The meaning the cyber revolution perils theory and statecraft
EC 521 : Cyber Security : Perils to Theory and statecraft Internationa
Part 1 (refer to Week 1 Readings in the Lessons for Week 1)
Title each response with the text of each question)
Provide an aprox. 1000-word in-depth evaluation of three articles of
your choice from the Week 1 Reading List.
What are the strengths and weaknesses of each?
What is the most and lest persuasive premise, claim or rebuttal?
Conclude with a research or policy question for further research
You must utilize literature and cite properly. Use APA style.
Part 2
(Title each response with the text of each question)
Has U.S. federal government developed a robust legal, regulatory and
policy framework to address cyber security challenges? Why? Why
not?
Conclude with a research question or policy question for further
research.
You must APA-utilize (cite, reference, list) required Week 2
Readings.
Submit both Parts as single Microsoft Word document.
week one- three articles
1. Kello, L. (2013). The meaning of the cyber revolution: Perils to
theory and statecraft. International Security, Fall 2013.
2. Gartzke, E. (2013). The myth of cyberwar: Bringing war in cyberspace
back down to earth. International Security, Fall 2013.
3. Arquilla, J. (2012). Cyberwar is already upon us. Foreign Policy.
March/April, 2012.
Answer:
The weakness of the article is that it has failed to explain how the hackers can be identified. It should be noted that despite strong encryption hackers still have their way since no system that 100 percent safe. Cyberwarriors need to come up with a way to recognize hackers since they cause a threat to global security especially when they hack military systems (Arquilla, 2012). Though the article has suggested measures to prevent cyberwars, the public still feels unsafe since when they systems are hacked the hackers cannot be identified and may end up losing everything. Further studies need to be done in this area to identify measures that can be used to identify hackers and prevent them from hacking the systems.
Part 2
Rollings, J. & Henning, A. C. (2009). Comprehensive National Cybersecurity Initiative: Legal Authorities and Policy Considerations. Congressional Research Service.
The White House (2011).The Comprehensive National Cybersecurity Initiative. Washington, D.C.