Question 1. The United States has taken the position that the acceptability of c
ID: 3724549 • Letter: Q
Question
Question 1.
The United States has taken the position that the acceptability of cyber espionage
depends upon the motivation of the espionage and what is done with the stolen information. This
is most obvious in the United States position towards China's espionage activities.
What does the United States believe is an appropriate motivation for espionage, and what is
inappropriate? Your answer must include an example of a cyberattack between nations that we
read about this quarter that had appropriate motivation and one with inappropriate motivation.
Question 2.
You are in charge of IT for an electric utility. The CEO of the company suggests
disconnecting the company's computer network from the internet so that you don't have to worry
about all of that “cybersecurity stuff”.
Respond to the CEO by saying why the suggestion of creating an “air gap” is not sufficient to
protect your network against cyberattacks. In your response, describe one cyberattack that we
learned about this quarter where the target was not connected to the internet.
Question 3.
Explain whether you believe the following statement to be true, and why or why not?
Countries are unlikely to attack the United States in cyberspace because they fear that the United
States will retaliate with cyberattacks against them.
You must justify your answer by referring to topics covered in the class, you can't just base your
answers on general beliefs like “other countries fear (or do not fear) the US”.
Question 4.
You have been hired by President Trump as a cybersecurity advisor. Write an essay
proposing what you believe is the most important action/policy/law he should pursue to improve
cybersecurity in the United States.
Your essay must include the following:
•A description of the proposal.
•What effect would implementing the proposal have – how would it improve cybersecurity?
•Which of the three elements of deterrence is the proposal most closely related to?
•Identify at least one cyberattack we have read about this quarter where the proposal
would make the attack less likely to occur, and explain why.
Please do not inject political commentary in your answer, what you write should be the same
regardless of who actually won the election.
Explanation / Answer
Question1:
corporate spying or corporate espionage is a form ofespionage conducted for commercialpurposes instead of purely national security. The United States government currently has a polygraph examination entitled the "Test of Espionage and Sabotage" (TES), contributing to the increasingly popular, though not consensus, notion, by those studying espionage and sabotage countermeasures, of the interrelationship between the two.
The United States on Monday charged five Chinese military officers and accused them of hacking into American nuclear, metal and solar companies to steal trade secrets, ratcheting up tensions between the two world powers over cyber espionage.
China immediately denied the charges, saying in a strongly worded Foreign Ministry statement the U.S. grand jury indictment was "made up" and would damage trust between the two nations
Titan Rain, which began in 2003, refers to the wave of attacks on United States defense networks that targeted confidential national security information. No data has been reported stolen yet, but the attack is considered one of the largest in the history of cyber espionage. The Titan Rain attacks are considered particularly dangerous because an attack can be completed in only 20 minutes and in a single day it was able to target high-profile targets such as NASA, the US Army Information Systems Engineering Command, the Defense Information Systems Agency, the Naval Ocean Systems Center, and the US Army Space and Strategic Defense Installation. cyber disputes of late are settled through court. In the case of the United States-China dispute, for example, the United States has been training lawyers to handle international cyber-attack cases as part of its counter-espionage strategy. The United States and China have increased talks between them but little has been accomplished so far.
Question: 2
I would still worry about the cyber security stuff because of following two reasons:
1. Cyber Security Issues with External HardDisk as well as From Usb Drive: Although we have disconnected the computer systesm from the internet but still there are possibilities that our computer systems get effected from various malicious code as well as have security issue. If computers usb ports are open then in that condition if any external harddisk or a usb pendrive having virus's or malicious code is connected to the system then it can harm the computer as well as its a thread in security as well.
2. Cyber Security Issue with Local Lan Network: Although we have detached the computer systems from the internet, still there are possibilities that our local area network gets infected by the virus's or the malicious code, in that case also it can harm all the computers with in that local area network and it can cyber security issue too.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.