About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 [1] (December 8, 2022)

handle is hein.crs/govejrg0001 and id is 1 raw text is: Congressional Research Service
Informing th legisIlive deAme sinceo 1914
Cybersecurity: A Primer

Introduction
The information technology that Americans use to chat with
loved ones and make purchases are the same that can be
turned against them to deny access to services, steal their
information, or compromise the digital systems they trust.
These tools exist in cyberspace, and the security of that
environment is a large endeavor involving government, the
private sector, international partners, and others.
This In Focus provides an overview of cybersecurity for
policymaking purposes, describes issues that cybersecurity
affects, and discusses potential actions Congress could take.
The Nature of Cybersecurity
The term cyber is frequently attached to a variety of
security issues, underscoring that issues surrounding the
management of cyberspace and its security are vast and
complicated.
To highlight how complicated it is, consider that the federal
government does not have a single definition of cyberspace
or cybersecurity. The Cyberspace Solarium Commission-
defined cyber as
Relating  to, involving, or characteristic  of
computers, computer networks, information and
communications technology (ICT), virtual systems,
or   computer-enabled  control  of  physical
components.
While this definition may be suitable for a broad discussion
about information technology, it does not account for
relevant policymaking considerations concerning
cybersecurity. Essentially, cybersecurity is the security of
cyberspace.
As an example, consider a single smartphone. An American
company may have designed the device, but the device may
be built by a different company abroad using material from
yet another country. The phone runs on software built by
one company but modern operating systems borrow code
from other companies and developers. Once a user has the
device it will likely be connected to a variety of networks
such as a home wireless network, a corporate network, and
a cellular network. Each of these networks has its own
infrastructure, but also share common internet
infrastructure. The user will also install applications that
contain code and use infrastructure by yet other myriad
companies. Imagining users at the center, one can see large
and intricate systems on one side and the other to create
these devices and ensure their operation. The entire
infrastructure and all those services that are part of
cyberspace exist to deliver an experience to a user, a
human.

Updated December 8, 2022

Thus, from a policymaking standpoint cybersecurity can be
considered the security of cyberspace-which includes the
devices, infrastructure, data, and users that make it up. To
support cybersecurity policymaking, adjacent fields also
need consideration. Education, workforce management,
investment, entrepreneurship, and research and
development are necessary to get a product to market.
Developers, law enforcement, intelligence, incident
response, and national defense are necessary to respond
when something goes awry in cyberspace.
Threats
The nation faces many threats (manmade and not) with an
array of capabilities to carry out attacks. Threat actors may
directly target the elements of cyberspace (e.g., networks,
data, services, and users). However, they may also use these
elements to attack industry through cyberspace.
For instance, a hacker operating independently or under a
nation-state's instruction may target a hospital system. The
hacker may send ransomware to a hospital to extort
payment before the hospital can regain access to its files
and devices. However, during that attack the hacker may
also install a tool on the hospital's network, providing
persistent access they will use to steal data, including
patient information or hospital operations material. The
hacker can then use that information to identify additional
targets. In this scenario the hacker has attacked the hospital
network, networked medical devices, and patient data.
The Director of National Intelligence (DNI) delivers the
Intelligence Community's Worldwide Threat Assessment to
Congress. In 2022, the DNI highlighted China, Russia, Iran,
North Korea, and Transnational Organized Crime as threat
actors of concern in cyberspace. These actors have
demonstrated a growing capability and capacity for attacks
against U.S. interests.
China is the most active actor conducting espionage
campaigns but with a capability to disrupt infrastructure.
Russia seeks to use disruptions in cyberspace to bolster its
military and foreign policy goals. Iran aggressiveness in
using cyber capabilities threatens networks and data. North
Korea uses cyberspace to spy, steal, and disrupt.
Transnational criminal organizations will continue to
conduct phishing, fraud, and ransomware attacks for their
own economic gain and under the direction of a nation-
state. The more these adversaries engage in cyberattacks,
the more their expertise and willingness to use their
capabilities grow.
In addition to threat actors, users face threats from inherent
vulnerabilities in software. The Log4j vulnerability is one
such example of widely used code that put many internet
servers at risk of exposing user data.

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Already a HeinOnline Subscriber?

profiles profiles most