SlideShare a Scribd company logo
Do you agree or disagree with the following responses. If so,
why or why not. Please provide at least 1 reference each in APA
format.
1. The Internet has brought about changes in how we
communicate, do business, and even on how we study. Before
the Internet we would not have been able to attend this class
from remote parts of the world as we are able to do now. The
ease of communication brought to every corner of the world is
continuing to change how old norms are carried out. Some
might consider this an evolution of communication, some might
consider it a revolution (CSEC 670).
The Internet has not only brought about a revolution in
communication. In some cases the Internet has facilitated actual
revolution. After the uprisings and revolutions in Tunisia,
Yemen, Libya, and Egypt, Elmorshidy (2011) is referring to the
Internet as very powerful tool which can be used toward social
change. Is social change always good? It depends on who's in
charge. Can unfettered texting, FaceBook and Twitter creating
havoc in the streets be considered a security risk? Only if it's
your regime in danger of toppling.
2. If the cybersecurity landscape is defined by its problems, as
the question is worded, then I believe cybersecurity is
essentially risk management and everything that encompasses
the expectation of safety in cyberspace. To put it more clearly,
cybersecurity can be thought of as an organizational
optimization process in respect to the identified risks to which
it is exposed (Bosworth, Jacobson, 2009). This definition
embraces all threats and issues related to cyberspace.
In regard to the second part of the question, there are many
aspects under the cybersecurity discipline umbrella which make
it possible to answer yes to any number of viewpoints in so as
long as it pertains to security in cyberspace. In one of our
readings it states that a recent study found that there are at least
28 different definitions for cybersecurity (Kramer, Starr, Wentz,
2009). While this might be daunting to some, the main thing to
remember is that all of these definitions should be viewed as
aids to policy making and not limited by them (Kramer et. al.,
2009).
3. The definition of Asymmetric, just as the as the definition for
cybersecurity is not a clear-cut straightforward definition and it
varies by who and when it is used. (Gray, 2002) asymmetric
threat can be defined and associated with the acts of attacking
cyberspace with unconventional low-cost means and inflicting
the most damage.
An approach that I find dynamic and effective in defending
against asymmetric threats is the Asymmetric Threat
Assessment Tool (ATAT), the illustration of how this tool
operates by (King, Schmill, & Hannon, 2005) the ATAT is a
tool that was designed and developed for government and
military agencies as a mitigation process for secondary effects
of asymmetric threats and attacks. Just like many cyberspace
threats and attacks one cannot completely protect against these
threats and attacks. (King, et al, 2005) what every stakeholder
should have in place is an effective mitigation process in place
that would minimize or eradicate the threat or attack by
providing a functionality platform that would allow the
enterprise to get back to normal business slowly, but surely.
4. In order to entertain the application of the Westphalian model
to cybersecurity, you must first believe that the digital domain
is a critical asset worthy of state protection. For the United
States, the answer seems to be a resounding yes. President
Obama declared cyberspace a “strategic national asset” and the
Department of Defense issued guidance in a 2011 report to
Congress outlining a national military strategy for cyberspace
(Defense.gov, 2011). Additionally, we now have a Cyber
Command tasked with not only defending but attacking other
countries in cyberspace. From the international front, Iran
boasts of having a cyber-army and Russia, Israel, and North
Korea have all issued declarations regarding the defense of their
cyberspace (Maher, 2013).
Accordingly, nation states continue to identify their digital
domains as sovereign and defined by territorial boundaries,
bringing them squarely into the Westphalia model. Within this
model, autonomous states, their borders and resources are
protected under various international laws, treaties, and
accords. If your cup is half full, you can see the obvious
benefits offered by shared international laws. Credit card fraud
or identity theft against US citizens, carried out by organized
crime in Romania, can be prosecuted using similar extradition
treaties already in place (Demchak, Dombrowski, 2011).
However, many consider international law irrelevant with
regards to cybersecurity; specifically when considering the use
of force (Demchak, Dombrowski, 2011). There has been more
than one example where one nation state has attacked the cyber
infrastructure of another and international outrage was muted at
best. From Georgia and Estonia to the targeted launch of
Stuxnet, nations have proven more than willing to substitute
cyberspace ‘warfare’ for actual boots on the ground (Rand,
2013). Like the fledgling borders constructed by the 1648 Peace
of Westphalia, the creation of conditions that allow
cybersecurity to be globally effective can eventually bring
stability to this new domain...but it will take time and only time
will tell.
Do you agree or disagree with the following responses. If so, why .docx

More Related Content

Similar to Do you agree or disagree with the following responses. If so, why .docx

The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
rtodd599
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
Alexander Decker
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
Maurice Dawson
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
healdkathaleen
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Mark Raduenzel
 
1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf
ezzi552
 
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docxRespond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
carlstromcurtis
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
Maurice Dawson
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
Tpeisi Nesby
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
gilpinleeanna
 

Similar to Do you agree or disagree with the following responses. If so, why .docx (12)

The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY          .docxRunning Head CURRENT CHALLENGES FACING CYBER SECURITY          .docx
Running Head CURRENT CHALLENGES FACING CYBER SECURITY .docx
 
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
Raduenzel_Mark_ResearchPaper_NSEC506_Fall2015
 
1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf1)Using general mass-media (such as news sites) identify a recent co.pdf
1)Using general mass-media (such as news sites) identify a recent co.pdf
 
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docxRespond with 150 wordMy post Forum Post   Hint swipe t.docx
Respond with 150 wordMy post Forum Post   Hint swipe t.docx
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Module 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docxModule 8 Textbook ReadingThe textbook reading assignment f.docx
Module 8 Textbook ReadingThe textbook reading assignment f.docx
 

More from jacksnathalie

OverviewThe US is currently undergoing an energy boom largel.docx
OverviewThe US is currently undergoing an energy boom largel.docxOverviewThe US is currently undergoing an energy boom largel.docx
OverviewThe US is currently undergoing an energy boom largel.docx
jacksnathalie
 
OverviewThe United Nations (UN) has hired you as a consultan.docx
OverviewThe United Nations (UN) has hired you as a consultan.docxOverviewThe United Nations (UN) has hired you as a consultan.docx
OverviewThe United Nations (UN) has hired you as a consultan.docx
jacksnathalie
 
OverviewThis project will allow you to write a program to get mo.docx
OverviewThis project will allow you to write a program to get mo.docxOverviewThis project will allow you to write a program to get mo.docx
OverviewThis project will allow you to write a program to get mo.docx
jacksnathalie
 
OverviewThis week, we begin our examination of contemporary resp.docx
OverviewThis week, we begin our examination of contemporary resp.docxOverviewThis week, we begin our examination of contemporary resp.docx
OverviewThis week, we begin our examination of contemporary resp.docx
jacksnathalie
 
OverviewProgress monitoring is a type of formative assessment in.docx
OverviewProgress monitoring is a type of formative assessment in.docxOverviewProgress monitoring is a type of formative assessment in.docx
OverviewProgress monitoring is a type of formative assessment in.docx
jacksnathalie
 
OverviewThe work you do throughout the modules culminates into a.docx
OverviewThe work you do throughout the modules culminates into a.docxOverviewThe work you do throughout the modules culminates into a.docx
OverviewThe work you do throughout the modules culminates into a.docx
jacksnathalie
 
OverviewThis discussion is about organizational design and.docx
OverviewThis discussion is about organizational design and.docxOverviewThis discussion is about organizational design and.docx
OverviewThis discussion is about organizational design and.docx
jacksnathalie
 
OverviewScholarly dissemination is essential for any doctora.docx
OverviewScholarly dissemination is essential for any doctora.docxOverviewScholarly dissemination is essential for any doctora.docx
OverviewScholarly dissemination is essential for any doctora.docx
jacksnathalie
 
OverviewRegardless of whether you own a business or are a s.docx
OverviewRegardless of whether you own a business or are a s.docxOverviewRegardless of whether you own a business or are a s.docx
OverviewRegardless of whether you own a business or are a s.docx
jacksnathalie
 
OverviewImagine you have been hired as a consultant for th.docx
OverviewImagine you have been hired as a consultant for th.docxOverviewImagine you have been hired as a consultant for th.docx
OverviewImagine you have been hired as a consultant for th.docx
jacksnathalie
 
OverviewDevelop a 4–6-page position about a specific health care.docx
OverviewDevelop a 4–6-page position about a specific health care.docxOverviewDevelop a 4–6-page position about a specific health care.docx
OverviewDevelop a 4–6-page position about a specific health care.docx
jacksnathalie
 
Overview This purpose of the week 6 discussion board is to exam.docx
Overview This purpose of the week 6 discussion board is to exam.docxOverview This purpose of the week 6 discussion board is to exam.docx
Overview This purpose of the week 6 discussion board is to exam.docx
jacksnathalie
 
Overall Scenario Always Fresh Foods Inc. is a food distributor w.docx
Overall Scenario Always Fresh Foods Inc. is a food distributor w.docxOverall Scenario Always Fresh Foods Inc. is a food distributor w.docx
Overall Scenario Always Fresh Foods Inc. is a food distributor w.docx
jacksnathalie
 
OverviewCreate a 15-minute oral presentation (3–4 pages) that .docx
OverviewCreate a 15-minute oral presentation (3–4 pages) that .docxOverviewCreate a 15-minute oral presentation (3–4 pages) that .docx
OverviewCreate a 15-minute oral presentation (3–4 pages) that .docx
jacksnathalie
 
Overall CommentsHi Khanh,Overall you made a nice start with y.docx
Overall CommentsHi Khanh,Overall you made a nice start with y.docxOverall CommentsHi Khanh,Overall you made a nice start with y.docx
Overall CommentsHi Khanh,Overall you made a nice start with y.docx
jacksnathalie
 
Overall CommentsHi Khanh,Overall you made a nice start with.docx
Overall CommentsHi Khanh,Overall you made a nice start with.docxOverall CommentsHi Khanh,Overall you made a nice start with.docx
Overall CommentsHi Khanh,Overall you made a nice start with.docx
jacksnathalie
 
Overall feedbackYou addressed most all of the assignment req.docx
Overall feedbackYou addressed most all  of the assignment req.docxOverall feedbackYou addressed most all  of the assignment req.docx
Overall feedbackYou addressed most all of the assignment req.docx
jacksnathalie
 
Overall Comments Overall you made a nice start with your U02a1 .docx
Overall Comments Overall you made a nice start with your U02a1 .docxOverall Comments Overall you made a nice start with your U02a1 .docx
Overall Comments Overall you made a nice start with your U02a1 .docx
jacksnathalie
 
Overview This purpose of the week 12 discussion board is to e.docx
Overview This purpose of the week 12 discussion board is to e.docxOverview This purpose of the week 12 discussion board is to e.docx
Overview This purpose of the week 12 discussion board is to e.docx
jacksnathalie
 
Over the years, the style and practice of leadership within law .docx
Over the years, the style and practice of leadership within law .docxOver the years, the style and practice of leadership within law .docx
Over the years, the style and practice of leadership within law .docx
jacksnathalie
 

More from jacksnathalie (20)

OverviewThe US is currently undergoing an energy boom largel.docx
OverviewThe US is currently undergoing an energy boom largel.docxOverviewThe US is currently undergoing an energy boom largel.docx
OverviewThe US is currently undergoing an energy boom largel.docx
 
OverviewThe United Nations (UN) has hired you as a consultan.docx
OverviewThe United Nations (UN) has hired you as a consultan.docxOverviewThe United Nations (UN) has hired you as a consultan.docx
OverviewThe United Nations (UN) has hired you as a consultan.docx
 
OverviewThis project will allow you to write a program to get mo.docx
OverviewThis project will allow you to write a program to get mo.docxOverviewThis project will allow you to write a program to get mo.docx
OverviewThis project will allow you to write a program to get mo.docx
 
OverviewThis week, we begin our examination of contemporary resp.docx
OverviewThis week, we begin our examination of contemporary resp.docxOverviewThis week, we begin our examination of contemporary resp.docx
OverviewThis week, we begin our examination of contemporary resp.docx
 
