Language:EN
Pages: 1
Words: 83
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
the meaning the cyber revolution perils theory and

The meaning the cyber revolution perils theory and statecraft

EC 521 : Cyber Security : Perils to Theory and statecraft Internationa

Part 1 (refer to Week 1 Readings in the Lessons for Week 1)
Title each response with the text of each question)

Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the Week 1 Reading List.

What are the strengths and weaknesses of each?

What is the most and lest persuasive premise, claim or rebuttal?

Conclude with a research or policy question for further research

You must utilize literature and cite properly. Use APA style.

Part 2

(Title each response with the text of each question)

Has U.S. federal government developed a robust legal, regulatory and policy framework to address cyber security challenges? Why? Why not?

Conclude with a research question or policy question for further research.

You must APA-utilize (cite, reference, list) required Week 2 Readings.

Submit both Parts as single Microsoft Word document.

week one- three articles
1. Kello, L. (2013). The meaning of the cyber revolution: Perils to theory and statecraft. International Security, Fall 2013.

2. Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security, Fall 2013.

3. Arquilla, J. (2012). Cyberwar is already upon us. Foreign Policy. March/April, 2012.

Answer:

The weakness of the article is that it has failed to explain how the hackers can be identified. It should be noted that despite strong encryption hackers still have their way since no system that 100 percent safe. Cyberwarriors need to come up with a way to recognize hackers since they cause a threat to global security especially when they hack military systems (Arquilla, 2012). Though the article has suggested measures to prevent cyberwars, the public still feels unsafe since when they systems are hacked the hackers cannot be identified and may end up losing everything. Further studies need to be done in this area to identify measures that can be used to identify hackers and prevent them from hacking the systems.

Part 2

Rollings, J. & Henning, A. C. (2009). Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations. Congressional Research Service. 

The White House (2011).The Comprehensive National Cybersecurity Initiative. Washington, D.C.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Jeremy Garcia

PageId: DOC6CC186D