QUESTION
week 3 discussion
Discussion Prompt: In a short paragraph or two, post on this week’s discussion board a response to this prompt:
Please identify 1 or 2 strategic analogies from this week’s readings that you think would be helpful for US cybersecurity strategy. What about these analogies makes them particularly applicable to cyber?
Subject | Computer Technology | Pages | 1 | Style | APA |
---|
Answer
Strategic Analologies
This paper discusses strategic analogies and how they apply to cybersecurity. There are several analogies of cyber capabilities that might define the future of conflict. One of them is the contrast of cyber capabilities to commanding, strategic capabilities with the likelihood of causing substantial death and devastation. Malware reports can infiltrate air-gripped networks and trigger physical impacts. Likewise, senior government leaders’ comparative silence concerning cyber capabilities can propel speculations that countries are assembling devastating malware arsenal. Enhancing connectivity from consumer items to vital infrastructure control systems establishes the likelihood of pervasive vulnerability across societies. Analogies to diverse approaches of state-to-state intimidations are quite popular. Since nobody has ever died by a cyber capability, non-lethal analogies should be considered. The American defense department for years has established the scope of non-lethal weapons for its forces. Thus these weapons debilitate their targets by attacking vital parts of the targeted machine. Cyber attacks function similarly, attacking a computer system’s critical parts and either devastating or hindering them.
Information security experts have claimed that a cyber operation is harmful in one of the three approaches. The first is that it targets data confidentiality in a computer system, thieves sensitive data, and makes it public. Secondly, it can target the computer system integrity by entering mischievous commands that negatively impact its functionality or corrupting crucial data. Thirdly, it can target the computer system availability incapacitating access to it at a vital time. An illustration of the incapacitation role is the cyber action that complemented the supposed 2007 Israeli airstrike. The cyber action corrupted the Syrian air defense integrity. Whereas the Syrian air defense system operators trusted their radar was useful and gave them an accurate display of the territory, the radar system did not depict the Israeli jets penetrating the Syrian airspace. Hence, on the incapacitation matters, the analogy is greatest between counter-materiel non-lethal weapons and cyber capabilities’ that assault the targeted system’s integrity and availability.
References
|
Related Samples
The Role of Essay Writing Services in Online Education: A Comprehensive Analysis
Introduction The...
Write Like a Pro: Effective Strategies for Top-Notch Explication Essays
Introduction "A poem...
How to Conquer Your Exams: Effective Study Strategies for All Learners
Introduction Imagine...
Overcoming Writer’s Block: Strategies to Get Your Essays Flowing
Introduction The...
Optimizing Your Online Learning Experience: Tips and Tricks for Success
The world of education...