Sunday, May 5, 2019

CYBER ATTACKS ON ENERGY AND FINANCIAL SECTOR Thesis Proposal

CYBER ATTACKS ON ENERGY AND FINANCIAL SECTOR - Thesis scheme ExampleUS Financial empyrean is largest in the world and billions of dollars are transacted through this transcription non only within US but also across the border. The relative penetration of the financial system into the very fabric of American society therefore gives financial domain a more particular place within the modern American society. With the advances in technology, most of the transactions in the financial sector take place online with the help of the internet and other info technology tools. Such high colony on the information technology therefore makes the system highly vulnerable to the external threats including the cyber attacks.Similarly, the dexterity sector is critical for the survival of the country because most of the manufacturing and our daily activity is supported by this sector. A virtuoso(a) collapse of this system therefore will put the country as stand still and plausibly no economi c activity can be conceived without the support of the energy sector. Another important attribute of the cyber spying on the energy sector is basically to extract important information regarding the potential energy deposits which US companies explore all over the world and a systematic attack on this information therefore can cost Billions to US economy if it goes into wrong hands. It is believed that Chinese hackers are trying to flare into the systems of the energy companies with specific target of extracting the important data on the oil and gas exploration. (Yemma, 2010)These arguments therefore depict that any type of cyber attacks on these two sectors can be significant from the point of view of the native land security. Easy access to technology and significant improvement in the knowledge base of the cyber criminals and terrorists, it is really lax to conceive a cyber attack of any magnitude on both these sectors. It is therefore, really critical a pro-active approach t o be adapted by the security agencies of US including homeland

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.