+44 (0) 123 456 789

How the United States is preparing defensively to counter cyber-attacks? Discuss.

Andress, Jason, and Steve Winterfeld. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. Syngress Publishing, 2011. APUS Online Library Chapter 12

Bryan Krekel, “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation”, prepared by Northrop Grumman for The US-China Economic and Security Review Commission, Oct. 2009. Click here to read.

Timothy L. Thomas, “Google Confronts China’s “Three Warfares”,” U.S. Army War College Parameters (Summer 2010). Click here to read.

{C}{C}{C}Thornbaugh, “The Invasion of the Chinese Cyberspies,” Time, August 29, 2005, http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html

Larry Wortzel, “China’s Approach to Cyber Operations: Implications for the United States”, Testimony before the Committee on Foreign Affairs House of Representatives, Mar. 10, 2010. Click here to read.

Watch:

“Chinese State Media Reveals PLA’s Cyber Attack Efforts” http://www.youtube.com/watch?v=IoCoVTwBr1E

Instructions:

This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives. The assignment rubric is included for your review. Grading will be based on the rubric. Make sure you follow the Turabian writing style guide (cover page, page numbering, double space, headings/subheadings, etc). Upload both papers for grading. Each essay should be 3 pages in length, not counting the cover page or bibliography. The exclusive use of required texts and readings from this course is mandatory.

Essay Question #1: Select one of the studies presented in Case Studies I (Week 6 Lesson) or Case Studies II (Week 7 Lesson) or another case of your choosing with instructor approval. Write an analysis paper providing more details of the attack, to include the following:

a. Victim, attacker, and probable motivation for the attack.

b. Nature and sophistication of the attack.

c. What was the desired outcome of the attack?

d. How successful was it?

e. How effective were the attackers in covering their tracks?

f. How did the victim respond?

Essay Question #2: Discuss the future of cyber warfare. Include the following as part of your discussion:

a. How future wars will be fought.

b. How ethical is cyber warfare?

c. How the United States is preparing defensively to counter cyber-attacks?

d. What is next?

Additional Resources

“The Dark Visitor – Inside the World of Chinese Hackers”. Former Army Intelligence Officer Scott Henderson’s site tracking PRC cyber activities http://www.thedarkvisitor.com/

Center for Strategic and International Studies Selected Bibliography for Cyber Security. Click here to read.

[order_calculator]

Page Navigation