Description
This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives. You are to pick ONE and answer it in 4-6- page essay. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Turabian writing style guide (cover page, page numbering, double space, headings/subheadings, etc). The use of required texts and readings from this course is mandatory, but you may supplement with additional academic (credible) sources. YOU MUST CITE YOUR SOURCES AND INCLUDE A BIBLIOGRAPHY.
Essay Question #1: Select one of the studies presented in Case Studies I (Week 6 Lesson) or Case Studies II (Week 7 Lesson) or another case of your choosing with instructor approval. Write an analysis paper providing more details of the attack, to include the following:
a.Victim, attacker, and probable motivation for the attack.
b.Nature and sophistication of the attack.
c.What was the desired outcome of the attack?
d.How successful was it?
e.How effective were the attackers in covering their tracks?
f.How did the victim respond?
OR
Essay Question #2: Discuss the future of cyber warfare. Include the following as part of your discussion:
a.How future wars will be fought.
b.How ethical is cyber warfare?
c.How the United States is preparing defensively to counter cyber-attacks?
d.What is next?
General Requirements 1. Document Format. a. MS Word document b. One-inch (1”) margins c. Times New Roman font d. Twelve (12) pitch e. Not including your title page, this assignment should be 4-6 pages. f. The paper should be 4-6 double-spaced pages. 2. Citation Format: Turabian. As stated in the Academic Integrity Briefings, information taken directly from another source must be placed in quotations and cited following the Turabian format contained in the week one “lessons” folder. You must cite all other information from your sources, even if you do not quote directly. DIRECT QUOTING SHOULD BE KEPT TO A MINIMUM. |
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Please find attached.Thank you.
Outline
I.
Introduction
II.
Conclusion
III.
References
Running head: THE FUTURE OF CYBER WARFARE
The Future of Cyber Warfare
Name
Institution
THE FUTURE OF CYBER WARFARE
2
The Future of Cyber Warfare
How future Cyber warfare will be fought?
Cyber warfare is one of the controversial issues that have been traumatizing most
organizations and countries over the past decade. The term cyber warfare has been connoted by
various researchers in many ways. The broadest connotation of the word is the invading and
defending of information found in the computer networks while limiting the potential of an
adversary to engage in such activities (Dipert, 2013). Most of the individuals perceive that cyber
warfare only deals with the attack on the information in the computers. Nonetheless, cyber
warfare also entails interfering with the information systems to alter the political statements to
influence the political outcomes.
It is anticipated that the future cyber warfare will be prevalent by most governments,
organizations, particular interest groups, and civilians. Moreover, it is expected that the next
cyber war may target not only the military agencies but also the Wall Street, and the main streets
will also be impacted by the future cyber warfare (Dombrowski and Demchak, 2014) .Besides, it
is expected that the US army will be affected on drastically following the future warfare.
Principally, this is because the conduction of the future cyber warfare w...