{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

QUESTION

week 3 discussion  

Discussion Prompt: In a short paragraph or two, post on this week’s discussion board a response to this prompt:

Please identify 1 or 2 strategic analogies from this week’s readings that you think would be helpful for US cybersecurity strategy. What about these analogies makes them particularly applicable to cyber?

 

 

 

Subject Computer Technology Pages 1 Style APA

Answer

 

Strategic Analologies

This paper discusses strategic analogies and how they apply to cybersecurity. There are several analogies of cyber capabilities that might define the future of conflict. One of them is the contrast of cyber capabilities to commanding, strategic capabilities with the likelihood of causing substantial death and devastation. Malware reports can infiltrate air-gripped networks and trigger physical impacts. Likewise, senior government leaders’ comparative silence concerning cyber capabilities can propel speculations that countries are assembling devastating malware arsenal. Enhancing connectivity from consumer items to vital infrastructure control systems establishes the likelihood of pervasive vulnerability across societies. Analogies to diverse approaches of state-to-state intimidations are quite popular. Since nobody has ever died by a cyber capability, non-lethal analogies should be considered. The American defense department for years has established the scope of non-lethal weapons for its forces. Thus these weapons debilitate their targets by attacking vital parts of the targeted machine. Cyber attacks function similarly, attacking a computer system’s critical parts and either devastating or hindering them.

Information security experts have claimed that a cyber operation is harmful in one of the three approaches. The first is that it targets data confidentiality in a computer system, thieves sensitive data, and makes it public. Secondly, it can target the computer system integrity by entering mischievous commands that negatively impact its functionality or corrupting crucial data. Thirdly, it can target the computer system availability incapacitating access to it at a vital time. An illustration of the incapacitation role is the cyber action that complemented the supposed 2007 Israeli airstrike. The cyber action corrupted the Syrian air defense integrity. Whereas the Syrian air defense system operators trusted their radar was useful and gave them an accurate display of the territory, the radar system did not depict the Israeli jets penetrating the Syrian airspace. Hence, on the incapacitation matters, the analogy is greatest between counter-materiel non-lethal weapons and cyber capabilities’ that assault the targeted system’s integrity and availability. 

References

 

 

 

Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?