HLS654 Phase 4 US Strategy for Cyberattacks

User Generated

zqjvyy2009

Writing

HLS 654

Description

Part 1 (2-3 Pages)

The president requests a White Paper that answers this question. In justifying your answer, you are free to offer your own insights and explain your positioning. However, your answer must also address the following:

  • What are the criteria for success?
  • How is the current policy similar to previous policies?
  • How is the current policy different from previous policies?
  • Is the technology and are the threats changing more quickly than policymakers can adapt to them?
  • How does the U.S. policy compare with the policies of other governments and organizations such as the European Union?

Part 2 (1 Page)

As the president's chief cybersecurity advisor, you are often asked to provide opinion pieces for newspapers and journals. A major newspaper has requested that you write an article that illustrates your opinion on who should take responsibility for cybersecurity. Is cybersecurity a national security priority that requires the government to take responsibility for, as it is responsible for national defense? Or, do you think that cybersecurity is a business issue that should be managed by individual companies?

References Please

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

MaDina Williams
HLS654-1901A-01
Phase 4 Individual Project
Professor T. Elliot
1/31/19

Part 1
In recent times, the U.S government has fallen a victim of repeated cyber-attacks, which
threatened its democracy, economy, and security. The prosperity and liberty of the United States
is largely dependent on the security of the country. The advent of the Internet has empowered the
country and enriched the lives of the citizenry by providing access to new information, business,
and services. The digital age arrived and opened up challenges for the country. The Internet is
characterized by decentralized, transnational, and Open Avenue which makes it significantly
vulnerable. Due to the persistence attacks and the perceived cyber threats, the government under
the leadership of President Donald Triumph has developed a cyber-attack strategy, which will
help to protect critical Federal networks and systems. The approach will ensure that the
cyberspace is secure just like our physical borders.
What are the criteria for success
I am sure that the U.S strategy for cyber-attack will be successful. The main aim of the
procedure for cyber-attack is to detect and prevent any attempt of cyber-attack. Therefore, if
there is any successful cyber-attack, then it will be an indication that the strategy is not
successful. Some of the success criteria will be the reduced number of industrial espionages and
the number of hackings reported (The White House, 2018). Another approach for success is the

speed of investigation and apprehension of suspects who may be within the U.S jurisdiction.
The success can also be measured by determining the number of attempted cyber-attacks, which
have been detected and successfully prevented. Moreover, deterrence is a criterion for the
success of the strategy. Offensive cyber operations are also a way that the United States can
protect itself from enemies attacking the country online. The country will need to take more
proactive measures than it has so far. Even as the country takes on a more offensive approach,
there is also need to consider a more defensive scale. Some of the most secure practices for
cyber-security like authenticating users have been known to be increasingly easy to implement.
The issue should be how the United States can improve cyber-defenses at a large scale. The
government can work with companies to ensure that there are security enhancements
implemented to protect everyday internet use. Cyber-defense needs to be made a priority for the
many sectors that make up the technology. Cyberspace defense does not mean that the
government is just working to get hackers out of United States’ networks. Cyberspace defense
also means that the country is resilient when faced with successful cyber-attacks. The
government seeks to use all its instruments of power so that it can prevent adversaries from
carrying out malicious cyberspace activities. Therefore, complete deterrence will be one of the
criterions for the success of the U.S strategy for cybercrime (The White House, 2018). The
success of the strategy will also be measured by the government’s ability to respond to the cyber
attack and manage it before it causes severe damage.
As the United Stat...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags