The Challenges of US Cyber Strategy

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]

QUESTION

week 2 563 

Consider Hoffman's paper "Is Cyber Strategy Possible," as well as many of the strategy papers that were included in this week's reading. Do you think Cyber Strategy is possible? Why or why not? If so, what are some challenges, and if not, what is the alternative?

 

 

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Technology Pages 3 Style APA
s
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

The Challenges of US Cyber Strategy

The United States (US) cyber operations are portrayed second-to-none when it comes to sophistication. However, this is unmatched with cyber power as it struggles to protect its cyberspace interests. This paper elaborates on the possibility of having a cyber strategy and the challenges faced.

I believe that cyber strategy is possible in the United States because it has been implemented in other countries and even organizations and proved to work. The US, for instance, has evolved in cybersecurity since the first National strategy in 2003 (Hoffman, 2019). Secondly, cybersecurity has to be viewed as a constantly evolving field and this should be put into account when developing a cyber strategy. Developing a cyber should be governed by a set of principles. For instance, in cyber arms control, it should not be assumed that cyber control is similar to the nuclear realm let alone to try to borrow lessons (Futter, 2020). Cyber arms control should be based on a different framework since the implications are quite different.

Some of the challenges of developing and implementing a cyber strategy include the rapid changes in technology. Perpetual advances in technology call for a dynamic cyber strategy that can still offer technology in a midst of advanced attacks and well-equipped attackers.  Technology also expands attack opportunities for hackers as the overlaps between the virtual and physical worlds of information exchange increase. Another challenge is the lack of information technology talent. It has been argued that cyber still lacks its grand strategist and unfortunately might never have one. This poses a great challenge in the development of a cyber strategy. Complicated regulation is also a great challenge in devising a cyber strategy (Mangat, 2021). Cybersecurity is complicated by the regulatory environment, more so the political discussions surrounding consumer privacy.

 

 

In summary, the cyber domain is a challenging sector to streamline. Therefore, a cyber strategy may seem impossible, but with the essential policy tools and collaboration from all states, this can be achieved.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Futter, A. (2020). What does cyber arms control look like? Four principles for managing cyber risk. June.

Hoffman, W. (2019). Is Cyber Strategy Possible?. The Washington Quarterly, 42(1), 131-152.

Mangat, M. (2021). What is cybersecurity? Challenges and threats organizations face. https://phoenixnap.com/blog/what-is-cyber-security.

 

 

 

 

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]