Compelling Cyber Circumstance
Admit it, the world is a constantly changing place. Computers have metamorphosed human capabilities to unfathomable elevations. However, this significant innovation also harbors new and ever-changing cyber threats. Identity theft, data breach, and phishing are profound problems that grow every day. Frankenstein, a gothic fiction novel by Mary Shelley, alludes to society’s irresponsibility while dealing with science and technological advancement. Shelly represents the exhilaration and eventual horrors of modern technology through creation of a monster by Victor Frankenstein. Impetuous actions bring tragedy and death into the unfortunate life of Victor; his family and friends all die by the hand of his creation. Twenty-first century science must realize the lesson embedded within Frankenstein: while ingenuity
…show more content…
As a nation, today’s society must invest in cyber security to execute military power, protect citizens information, and safeguard businesses.
Primarily, cyber security of the armed forces must be a priority of the United States. As the world becomes increasingly digital, the military must also adapt its ways. A new form of combat, hybrid warfare, has been effective in attaining political objectives without the conventional use of military power (Limnell). Hybrid warfare includes
The passage of time may bring about many new changes in American society but, conflict will always remain a constant in people’s lives. A number of moral problems occurring in the past continue to be prominent issues of modern society. In Mary Shelley’s Frankenstein, there is a correlation between the preeminent issues described in the novel and the morally unethical conflict occurring within modern society.
It is next to impossible to have a scenario, fictional or nonfictional, without some perks or consequences. Frankenstein by Mary Shelly is no exception. This classic work of literature, despite having many difficult choices, has one that can alter the story more so than any other presented before Victor and the other characters. This would be the request by Victor’s own creation to create him a female partner and, in turn, he would spare his family as well as many other lives. At first, this seems like an obvious choice, but when you take time to analyze the possibilities of something going wrong, it quickly becomes much more than a simple yes or no.
The Internet, as we all know, has rapidly spread around since its commercialization in the 1990s. It is evident that cybersecurity attacks are not going anywhere, and that government will continue to remain a target. In addition, the Internet of Things (IoT) growth will lead to more devices being connected to the networks. Therefore, with technology moving forward and hackers being more motivated as ever, the government finds itself struggling to keep up with effective cybersecurity measures and with filling up the designated positions in the Cybersecurity department.
Over two centuries ago, Mary Shelley created a gruesome tale of the horrific ramifications that result when man over steps his bounds and manipulates nature. In her classic tale, Frankenstein, Shelley weaves together the terrifying implications of a young scientist playing God and creating life, only to be haunted for the duration of his life by the monster of his own sordid creation. Reading Shelley in the context of present technologically advanced times, her tale of monstrous creation provides a very gruesome caution. For today, it is not merely a human being the sciences are lusting blindly to bring to life, as was the deranged quest of Victor Frankenstein, but rather to
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, software programs and data from unintended or unauthorized access, change or destruction. Post 9/11 and other terrorist attacks, the United States grows its endeavors to repulse cyberattacks, U.S. corporate organizations and the government agencies wind up in strife over how to adjust to new methods of security and privacy. The current state of security measure protocols and privacy policies placed by the US government in cyberspace raises concerns for the 99%. This is due to the recent cyber-attacks on American corporate organization systems and government alike, where their digital information and network infrastructures within the systems were compromised, and personal data was hacked and stolen.
The combination of regular military forces, unconventional forces such as terrorist or insurgent groups, and criminal elements working together towards a common goal is what makes up a hybrid threat. In today’s current political and economic arenas very few of the United States’ enemies could mount an effective conventional military campaign against us. This has caused many of our enemies to turn towards using hybrid threats and tactics in order to further their attacks. The United States must in turn use hybrid tactics in order to defeat its enemies.
Technological advancements have effected humans in many different ways from texting to the creation of monsters. Even though some technological advancements may at first seem to positively impact society, once they progress to interfering with the greater good of human beings the progress becomes negative.
