How is US cyber warfare strategy and tactics different and the same as Russia's?

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]

QUESTION

    1. Week 7    

      How is US cyber warfare strategy and tactics different and the same as Russia's?

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Technology Pages 2 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" hover_enabled="0" sticky_enabled="0"]

Answer

DIFFERENCES AND SIMILARITIES BETWEEN THE U.S. AND RUSSIA CYBER WARFARE STRATEGIES AND TACTICS

Technology growth has been instrumental in the 21st century, bringing significant development and challenges in information and communication security. The explosive growth of information technologies has led to an unparalleled and irreversible transformation in people's way of life and critical information safety. The communication devices have proven very vulnerable in the contemporary setting with terrorists targeting key government information platforms across the globe, leading to the incorporation of various strategies and tactics by developed and developing countries to ensure information security, economical safety, and prevention of malicious attacks. Primarily, cybersecurity aims at developing practices and policies that defend computers, electronic systems, mobile devices, serves, data, and networks from mischievous attacks. It arises because, as people embrace technology, digitalization of critical information becomes the norm, creating the need for electronic information security. However, considering the approaches adopted by the United States and Russia, there are significant differences and similarities, which this paper seeks to examine. 

Similarities

The U.S. and Russia take information security seriously through the implementation of various tactics and strategies that are almost similar in their approaches and magnitude. For instance, the U.S. has developed a remarkable cybersecurity law, the Computer Fraud and Abuse Act (CFAA), which focuses on the protection of federal computers, computers connected to the internet and bank computers[1]. This then helps in shielding threats, espionage, and damages commonly used as fraud instruments. In Russia, the Russian Federation's criminal code offers detailed illustrations of the penalties relating to computer crimes and defines the context of cyber warfare. These codes and acts both work to help create a deeper understanding of the dangers of technology growth and the risk of fraud. However, they have to rely on institutions, such as the Federal Security Service of the Russian Federation and the National Cyber Security Division, that operates within the Department of Homeland security in the U.S.[2] 

Differences

Despite the similarities in various aspects of cybersecurity, Russia primarily has a different view of cyber security compared to other countries, including the United States. Essentially, Russian military theorists use a broader framework of information warfare, rather than the terms, cyber or cyberwarfare, because the former is more holistic and comprehensive as it incorporates computer network operations, psychological operations, information operations, and electronic warfare. On the other hand, the U.S. mainly focuses on counterterrorism operations in cyberspace, with agencies such as the NSA, CIA, and FBI, among other government agencies playing a critical role[3]. The system and the government have to put measures aimed at increasing the security of essential information structure, developing strategies to detect and prevent cyber threats, thereby eliminating the consequences.

 

Conclusion

The global prosperity and security currently depend on how individual countries respond to the opportunities and challenges arising within the cyberspace. In essence, the livelihood of both Russian and American citizens, national defense, and critical infrastructure rely on computer-driven and interconnected information technologies. The tactics and strategies developed by the individual countries could be similar in some aspects while also manifesting explicit differences depending on the threats and vulnerabilities. Such then explains the different approaches despite the ultimate aim of combating information security threats originating from the robust technology growth. The national strategies should align with state strategies such that the military and other agencies holistically protect the critical data and information.

 

[1] Sabillon, Regner, Victor Cavaller, and Jeimy Cano. "National cyber security strategies: global trends in cyberspace." International Journal of Computer Science and Software Engineering 5, no. 5 (2016): 67.

[2] Sabillon, Regner, Victor Cavaller, and Jeimy Cano. "National cyber security strategies: global trends in cyberspace." International Journal of Computer Science and Software Engineering 5, no. 5 (2016): 67.

[3] Sabillon, Ibid (2016): 67.

 

This question has been answered

  1. Jensen, Benjamin, Brandon Valeriano, and Ryan Maness. "Fancy bears and digital trolls: Cyber strategy with a Russian twist." Journal of Strategic Studies 42, no. 2 (2019): 212-234.

     

    Sabillon, Regner, Victor Cavaller, and Jeimy Cano. "National cyber security strategies: global trends in cyberspace." International Journal of Computer Science and Software Engineering 5, no. 5 (2016): 67.

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]