OverviewProgress monitoring is a type of formative assessment in.docx
OverviewProgress monitoring is a type of formative assessment in.docxOverviewProgress monitoring is a type of formative assessment in.docx
OverviewProgress monitoring is a type of formative assessment in.docx
 
OverviewThe work you do throughout the modules culminates into a.docx
OverviewThe work you do throughout the modules culminates into a.docxOverviewThe work you do throughout the modules culminates into a.docx
OverviewThe work you do throughout the modules culminates into a.docx
 
OverviewThis discussion is about organizational design and.docx
OverviewThis discussion is about organizational design and.docxOverviewThis discussion is about organizational design and.docx
OverviewThis discussion is about organizational design and.docx
 
OverviewScholarly dissemination is essential for any doctora.docx
OverviewScholarly dissemination is essential for any doctora.docxOverviewScholarly dissemination is essential for any doctora.docx
OverviewScholarly dissemination is essential for any doctora.docx
 
OverviewRegardless of whether you own a business or are a s.docx
OverviewRegardless of whether you own a business or are a s.docxOverviewRegardless of whether you own a business or are a s.docx
OverviewRegardless of whether you own a business or are a s.docx
 
OverviewImagine you have been hired as a consultant for th.docx
OverviewImagine you have been hired as a consultant for th.docxOverviewImagine you have been hired as a consultant for th.docx
OverviewImagine you have been hired as a consultant for th.docx
 
OverviewDevelop a 4–6-page position about a specific health care.docx
OverviewDevelop a 4–6-page position about a specific health care.docxOverviewDevelop a 4–6-page position about a specific health care.docx
OverviewDevelop a 4–6-page position about a specific health care.docx
 
Overview This purpose of the week 6 discussion board is to exam.docx
Overview This purpose of the week 6 discussion board is to exam.docxOverview This purpose of the week 6 discussion board is to exam.docx
Overview This purpose of the week 6 discussion board is to exam.docx
 
Overall Scenario Always Fresh Foods Inc. is a food distributor w.docx
Overall Scenario Always Fresh Foods Inc. is a food distributor w.docxOverall Scenario Always Fresh Foods Inc. is a food distributor w.docx
Overall Scenario Always Fresh Foods Inc. is a food distributor w.docx
 
OverviewCreate a 15-minute oral presentation (3–4 pages) that .docx
OverviewCreate a 15-minute oral presentation (3–4 pages) that .docxOverviewCreate a 15-minute oral presentation (3–4 pages) that .docx
OverviewCreate a 15-minute oral presentation (3–4 pages) that .docx
 
Overall CommentsHi Khanh,Overall you made a nice start with y.docx
Overall CommentsHi Khanh,Overall you made a nice start with y.docxOverall CommentsHi Khanh,Overall you made a nice start with y.docx
Overall CommentsHi Khanh,Overall you made a nice start with y.docx
 
Overall CommentsHi Khanh,Overall you made a nice start with.docx
Overall CommentsHi Khanh,Overall you made a nice start with.docxOverall CommentsHi Khanh,Overall you made a nice start with.docx
Overall CommentsHi Khanh,Overall you made a nice start with.docx
 
Overall feedbackYou addressed most all of the assignment req.docx
Overall feedbackYou addressed most all  of the assignment req.docxOverall feedbackYou addressed most all  of the assignment req.docx
Overall feedbackYou addressed most all of the assignment req.docx
 
Overall Comments Overall you made a nice start with your U02a1 .docx
Overall Comments Overall you made a nice start with your U02a1 .docxOverall Comments Overall you made a nice start with your U02a1 .docx
Overall Comments Overall you made a nice start with your U02a1 .docx
 
Overview This purpose of the week 12 discussion board is to e.docx
Overview This purpose of the week 12 discussion board is to e.docxOverview This purpose of the week 12 discussion board is to e.docx
Overview This purpose of the week 12 discussion board is to e.docx
 
Over the years, the style and practice of leadership within law .docx
Over the years, the style and practice of leadership within law .docxOver the years, the style and practice of leadership within law .docx
Over the years, the style and practice of leadership within law .docx
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Do you agree or disagree with the following responses. If so, why .docx

  • 1. Do you agree or disagree with the following responses. If so, why or why not. Please provide at least 1 reference each in APA format. 1. The Internet has brought about changes in how we communicate, do business, and even on how we study. Before the Internet we would not have been able to attend this class from remote parts of the world as we are able to do now. The ease of communication brought to every corner of the world is continuing to change how old norms are carried out. Some might consider this an evolution of communication, some might consider it a revolution (CSEC 670). The Internet has not only brought about a revolution in communication. In some cases the Internet has facilitated actual revolution. After the uprisings and revolutions in Tunisia, Yemen, Libya, and Egypt, Elmorshidy (2011) is referring to the Internet as very powerful tool which can be used toward social change. Is social change always good? It depends on who's in charge. Can unfettered texting, FaceBook and Twitter creating havoc in the streets be considered a security risk? Only if it's your regime in danger of toppling. 2. If the cybersecurity landscape is defined by its problems, as the question is worded, then I believe cybersecurity is essentially risk management and everything that encompasses the expectation of safety in cyberspace. To put it more clearly, cybersecurity can be thought of as an organizational optimization process in respect to the identified risks to which it is exposed (Bosworth, Jacobson, 2009). This definition embraces all threats and issues related to cyberspace. In regard to the second part of the question, there are many aspects under the cybersecurity discipline umbrella which make it possible to answer yes to any number of viewpoints in so as long as it pertains to security in cyberspace. In one of our
  • 2. readings it states that a recent study found that there are at least 28 different definitions for cybersecurity (Kramer, Starr, Wentz, 2009). While this might be daunting to some, the main thing to remember is that all of these definitions should be viewed as aids to policy making and not limited by them (Kramer et. al., 2009). 3. The definition of Asymmetric, just as the as the definition for cybersecurity is not a clear-cut straightforward definition and it varies by who and when it is used. (Gray, 2002) asymmetric threat can be defined and associated with the acts of attacking cyberspace with unconventional low-cost means and inflicting the most damage. An approach that I find dynamic and effective in defending against asymmetric threats is the Asymmetric Threat Assessment Tool (ATAT), the illustration of how this tool operates by (King, Schmill, & Hannon, 2005) the ATAT is a tool that was designed and developed for government and military agencies as a mitigation process for secondary effects of asymmetric threats and attacks. Just like many cyberspace threats and attacks one cannot completely protect against these threats and attacks. (King, et al, 2005) what every stakeholder should have in place is an effective mitigation process in place that would minimize or eradicate the threat or attack by providing a functionality platform that would allow the enterprise to get back to normal business slowly, but surely. 4. In order to entertain the application of the Westphalian model to cybersecurity, you must first believe that the digital domain is a critical asset worthy of state protection. For the United States, the answer seems to be a resounding yes. President Obama declared cyberspace a “strategic national asset” and the Department of Defense issued guidance in a 2011 report to Congress outlining a national military strategy for cyberspace (Defense.gov, 2011). Additionally, we now have a Cyber Command tasked with not only defending but attacking other countries in cyberspace. From the international front, Iran
  • 3. boasts of having a cyber-army and Russia, Israel, and North Korea have all issued declarations regarding the defense of their cyberspace (Maher, 2013). Accordingly, nation states continue to identify their digital domains as sovereign and defined by territorial boundaries, bringing them squarely into the Westphalia model. Within this model, autonomous states, their borders and resources are protected under various international laws, treaties, and accords. If your cup is half full, you can see the obvious benefits offered by shared international laws. Credit card fraud or identity theft against US citizens, carried out by organized crime in Romania, can be prosecuted using similar extradition treaties already in place (Demchak, Dombrowski, 2011). However, many consider international law irrelevant with regards to cybersecurity; specifically when considering the use of force (Demchak, Dombrowski, 2011). There has been more than one example where one nation state has attacked the cyber infrastructure of another and international outrage was muted at best. From Georgia and Estonia to the targeted launch of Stuxnet, nations have proven more than willing to substitute cyberspace ‘warfare’ for actual boots on the ground (Rand, 2013). Like the fledgling borders constructed by the 1648 Peace of Westphalia, the creation of conditions that allow cybersecurity to be globally effective can eventually bring stability to this new domain...but it will take time and only time will tell.