Write a research paper.

User Generated

Oyhcuv76

Business Finance

Description

Based on the attached research question assignment. Write a research paper on the topic. The paper should be between 10-12 pages, not including the cover page, reference list, and any appendices. The assignment must follow the Chicago Style Manual guidelines. Refer to Kate Turabian, A Manual for Writers of Research Papers, Theses, and Dissertations, 7th ed.Chicago: University of Chicago Press found at http://www.press.uchicago.edu/books/turabian/turab... Follow the APA Format as the sole citation and reference style used in written work submitted as part of coursework to the University All written submissions should be submitted in Times New Roman 12 pt font with 1” margins, typewritten in double-spaced format.

Unformatted Attachment Preview

RESEARCH QUESTIONS This research proposal on the relationship between cyber power and national security will seek to examine and provide responses to the following research questions. i. What are the elements of the cyberspace which are also forming part of the national security? ii. What are the roles of the cyber power in the attainment of the national security? PURPOSE STATEMENT Different countries such as China have always tried to be a superpower regarding the military capabilities. Since China has not been able to match the military strength of the United States, they have always shifted to asymmetric methods to counter the America’s strength. Specifically, the China’s use of the cyber power to counter the United States military has been a matter of public discussion and concern. Cyber power refers to the use of computer network attack as well as the computer network exploitation. Therefore, the People’s Republic of China has continuously funded, acquired, established as well as fielded a more advanced cyber technology in various sectors including its government, military together with the civil sectors. This is considered a holistic effort towards building China’s political and economic power which will ensure there is national security. Besides, the development of the cyber power is always a deliberate attempt of establishing a cyber warfare ability as asymmetric methods of fighting and defeating the United States’ superior military power which is also translated to the national security. Moreover, some countries such as China have always believed that the national security does not only depend on the military power of the country but also the cyber power of a given nation. Hence, the paper is meant to prove that the cyber space can actually be a war fighting domain and that cyber power is now with the same as land, sea, as well as air power about the strength of the military. References China and cybersecurity: Espionage, strategy, and politics in the digital. (2015). Place of publication not identified: Oxford University Press. Klimburg, A., & NATO Cooperative Cyber Defence Centre of Excellence. (2012). National cyber security framework manual. Talinn, Estonia: NATO Cooperative Cyber Defense Center of Excellence. Andress, J., Winterfeld, S., & Rogers, R. (2011). Cyber warfare: Techniques, tactics and tools for security practitioners. Amsterdam: Elsevier/Syngress. In Clark, R. M., & In Hakim, S. (2016). Cyber-physical security: Protecting critical infrastructure at the state and local level. Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. Whelan, C. (2016). Networks and national security: Dynamics, effectiveness and organisation. London: Routledge.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: RESEARCH PROPOSAL - CYBERSPACE

Research Proposal - Cyberspace
Name
Course
Tutor
Date

1

RESEARCH PROPOSAL - CYBERSPACE

2

Elements of the Cyberspace which are also Forming Part of the National Security

Cyberspace is the space within the virtual environment that relies on the interdependence of
various networks of infrastructures within the information technology arena. The multiple
interconnections include the internet, fiber optic cables, computer systems, routers, servers as
well as switches. For the national security of any country to be said to be in tip-top shape and
healthy for that matter, the various domains of warfare or all the dimensions of space ought to be
strategically covered. These are land, sea, space, information as well as air. On this note, the
article includes the information dimension about a country’s data and its secure use. It is a good
way of keeping a balance of all the dimensions, therefore, ensuring that national security is
assured especially for the sake of the growth of the country and to keep the economy on the rise.

On this note, various elements of cyberspace are considered when considering national
security. There are several elements, that is, the components or layers of cyberspace. Concerning
national security, a country will do its best to ensure that the cyberspace is well secured in its use
so that there are no vulnerabilities or risks created. This then prevents cybersecurity issues that
would otherwise jeopardize how a nation deals with issues. A country will go to great lengths to
ensure that matters of national security are handled and dealt with in a way that does not end up
affecting its citizens, therefore, ensuring that the company operates in the best climate possible,
which is secure for the people.1 This is to mean that all the sectors and enterprises ought to be
involved in the maintenance of the national security by playing a part in the management of risk.

1

Klimburg, Alexander. 2012. National cyber security framework manual. [Talinn, Estonia]:
NATO Cooperative Cyber Defense Center of Excellence. http://ccdcoe.org/369.html

RESEARCH PROPOSAL - CYBERSPACE

3

The elements or components of the cyberspace are three. These are the physical component,
the cognitive component as well as information component, all of which make up the
cyberspace. For the efficiency of the national security of any country, the three components
ought to work in unison to enable meet the requirements of an essential national security system.
This enables viability of the cyberspace as well as its efficiency in meeting the various goals set
for the goal realization. The physical components include hardware such as networks and
servers, which are supposed to be kept protected from attacks of any sort. The information
component is inclusive of the data related to the nation that may be of a coercive or non-coercive
nature. The information component, is, therefore, protected from any manipulation techniques.

Finally, the cognitive component has to do the perception that the audience of the
information holds and how this affects the national security of the country in question. On this
note, the role played by the government is the provision of information assurance. The
cyberspace is greatly affected by the military operations and preparations, relations with
countries on an international level as well as the policies with regard to cyberspace by the
government and how these are of impact to space. Literacy in the digital world is one important
aspect if the components are to play a role in ensuring the national security of a country.2 The
government should, therefore, seek to ensure that the public has a good idea of what the

2

Clark, Robert M., and Simon Hakim. "Protecting Critical Infrastructure at the State, Provincial,
and Local Level: Issues in Cyber-Physical Security." Cyber-Physical Security: Protecting
Critical Infrastructure at the State and Local Level 3 (2016): 1.

RESEARCH PROPOSAL - CYBERSPACE

4

cyberspace, how it works and how it connects all of us together. This means that learning
institutions need to make room for this topic so that people may be made aware of the
significance of this platform. This is to mean that the citizens ought to keep themselv...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags