Understanding Cyber Conflict: 14 Analogies – Discussion Forum #4 In Stephen Blank’s discussion of Russian Information Warfare, Cyber Warfare, and “Political Warfare” what are the 3 key takeaways do you make from his discussion? In your opinion, is Russian actions in cyberspace “cyber terrorism” in the traditional understanding? In what areas can the United States …
Category: Cyber Security
Module 6 Discussion – Dissenting View
Identify a reading with which you disagree, and briefly detail your dissenting view. You can use Week 6 material for this. Use the web links or pdfs as references. Essay at least 500 words https://spacenews.com/u-s-intelligence-russia-and-china-will-have-operational-anti-satellite-weapons-in-a-few-years/ https://www.wired.com/2017/01/connected-devices-give-spies-powerful-new-way-surveil/ https://www.cnn.com/2018/01/28/politics/strava-military-bases-location/index.html
Understanding Cyber Conflict: 14 Analogies – Discussion Forum #3
In this discussion, we will look at Steven Miller’s commentary on whether our response to nuclear technology has any key lessons-learned to our current response to the overall cyber threat. Mr. Miller asks the key question, “What elements of the response to nuclear technology, if any, have relevance for the cyber era?” With that said, …
Understanding Cyber Conflict: 14 Analogies – Discussion Forum #2
Please read Chapters 7 & 9 in the textbook. Within Chapter 7, Francis Gavin brilliantly articulates an analogy between the expansion of cyberspace and the growth of the railroads in the early 20th century. He opens his discussion, “The role of new technologies, especially the massive expansion of rail lines throughout Europe and their ability …
Module 3 Discussion – Cyber Secuity in National & International Law
In no more than 750 words, please discuss the following one (1) of the following three (3) questions: 1) Is it important to distinguish between different types of cyber attacks? How should we do it? 2) What should the role of the United States be in Internet Governance? 3) Is cyberspace at risk of being …