Ted Talk on Cryptography

133 views 6 pages ~ 1466 words
Get a Custom Essay Writer Just For You!

Experts in this subject field are ready to write an original essay following your instructions to the dot!

Hire a Writer

According to Matthew Green's address

I realize that we pay less attention to what is important in our lives. We don't mind if unauthorized people know about our secrets. In fact, we are neither criminals nor terrorists. The fact that encryption is being broken implies that no one is safe. We conduct many transactions online, such as banking, sending and receiving messages, and making phone calls, yet we assume that everything is well. We might be astonished one day to discover that someone has our bank and credit card information. According to NSA, they are improving security when in the real sense; they are actually making us more vulnerable to cyber attacks.

There are several issues that Matthew Green discusses in his talk

First, he is concerned that encryption is no longer secure as it used to be. If the national security agency is decrypting them without consent from citizens, then it means that no one utilizing encryption is secure. The secrecy in the codes is no longer the case. Secondly, the activity of FBI removing devices from cell phone poles is in itself unlawful. That is against the rights of the citizens. It infringes on people's right to confidentiality of what is being communicated to them. It is a case that should not be underestimated. Everyone must be concerned that their private space is no longer theirs alone. As much as the NSA have the authority to monitor conversations, they have to treat all the data involved with a lot of confidentiality (Fienberg, 2008). To make matters worse, they are campaigning against encryption. Through this, the NSA is weakening American encryption products. As such information centers on the internet are no longer protected (Green, 2014).

Another issue is that few people are aware of cryptography

Perhaps they just hear about it but have not taken the time to understand what that is all about. Well, the adversary is way above and is taking advantage of that ignorance. In fact, Mr. Green states that if you told people you are studying cryptography, they would assert that to making maps. We send and receive messages without caring about our confidentiality. The thing is, someone could be keeping an eye on you.

We can improve the situation of these issues

One, citizens should demand the government to ensure privacy and confidentiality of persons (Fienberg, 2008). There is no way the NSA that is supposed to provide security is the same rendering citizens insecure. It is rather ironical in a way. Two, the encryption algorithms should be strengthened so that decryption by someone else may not be feasible (O'Brien & Yasnoff, 1999). Three, creating awareness of the importance of encryption of data among the public (Snell, 2017).

Assignment 2

The Levels of Warfare

An example of cyber warfare campaign is one that involves curbing hacking. Hacking seems to be the 21st-century internet curse. Many hackers are prowling the internet to access confidential data of individuals, government and private companies. Therefore a campaign against the vice would involve:

Strategic level activities

The level includes laying down the direction on defining our strategy which is mitigating hacking. First, we are doing this to reduce hacking incidences that have led to loss and corruption of valuable information of companies and individuals. The activities include:

Setting objectives

The main goals of the warfare are laid down at the national level. This is done in the backdrop of state power and political aims (Canan, Kucukkaya, & Balci, 2016).

Laying down policies

Security policies geared towards eradicating hacking are created. These also involve the development of systems to ensure that they can operate securely. This is also done in the light of dynamism of technology (Boundless, 2016).

Resource allocation

Resources are allocated in terms of manpower, finances and national power instruments (Canan, Kucukkaya, & Balci, 2016).

Setting a plan

A campaign execution plan is laid down. In the cyber world, new threats and risks emerge that require a dynamic approach (Bhasin, 2016).

Operational level activities

This level links warfare strategy and tactics through the establishment of operational objectives. The implementation of strategy by:

Assigning missions

The personnel involved in the conduct of campaigns are assigned their duties. In point of fact, this is where major operations occur.

Allocation of resources

Under this level, tasks and resources are allocated to tactical operations (Dunn, 2017).

Aligning the operational art

Skill, experience, knowledge and creativity of intelligence forces is aligned by integration of ends, ways and means.

Checking systems for risks and vulnerabilities

Information system owners are sensitized to monitor access controls, strengthen passwords, installing antivirus software, patching among others (Dunn, 2017).

Continuous monitoring

Nationwide monitoring of all internet users are done at a centralized place by the military besides the frequent monitoring at information system centers in different companies. Log files and honeypots come in handy in this task.

Tactical level activities

Here, the campaign engagements are brought into action through rigorous planning and execution. In other words, the how question is answered. Strategic objectives determine the activities at this level. Here, activities focus on ordered campaign goals. Also, understanding their implementation is vital to meeting the set policy requirements. The activities are:

Planning

Contrary to traditional wars, cyber warfare actualization is complicated. As such it will involve incidence response, business continuity and disaster recovery of hacked systems and corrupted confidential data (Canan, Kucukkaya, & Balci, 2016).

