We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Why Computer Scientists Should Care About Cybersecurity?

essay
The whole doc is available only for registered users

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Why computer scientists should care about cyber conflict and U.S. national security policy. Communications of the ACM; Vol. 55 Issue 6, p41-43, 3p. DOI: 10.1145/2184319.2184334 This article discusses why computer scientists should be aware of cyberconflict and U.S. National Security policies regarding cyberconflict. It presents information on cyberterrorism, espionage, and the cyberattacks reported by Computer Network Emergency Response Coordination Centers in order to attribute the importance of cybersecurity. Herbert Lin has published many articles on cyberconflict with the majority published in scholarly journals. The authors’ recommendation seems unbiased on the topic and presents the notion that voice of computer scientists can help policymakers make more informed decisions. This article was found in Business Source Complete.

Power, R. (2000). Tangled Web : Tales of Digital Crime From the Shadows of Cyberspace. Que. Denning, P. J., & Denning, D. E. (2010). The Profession of IT Discussing Cyber Attack. Communications Of The ACM, 53(9), 29-31. doi:10.1145/1810891.1810904 This article was found in Business Source Complete.

LUKASIK, S. J. (2011). Protecting Users of the Cyber Commons. Communications Of The ACM, 54(9), 54-61. doi:10.1145/1995376.1995393 This article was found in Computers & Applied Sciences Complete. Ayofe, A., & Irwin, B. (2010). CYBER SECURITY: CHALLENGES AND THE WAY FORWARD. Computer Science & Telecommunications, 29(6), 56-69. This article was found in Social Sciences Citation Index.

Lin, H. (2012). A virtual necessity: Some modest steps toward greater cybersecurity. Bulletin Of The Atomic Scientists, 68(5), 75-87. DOI: 10.1177/0096340212459039 This article discusses the two cyber operations: offensive and defensive involved in cyberattacks over critical infrastructure. It reveals several approaches to mitigate cyberthreats over critical infrastructure and information technology targets. The author, Herbert Lin, has published many articles on cyberconflict with the majority published in scholarly journals. The authors’ analysis on achieving a safer and more secure cyberspace is objective and without bias. Researches on cyberdefense, cyberdeterence, preemption and damage limitation, and cyberarms control are potential building blocks which computer scientists must consider to achieve this goal. This article was found in Social Sciences Citation Index.

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59