Access over 20 million homework & study documents

Cyberwar

Content type
User Generated
Subject
English
Type
Homework
Rating
Showing Page:
1/4
Cyberwar:
0. Cyber Terrorism and Information Warfare
a. Read Chapter 12 from the text.
1. Global Cyber Threat Environment
a. Watch the video: Introduction to the Global Cyber Threat Environment
https://www.youtube.com/watch?v=fIKlTQms0ZM&feature=youtu.be
b. Watch the video: Cyber Deterrence and the International System of Sovereignty
https://www.youtube.com/watch?v=roLdoBhYrQI&feature=youtu.be
c. Read Nye, J. S. Cyber Power. (May 2010). Paper. Belfer Center for Science and
International Affairs. Harvard Kennedy School.
d. Write a reflection (maximum one page ) about your current level of knowledge
about the United States’ four major cyber adversaries, including such things as their
system of government
human rights record
technology development
history with the United States
The overdependence of the United States on internet technology exposes it greatly to the
risk of cyber threats. The history with the United States is that it built its cyberspace resilience as
the leading superpower, starting with its military technology; however, the cyberspace technology
has been challenging with the continuous technology development. U.S.A has been on its toes
since earlier days of the computer technology to prevent any cyber intrusion from within and
without its domain.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
The most daunting America main cyber adversaries are Iran, Russia and North Korea and
China, with each possessing different high-tech capabilities for a potential cyberwar. Over the
years, Russia has specialized on information operation that entails the deception and psychological
operation to disrupt the adversary’s ability to make rational decision through manipulation of
information and propaganda. On the other hand, China has the capacity to commit espionage that
involves cyber information theft of governmental and corporate data. Though Iran have lesser
technological potency compared to the two countries, it cannot be underestimated since its
computing technology can penetrate through the adversary cyberspace breaching its industrial
control system. Least of all is the North Korea, which employed the cyber disruption to gain
respect in international communities.
The system of government in the United States, which is the federal system, gives it a lot of
power and jurisdiction as a hegemony. Even when it comes to the cyberspace technology, still the
rival countries like Russia, Iran, China, and North Korea have not yet been able to penetrate the
wall of the U.S. cyberspace fully. Thus once more, giving America the computer technology
advantage. With the exercising of both soft and hard power in cyberspace governance, the human
right record is an important factor in protection of individual reputation, morals, national security
as well as public order.
2. Cyber Crime
a. Watch the video: about the cost that cybercriminals pose to the U.S. economy.
Download the FBI's latest Internet Crime Report (available at
https://www.ic3.gov/default.aspx).
b. Build a presentation that highlights the following:
What are the most common types of cybercrimes reported by victims?

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
Cyberwar: 0. Cyber Terrorism and Information Warfare a. Read Chapter 12 from the text. 1. Global Cyber Threat Environment a. Watch the video: Introduction to the Global Cyber Threat Environment https://www.youtube.com/watch?v=fIKlTQms0ZM&feature=youtu.be b. Watch the video: Cyber Deterrence and the International System of Sovereignty https://www.youtube.com/watch?v=roLdoBhYrQI&feature=youtu.be c. Read Nye, J. S. Cyber Power. (May 2010). Paper. Belfer Center for Science and International Affairs. Harvard Kennedy School. d. Write a reflection (maximum one page ) about your current level of knowledge about the United States’ four major cyber adversaries, including such things as their • system of government • human rights record • technology development • history with the United States The overdependence of the United States on internet technology exposes it greatly to the risk of cyber threats. The history with the United States is that it built its cyberspace resilience as the leading superpower, starting with its military technology; however, the cyberspace technology has been challenging with the continuous technology development. U.S.A has been on its toes since ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4