Designing

This is where the actual implementation of security domains occurs. Things like designing intrusion detection systems, firewall types, filters among others are done (Whitman & Mattord, 2005).

Standards

These are policies and standards that explain system development, operational and management aspects.

Implementation of security tasks

Here, a decision is made whether the implementers will be outsourced or will be from the employees. After that, resources and funding will be assigned, and the software tested.

With all these measures being observed, systems can be impenetrable thus hacking incidences reducing significantly.

Assignment 3

Unified Land Operations

The publication provides the role and conduct of unified land operations which is the Army's warfighting doctrine. It also describes how the army seizes, retains and utilizes operations in wars so as to create an atmosphere of resolving the underlying conflict. On its strategic context, it describes the operational environment that the men of the gun may work. Its operational variables as such include political, military, information, social, economic, infrastructure, environment and time. Importantly, the doctrine acts as a guiding tool to the Army (Army, 2011).

Notably, this operational variable is also determined by the mission at hand. In this case, the mission variables include the weather, terrain, time, civil considerations, the enemy and civil aspects. Soldiers are meant to understand that operational areas are different with their inherent challenges.

The doctrine also enshrines its foundations which stem from the initiative, decisive action, competencies and the mission command. Furthermore, the operations of the army are characterized by flexibility, integration, lethality, adaptability, depth and synchronization. The armies have to be both flexible in thought as well as plan for the success of their operations.

The operational art goes hand in hand with the strategic objectives followed by tactic actions. What matters here most is the opportunity to fulfill their core mandate under their commanders. Additionally, the operations process involves planning, preparation, execution and assessment. In warfighting, every member of the military has his or her role that they play. The most important thing is that forces are joined to accomplish missions. The functions include the mission command, Intelligence, Movement and Maneuver, Fires sustainment and protection. Intelligence, in particular, plays the crucial role of understanding the enemy, the terrain of the land and civil aspects of an operational base (Army, 2011).

Reference

Army. (2011, October). Retrieved March 3, 2017, from Unified Land Operations: https://www.army.mil/e2/rv5_downloads/info/references/ADP_3-0_ULO_Oct_2011_APD.pdf

Bhasin, H. (2016, Dec 4). Levels of strategy. Retrieved March 10, 2017, from http://www.marketing91.com/levels-of-strategy/

Boundless. (2016). Strategic, Tactical and Operational Control. Retrieved March 10, 2017, from Boundless.com: https://www.boundless.com/management/textbooks/boundless-management-textbook/control-8/types-of-control-62/strategic-tactical-and-operational-control-313-3960/

Canan, M., Kucukkaya, G., & Balci, M. (2016). Defining Military Levels for Cyber Warfare by Using Components of Strategy: Ends, Ways, and Means. 21st ICCRTS "C2 in a Complex Connected Battlespace" (pp. 1-13). Virginia: Old Domimion University.

Dunn, M. (2017). Levels of war. Retrieved March 10, 2017, from Clausewitz: http://www.clausewitz.com/readings/Dunn.htm

Fienberg, S. E. (2008). Homeland Insecurity. New York: Springer.

Green, M. (2014, Oct 20). Why the NSA is breaking our encryption -- and why we should care. Retrieved March 3, 2017, from Youtube: https://www.youtube.com/watch?v=M6qoJNLIoJI&feature=youtu.be

O'Brien, D. G., & Yasnoff, W. A. (1999). Privacy, confidentiality, and security in information systems of state health agencies. American Journal of Preventive Medicine , 16 (4), 351-358.

Snell, E. (2017). How Data Encryption Benefits Data Security. Retrieved March 3, 2017, from Health IT Security: http://healthitsecurity.com/features/how-data-encryption-benefits-data-security

Whitman, M. E., & Mattord, H. J. (2005). Principles of Information Security (Second ed.). Boston: Thomso/ Course Technology.

June 12, 2023
Number of pages

6

Number of words

1466

Downloads:

46

Writer #

Rate:

4.7

Expertise Cyber Security
Verified writer

Richard is the best writer for Data Science tasks, even if you have something really complex. I needed to do tasks on security matters and already had a draft. Sharing my ideas with Richard ended up in a perfect paper!

Hire Writer

This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Eliminate the stress of Research and Writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro