SlideShare a Scribd company logo
**ANSWER THE QUESTION 250 WORDS MIN**
Discussion Questions:
Is cyber the greatest future threat the US faces? If so, explain
why. If cyber is not the greatest future threat, what is and
why?
**REPLY TO EACH POST 100 WORDS MIN EACH**
1. In the last two decades, there has been considerable increase
that threaten the security of the U.S. Our nation is under attack
24/7 by cyber hacker and as a result any infrastructure or even
individual can be a victim. Cyber threat factors into critical
infrastructure protection and risk management. Cyberspace
capabilities play an increasing role on the economic system,
public safety and how people communicate, including
telecommunication, internet, and sensitive emails. Therefore,
the advancements in cyber technology have come along with
many risks owing to critical information, hacking and threats to
the U.S. In recent years, the U.S. government has been a victim
of cybercrime with the threat of national security increasing
significantly. According to Quadrennial Homeland Security
Review, (2014). “cyberspace is particularly difficult to secure
due to a number of factors: the ability of malicious actors to
operate from anywhere in the world, the linkage between
cyberspace and physical systems, and the difficulty of reducing
vulnerabilities and consequences in complex cyber networks”
(p. 39). Either directly or indirectly, some foreign governments
and/or malicious groups have been taking full advantage of
wide range of cyber network to threaten the local community.
All level of government policy makers and private sectors
provides essential services and constantly learning new ways to
prevent the cyber threats facing the homeland. The DHS has set
guidelines to ensure that the advantage of cyberspace is only
used by the proper agencies that are determined to protect the
citizens from external and internal threats. U.S. government
utilizes resources that can be exploited to develop guidelines to
include national cyber threat objectives, policies and projected
levels for funding to ensure that cyber threats are given
significant attention and that the strategies to improve national
security benefit immensely from cyber security. Additionally,
all level of government aims to prioritize the risks and employ
cost-effective strategies. Generally, the maintenance of cyber-
security offers a perfect way of ensuring that the local
community activities are successful.
2. Yes, I would say that cyber is surely the greatest future threat
to the United States. So much of the world is reliant on
technology and the United States seems to be at the forefront of
using that technology to make life easier. The internet and
technology are such assets to running business, ensuring
security, and even just paying bills but as easy as it is for us to
use, its just as easy for criminals to use these same things for
the wrong reasons and mass chaos can be a real result of it all.
It is said by many that the biggest threat to the United States in
2021 is in fact cyber security (Riley, 2021). In December of
2020, there was a cyber attack where information regarding
Covid-19 was illegally accessed from the Pfizer-BioNTech
corportation (Riley,2020). The threat of cyber security does not
mean that just viruses can come in and shut down computer
systems, Hackers can steal information, take money, and
quickly terrorize businesses causing massive damage. One of
the hardest things to do is track these particular people down,
they can be half a world away or right next door and the
government could be infected with these viruses and have
information stolen for months on end before they become aware
of the issue. Cyber security becomes more of a priority
everyday as technology continues to advance. There are many
organizations throughout the United States of America that
work tirelessly to ensure that our nation's infrastructure are
protected because the vulnerabilities are so high. If an attack is
carried out on the nation's infrastructures there will be massive
problems due to the United States relying so much on
technology and without it many businesses and tools would not
be able to operate to full capacity. As technology continues to
get better the vulnerabilities become even greater as time goes
on that is why cyber security continues to be such an important
part of national security.

More Related Content

Similar to ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx

MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
jessiehampson
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
Kristin Judge
 

Similar to ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx (16)

Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Vision By 2023, the Departme.docx
Vision  By 2023, the Departme.docxVision  By 2023, the Departme.docx
Vision By 2023, the Departme.docx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 

More from amrit47

Apa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docxApa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docx
amrit47
 
APA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docxAPA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docx
amrit47
 
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docxAPA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
amrit47
 
APA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docxAPA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docx
amrit47
 
Appearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docxAppearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docx
amrit47
 
APA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docxAPA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docx
amrit47
 

More from amrit47 (20)

APA, The assignment require a contemporary approach addressing Race,.docx
APA, The assignment require a contemporary approach addressing Race,.docxAPA, The assignment require a contemporary approach addressing Race,.docx
APA, The assignment require a contemporary approach addressing Race,.docx
 
APA style and all questions answered ( no min page requirements) .docx
APA style and all questions answered ( no min page requirements) .docxAPA style and all questions answered ( no min page requirements) .docx
APA style and all questions answered ( no min page requirements) .docx
 
Apa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docxApa format1-2 paragraphsreferences It is often said th.docx
Apa format1-2 paragraphsreferences It is often said th.docx
 
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docxAPA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
APA format2-3 pages, double-spaced1. Choose a speech to review. It.docx
 
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
APA format     httpsapastyle.apa.orghttpsowl.purd.docxAPA format     httpsapastyle.apa.orghttpsowl.purd.docx
APA format  httpsapastyle.apa.orghttpsowl.purd.docx
 
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
APA format2-3 pages, double-spaced1. Choose a speech to review. .docxAPA format2-3 pages, double-spaced1. Choose a speech to review. .docx
APA format2-3 pages, double-spaced1. Choose a speech to review. .docx
 
APA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docxAPA Formatting AssignmentUse the information below to create.docx
APA Formatting AssignmentUse the information below to create.docx
 
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docxAPA style300 words10 maximum plagiarism  Mrs. Smith was.docx
APA style300 words10 maximum plagiarism  Mrs. Smith was.docx
 
APA format1. What are the three most important takeawayslessons.docx
APA format1. What are the three most important takeawayslessons.docxAPA format1. What are the three most important takeawayslessons.docx
APA format1. What are the three most important takeawayslessons.docx
 
APA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docxAPA General Format Summary APA (American Psychological.docx
APA General Format Summary APA (American Psychological.docx
 
Appearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docxAppearance When I watched the video of myself, I felt that my b.docx
Appearance When I watched the video of myself, I felt that my b.docx
 
apa format1-2 paragraphsreferencesFor this week’s .docx
apa format1-2 paragraphsreferencesFor this week’s .docxapa format1-2 paragraphsreferencesFor this week’s .docx
apa format1-2 paragraphsreferencesFor this week’s .docx
 
APA Format, with 2 references for each question and an assignment..docx
APA Format, with 2 references for each question and an assignment..docxAPA Format, with 2 references for each question and an assignment..docx
APA Format, with 2 references for each question and an assignment..docx
 
APA-formatted 8-10 page research paper which examines the potential .docx
APA-formatted 8-10 page research paper which examines the potential .docxAPA-formatted 8-10 page research paper which examines the potential .docx
APA-formatted 8-10 page research paper which examines the potential .docx
 
APA    STYLE 1.Define the terms multiple disabilities and .docx
APA    STYLE 1.Define the terms multiple disabilities and .docxAPA    STYLE 1.Define the terms multiple disabilities and .docx
APA    STYLE 1.Define the terms multiple disabilities and .docx
 
APA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docxAPA STYLE  follow this textbook answer should be summarize for t.docx
APA STYLE  follow this textbook answer should be summarize for t.docx
 
APA7Page length 3-4, including Title Page and Reference Pag.docx
APA7Page length 3-4, including Title Page and Reference Pag.docxAPA7Page length 3-4, including Title Page and Reference Pag.docx
APA7Page length 3-4, including Title Page and Reference Pag.docx
 
APA format, 2 pagesThree general sections 1. an article s.docx
APA format, 2 pagesThree general sections 1. an article s.docxAPA format, 2 pagesThree general sections 1. an article s.docx
APA format, 2 pagesThree general sections 1. an article s.docx
 
APA Style with minimum of 450 words, with annotations, quotation.docx
APA Style with minimum of 450 words, with annotations, quotation.docxAPA Style with minimum of 450 words, with annotations, quotation.docx
APA Style with minimum of 450 words, with annotations, quotation.docx
 
APA FORMAT1.  What are the three most important takeawayslesson.docx
APA FORMAT1.  What are the three most important takeawayslesson.docxAPA FORMAT1.  What are the three most important takeawayslesson.docx
APA FORMAT1.  What are the three most important takeawayslesson.docx
 

Recently uploaded

Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Gyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptxGyanartha SciBizTech Quiz slideshare.pptx
Gyanartha SciBizTech Quiz slideshare.pptx
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 

ANSWER THE QUESTION 250 WORDS MINDiscussion Questions I.docx

  • 1. **ANSWER THE QUESTION 250 WORDS MIN** Discussion Questions: Is cyber the greatest future threat the US faces? If so, explain why. If cyber is not the greatest future threat, what is and why? **REPLY TO EACH POST 100 WORDS MIN EACH** 1. In the last two decades, there has been considerable increase that threaten the security of the U.S. Our nation is under attack 24/7 by cyber hacker and as a result any infrastructure or even individual can be a victim. Cyber threat factors into critical infrastructure protection and risk management. Cyberspace capabilities play an increasing role on the economic system, public safety and how people communicate, including telecommunication, internet, and sensitive emails. Therefore, the advancements in cyber technology have come along with many risks owing to critical information, hacking and threats to the U.S. In recent years, the U.S. government has been a victim of cybercrime with the threat of national security increasing significantly. According to Quadrennial Homeland Security Review, (2014). “cyberspace is particularly difficult to secure due to a number of factors: the ability of malicious actors to operate from anywhere in the world, the linkage between cyberspace and physical systems, and the difficulty of reducing vulnerabilities and consequences in complex cyber networks” (p. 39). Either directly or indirectly, some foreign governments and/or malicious groups have been taking full advantage of wide range of cyber network to threaten the local community.
  • 2. All level of government policy makers and private sectors provides essential services and constantly learning new ways to prevent the cyber threats facing the homeland. The DHS has set guidelines to ensure that the advantage of cyberspace is only used by the proper agencies that are determined to protect the citizens from external and internal threats. U.S. government utilizes resources that can be exploited to develop guidelines to include national cyber threat objectives, policies and projected levels for funding to ensure that cyber threats are given significant attention and that the strategies to improve national security benefit immensely from cyber security. Additionally, all level of government aims to prioritize the risks and employ cost-effective strategies. Generally, the maintenance of cyber- security offers a perfect way of ensuring that the local community activities are successful. 2. Yes, I would say that cyber is surely the greatest future threat to the United States. So much of the world is reliant on technology and the United States seems to be at the forefront of using that technology to make life easier. The internet and technology are such assets to running business, ensuring security, and even just paying bills but as easy as it is for us to use, its just as easy for criminals to use these same things for the wrong reasons and mass chaos can be a real result of it all. It is said by many that the biggest threat to the United States in 2021 is in fact cyber security (Riley, 2021). In December of 2020, there was a cyber attack where information regarding Covid-19 was illegally accessed from the Pfizer-BioNTech corportation (Riley,2020). The threat of cyber security does not mean that just viruses can come in and shut down computer systems, Hackers can steal information, take money, and quickly terrorize businesses causing massive damage. One of
  • 3. the hardest things to do is track these particular people down, they can be half a world away or right next door and the government could be infected with these viruses and have information stolen for months on end before they become aware of the issue. Cyber security becomes more of a priority everyday as technology continues to advance. There are many organizations throughout the United States of America that work tirelessly to ensure that our nation's infrastructure are protected because the vulnerabilities are so high. If an attack is carried out on the nation's infrastructures there will be massive problems due to the United States relying so much on technology and without it many businesses and tools would not be able to operate to full capacity. As technology continues to get better the vulnerabilities become even greater as time goes on that is why cyber security continues to be such an important part of national security.