Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

St. Mary's University

Series

Cyberspace

Articles 1 - 1 of 1

Full-Text Articles in Law

Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott Jan 2012

Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott

Faculty Articles

The United States does not possess a sufficient cyber security framework. Over eighty-five percent of the critical infrastructure in the United States is controlled by private industry. The greatest concern is an intentional cyber attack against electronic control systems that regulate thousands of interconnected computers, routers, and switches. The centralized computer networks controlling the U.S. infrastructure presents tempting targets.

Generally, there are four types of cyber attacks. First, the most common, is service disruption—which aims to flood the target computer with data packets or connection requests, thereby making it unavailable to the user. The second type is designed to capture …