[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
QUESTION
week 3 discussion
Discussion Prompt: In a short paragraph or two, post on this week's discussion board a response to this prompt:
Please identify 1 or 2 strategic analogies from this week's readings that you think would be helpful for US cybersecurity strategy. What about these analogies makes them particularly applicable to cyber?
[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]
Subject |
Computer Technology |
Pages |
1 |
Style |
APA |
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]
Answer
Strategic Analologies
This paper discusses strategic analogies and how they apply to cybersecurity. There are several analogies of cyber capabilities that might define the future of conflict. One of them is the contrast of cyber capabilities to commanding, strategic capabilities with the likelihood of causing substantial death and devastation. Malware reports can infiltrate air-gripped networks and trigger physical impacts. Likewise, senior government leaders' comparative silence concerning cyber capabilities can propel speculations that countries are assembling devastating malware arsenal. Enhancing connectivity from consumer items to vital infrastructure control systems establishes the likelihood of pervasive vulnerability across societies. Analogies to diverse approaches of state-to-state intimidations are quite popular. Since nobody has ever died by a cyber capability, non-lethal analogies should be considered. The American defense department for years has established the scope of non-lethal weapons for its forces. Thus these weapons debilitate their targets by attacking vital parts of the targeted machine. Cyber attacks function similarly, attacking a computer system's critical parts and either devastating or hindering them.
Information security experts have claimed that a cyber operation is harmful in one of the three approaches. The first is that it targets data confidentiality in a computer system, thieves sensitive data, and makes it public. Secondly, it can target the computer system integrity by entering mischievous commands that negatively impact its functionality or corrupting crucial data. Thirdly, it can target the computer system availability incapacitating access to it at a vital time. An illustration of the incapacitation role is the cyber action that complemented the supposed 2007 Israeli airstrike. The cyber action corrupted the Syrian air defense integrity. Whereas the Syrian air defense system operators trusted their radar was useful and gave them an accurate display of the territory, the radar system did not depict the Israeli jets penetrating the Syrian airspace. Hence, on the incapacitation matters, the analogy is greatest between counter-materiel non-lethal weapons and cyber capabilities’ that assault the targeted system's integrity and availability.
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]
Related Samples
[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]