Thursday, May 14, 2020

Questions On The On Cyber Offense - 1581 Words

Report 1 10/10/2014 Luke Weyrauch ICS 382 – 01 Fall 2014 Faisal Kaleem Metropolitan State University Background Cyberattacks have both the potential to devastate and intimidate. They can disable national infrastructure, disrupt communication systems, or even destroy nuclear reactors. Cybersecurity is a thought-provoking and interesting issue. The use of cyberattacks in US as a tool of policy is not sufficiently deliberated by policy makers but it’s of utmost importance to the nation. The policy issues facing the acquisition and use of cyberattacks in US remains a riddle among many policymakers in the US and the world at large. â€Å"Lifting the Veil on Cyber Offense† is an article based on the National Research Council, 2009. The article†¦show more content†¦Summary of the issues raised The pertinent issues presented in the article are majorly based on the ways the National Research Council can protect the US against cyberattacks. The article affirms that cybersecurity is both a delicate and sensitive issue that requires deliberate monitoring before taking any action. However, most of the studies carried out have been based mostly on the cyberdefense side rather than the cyber offense side. This gap, therefore, acts as a motivation towards carrying out this particular research in trying to unveil some of the issues that remain untouched. The current state of cyberattacks in many countries including the US is one filled with dilemma and misunderstanding. Proper institutions and policies have not been set in place to ensure that the policies formulated are in line with both national and international interests. Some of the problems existing include difficulty in identification of parties responsible for cyberattacks, strategic and tactical implications of cyberattacks, and lack of comprehensive strategic policies in the US, among many others (Lin, 2009). These problems exist because cyber related crimes have no boundaries nor proper

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.