Today however, a new type of warfare has emerged and occurs when outside entities conduct an attack on a power grid, network, or both with the intent of causing damage. This type of warfare is called cyber warfare. In the United States computers control everything. It is no secret that hostile countries and terrorist organizations are cognizant and they know our economy, security, and infrastructure can be crippled by a successful cyber-attack. Examples of potential targets for cyber terrorists include military bases, water systems, banking facilities, air traffic control centers and power plants. Even the Commander in Chief, President Obama has stated the threat of a cyber war is real and we must prepare for it and increase our security measures. First, this paper will discuss cyberterrorism and cyber-attacks as they pose a direct threat to national security and the economy. Then, we will review cyber-attacks against the U.S. from China, Iran, and Russia along with the impact and possible ramifications from those attacks. Finally, this paper discusses U.S. strategies to minimize the impact of cyber-attacks.
Written Assignment “ It has become appallingly obvious that our technology has exceeded our humanity.”. This quote was spoken from Albert Einstein sometime in his lifetime which was from 1879-1955. If Albert thought this even way back then, wouldn't you wonder what he would have to say now?
The Biotech Century by Jeremy Rifkin and Frankenstein by Mary Shelley are books relevant to technology educators. The Biotech Century discusses many of the biological processes, technologies, moral dilemmas, and political issues that now the society of human is facing at the first stage. Jeremy Rifkin begins by claiming that the communication era of humanity is leaving and entering a biological revolution era. The Frankenstein’s author create the character, Victor Frankenstein who is the creators of the animation Frankenstein. Shelly leads the story from how Victor is interested in science and spends his effort on creating a new animation.
Frankenstein was written two hundred years ago by Mary Shelly when she was eighteen years old. A science fiction novel but often read as a gothic horror story and ominous warning about the ramifications exceeding boundaries of science. The main character, Victor Frankenstein, at a young age has been fascinated by life and death and classical experiments of the alchemists, thus creating his first subject the Monster. Frankenstein epitomized the climatic change in the study of science during the eighteenth century. The time is characterized by important experimentations and rise of scholars such Faraday, Dalton, and Benjamin Franklin. There were signs in the novel that it was influenced by scientific discovery of our modern understanding of electricity. Shelly attempted to uncover the limits to which science can surpass morals. Frankenstein who attempted to attain powers through science by his display of creation of life and death, has forbidden limitations and unforgiving ramifications.
In modern time, society’s view of the world is associated with science and technology. Some critics illustrate that technology, psychology and science are closely related to literature. Deviance behavior of the person is considered as unacceptable by the community. Frankenstein’s monster learnt a human language, feeling and sense, he is very different thus can’t be accepted by the society. Professor Sherry Ginn, Professor in the Psychology department at Wingate University, Wingate, North Carolina evaluated
Cyber warfare is the new warfare domain. Understanding how to morally utilize the newfound capabilities will assist the United States to maintain military dominance as well as mitigate possible immoral tragedies. Cyber warfare and war envelops a vast array of topics available for discussion. Therefore, the topics of interest within cyber warfare will be confined to attacks on electrical grids and water treatment plants. War will be defined as in the constitution, a war that is declared by the U.S. congress or a conflict the President of the United States deems
In her novel Frankenstein, Mary Shelley is trying to convey the message that science and technology can be dangerous in the wrong hands. She affirms this idea through the character of Victor, a cautionary tale, but dispels the idea that all pursuit of knowledge is bad through more traditionally romantic characters such as Henry Clerval. Shelley is complicit in her understanding that curiosity and experimentation are unbreakably tied to the human condition, and tries to warn the world of the evil that can come from this. However, the effects of the interpretation of this book can vary: it is an exemplary cautionary tale, and a much needed reminder of ethics in an increasingly technology-dependent world, but one could easily take these warnings too far and use her novel as a means to quell innovation or incite censorship. In a world of technology that would be unbelievable to Shelley, her work still remains relevant, notably in the field of genetic engineering. Frankenstein raises important questions about ethics, responsibility and censorship, and is applicable to modern technological issues such as genetic engineering.
For thousands of years warfare remained relatively unchanged. While the tactics and weapons have changed as new methods of combat evolved, men and women or their weapons still had to meet at the same time and place in order to attack, defend, surrender or conquer. However, the advent of the of the internet has created a new realm of combat in which armies can remotely conduct surveillance, reconnaissance, espionage, and attacks from an ambiguous and space-less digital environment. Both state and non-state actors have already embraced this new realm and utilized both legal and illegal means to further facilitate their interests. What complicates cyber security further is as states attempt to protect themselves from cyber-warfare, private