019 Bill Research Outline
http://slidepdf.com/reader/full/bill-research-outline 3/3
these zombies now under its control — government, business and home computers in more
than 200 countries
4. Researchers speculate that the computer could be employed to generate vast amounts of
spam; it could steal information like passwords and logins by capturing keystrokes on infected
computers