Cybersecurity and Public Policy

Verified

Added on  2020/03/23

|19
|4193
|368
AI Summary
This assignment delves into the critical relationship between cybersecurity and public policy. It examines various aspects, including the nature of cyber threats, deterrence strategies employed against them, the complexities of attribution in cyberspace, and the importance of international collaboration in addressing these challenges. The readings provided offer diverse perspectives on cybersecurity from scholars and experts in the field.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBERSPACE
Cyberspace
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBERSPACE
Table of Contents
Introduction..........................................................................................................................2
Soft power in cyber space and its use..................................................................................3
Hard power in cyber space and its use.................................................................................7
Conclusion.........................................................................................................................13
References..........................................................................................................................15
Document Page
2CYBERSPACE
Introduction
The word cyberspace refers to virtual and also may be defined as an electronic medium
that is used to make a computer network that is global to facilitate and increase online
communication1. Cyberspace is a computer network that is very big which is made of all
computer networks worldwide that employ the protocol of TCP/IP protocol to give a protection
on data exchange services and communication activities.
On the other hand, a cyber attack is exploitation of computer systems, networks, and
enterprises that are technology dependent. The computer codes that are malicious that are used to
alter the real codes of the system are done in cyber attack2. The logic of the data and the codes of
computers are changed which results in dangerous consequences which leads to cyber crime that
includes identity theft and data theft. Another name of cyber attack is Computer Network Attack
(CNA).
The study deals with the process that is followed by the states to deploy soft as well as
hard power across cyber as well as other domains of the statecraft in order to achieve national
security objectives. In addition, the paper covers the definition of soft power in cyberspace and
the time when countries use soft power in defense is explained. On contrary, the definition of
1 Hurley, John, and Lanier Watkins. "Cyberspace: The new Battlefield." In 11th International
Conference on Cyber Warfare and Security: ICCWS2016, p. 180. Academic Conferences and
publishing limited, 2016.
2 Lee, Kwang-Hoon. "The conceptualization of country attractiveness: a review of
research." International Review of Administrative Sciences 82, no. 4 (2016): 815.
Document Page
3CYBERSPACE
hardware and time period of using hardware for defending a war in cyber warfare to retaliate
cyber attack is discussed in the present study.
Soft power in cyber space and its use
Software is the ability in order to get what is wanted through attraction as well as
persuasion. In other words, soft power is a way to influence the citizens of state to get a position
that is desired via enticement, attraction and allure and also facilitation. For SPP (Soft Power
Projection) the government of a state follows public diplomacy and policies that are used in that
particular state3. The use of test messages, website and emails, especially social networking sites
and blogs that are related to content design to influence and reinforce others for a particular
reason. The true identity of the messages are obscured gives a high leverage-able asset mainly on
the international stage. The soft power capability and mindset that are followed by organizations
are increasing in amount with all having a success rate which indicates that they can mitigate the
risk of cyber attack against well-established, larger and financed opponents. This soft power is a
new course of political study and also the intelligence community that has mitigated the risk of
hard power and gives a benefit and value to the Soft Power Projection. Cyber Security is giving
protection to the network system and data4. The number of attacks increase in the areas of
3 Lindsay, Jon R. "Stuxnet and the limits of cyber warfare." Security Studies 22, no. 3 (2013):
381.
4 Davis, Paul K. "Deterrence, influence, cyber attack, and cyberwar." NYUJ Int'l L. & Pol. 47
(2014): 327.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBERSPACE
financial, military networks and government has increased cyber terrorism and made it a priority
of national security.
It is important for a state to use soft power in order to defense or offense measures for
retaliating cyber attacks. Countries use soft power to promote the ethnic war and conflict
strategically. The relations between such policies of national security and soft power have
remained unknown5. For warfare of soft power, the framework has been determined for
empirical analysis. The wars of soft power are fought in the minds and hearts of humans. The
impacts of soft power are related to national security that has intangible components and is also
most pivotal. The soft power depends on institutions, instruments of economic assistance,
cultural exchanges, ideas of propagation, democracy promotion and diplomacy and also
influence on them. Other societies are also encouraged by the United States. The soft power
technology is a low-cost, risk and returns and is used for all time. The hard power is used
whenever needed. The force used in hard power creates a problem for the state. The informal
policies of foreign for power acquisition are not given any restrictions to realm the legitimacy.
The political criminal nexus as social structure by which the state is able to transform the
organized crime those are transitional to an instrument of foreign policy. For instance, in the
Autonomous Republic of China, the minds and hearts of Crimean citizens were changed to
increase the component of soft power security of Ukraine6. Psychological warfare uses the soft
5 Duncan, Bob, Andreas Happe, and Alfred Bratterud. "Cloud Cyber Security: Finding an
Effective Approach with Unikernels." SECURITY IN COMPUTING AND
COMMUNICATIONS (2017): 31.
6 Deibert, Ronald J. "Bounding cyber power: Escalation and restraint in global
cyberspace." Organized Chaos: Reimagining the Internet (2014).
Document Page
5CYBERSPACE
power as a weapon for the power of attraction. It gives citizens to do and believe the things they
are doing. It changes the view of the citizens to see each other and the whole world. States uses
the power of soft power to have a profit in the territorial power which manipulates perceptions of
a human. The soft power even helps to promote the ethnic war and conflict strategically. The
relations between such policies of national security and soft power have remained unknown. For
warfare of soft power, the framework has been determined for empirical analysis. The wars of
soft power are fought in the minds and hearts of humans. The impacts of soft power are related
to national security that has intangible components and is also most pivotal. The informal
policies of foreign for power acquisition are not given any restrictions to realm the legitimacy.
The political criminal nexus as a social structure by which the state is able to transform the
organized crime those are transitional to an instrument of foreign policy. For instance, in the
Autonomous Republic of China, the minds and hearts of Crimean citizens were changed to
increase the component of soft power security of Ukraine. The hard powers against cyber attack
are the attack that includes inserting malware to steal the data within the cyberspace, denial of
services
The countries face cyber attacks; soft power is used to mitigate the risk that has arrived in
the country. The alternative to soft power is the hard power. The agencies of United States and
also the NGOs which have encouraged the groups of pro-democracy are in many of states such
as Iraq, China, and Egypt. They do not have a coercing aim, toppling is much less and also the
government. The purpose that comes second is to replace the regime is not coercive. The
opponent regime and the United States are also determined to change the regime. If no incentive
is given to the regime for changing its behavior, no coercive leverage is initiated by the United
Document Page
6CYBERSPACE
States. The physical resources that are created by soft power, several servers are set up and
software are designed which helps the activists of human rights to propagate the messages and
also creates the firewall of information to block the messages. Soft power initiates information
campaigns which help to change the preferences of hackers that are initially made and also
recruit the members that are related to terrorist organization7. The software standards are
implemented by soft power when the country is under cyber attack. The economic principles can
promote development as well as innovation, which causes for dominant position on the operating
systems as well as search engines market. The search engine usually attracts user for superior
performance. The Google search engine is followed by Yahoo and Bing. In this aspect, Google
search algorithms return outcomes to the particular users through indexing over trillion internet
addresses. There are more than 1000 million times a day, Google decides the thing what is vital
and what is not. For an example, China has realized this when it held dispute with the
organization. The country wanted to censor Google search results in the Chinese territory as well
as launched attacks against the infrastructure of Google. Soft power represents the behavioral
way to get the result. It is contrasted with the hard power8. There is historically predominant
realist measures of national and state power by quantitative metrics like population size and
concrete military as well as the gross domestic product of the state. However, having the
resources can not generate the desired results. On contrary, soft power has more influence and
can rest on the hard power of threats and payments. Soft power is persuasion and the ability for
7 Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in
cyberspace." Security Studies 24, no. 2 (2015): 321.
8 Inkster, Nigel. "Measuring Military Cyber Power." Survival 59, no. 4 (2017): 31.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBERSPACE
moving people through argument9. The production of soft power can be affected in positive
methods through the host of nonstate actors within as well as outside of the states. The actors
affect general people as well as governing elites in different states and create or enable an
environment for the government policies.
Hard power in cyberspace and its use
The hard power is a way which defines the ability of political body and nation which uses
the military strength and the incentives and also other behaviors are also influenced. The
approach of hard power in cyberspace is not transferable in this era. The behavior of hard power
depends on payment and coercion. The hard powers that a state can deploy are giving protection
against the denial of services and also protection hardware so that the intruder cannot insert any
type of malware in the cyberspace to steal the data. Hard Power Projection (HPP) is mainly used
in the military which deals with the application of assets of the military which includes troops,
naval vessels, aircrafts, and tanks. Hard power is produced inside then cyberspace. The hard
powers against cyber attack are the attack that includes inserting malware to steal the data within
the cyberspace, denial of services10. The hard powers that a state can deploy are giving protection
against the denial of services and also protection hardware so that the intruder cannot insert any
type of malware in the cyberspace to steal the data. The states may have a denial of service
attack by the use of botnets for many corrupted devices of Cyber Power and internet system. A
9 Rid, Thomas. Cyberwar will not take place. Oxford University Press, USA, 2013.
10 Zhang, Li. "A Chinese perspective on cyberwar." International Review of the Red Cross 94,
no. 886 (2012): 806.
Document Page
8CYBERSPACE
botnet is organized by infiltrating virus in computers that do not have protection. Botnets can be
rented from other devices with a huge amount of money. Botnets are used for extortion. The
other cases that are involved in hard power are that involvement of hactivists. The other forms
that are involved in hard power are adding malicious code to systems or to steal property that is
intellectual11. Governments may use these as a path to increase the economic resources. The
strategies that are involved in cyberspace are that it mainly focuses on the legitimacy,
relationship; building and also operating are more effective. Cyber Security is giving protection
to the network system and data. The number of attacks increases in the areas of financial,
military networks and government has increased cyber terrorism and made it a priority of
national security. There are four aspects of the operation that comes under giving protection to
national security. The four aspects are as follows: sustaining and constructing cyberspace;
freedom of action that lies in cyberspace is denied; Freedom of action is ensured within the
cyberspace, and effects are created within cyberspace in all domains. Cyberspace is a computer
network that is very big which is made of all computer networks worldwide that employ the
protocol of TCP/IP protocol to give a protection on data exchange services and communication
activities12. A cyber attack is exploitation of computer systems, networks, and enterprises that are
technology dependent. The computer codes that are malicious that are used to alter the real codes
11 Ridout, Tim. "Building a Comprehensive Strategy of Cyber Defense, Deterrence, and
Resilience." Fletcher F. World Aff. 40 (2016): 63.
12 Tor, Uri. "‘Cumulative Deterrence’as a New Paradigm for Cyber Deterrence." Journal of
Strategic Studies 40, no. 1-2 (2017): 110.
Document Page
9CYBERSPACE
of the system are done in cyber attack13. The logic of the data and the codes of computers are
changed which results in dangerous consequences which lead to cybercrime that includes
identity theft and data theft.
The countries use hard power to decrease the impact of a cyber attack that includes
inserting malware to steal the data within the cyberspace, denial of services. The hard powers
that a state can deploy are giving protection against the denial of services and also protection
hardware so that the intruder cannot insert any type of malware in the cyberspace to steal the
data. The other forms that are involved in hard power are adding malicious code to systems or to
steal property that is intellectual. Governments may use these as a path to increase the economic
resources. The strategies that are involved in cyberspace are that it mainly focuses on the
legitimacy, relationship; building and also operating are more effective. Cyber Security is giving
protection to the network system and data14. The number of attacks increasing in the areas of
financial, military networks and government has increased cyber terrorism and made it a priority
of national security15. The hard power is tedious to use. The hard power is a way which defines
13 Clark, David, Thomas Berson, and Herbert S. Lin. "At the Nexus of Cybersecurity and Public
Policy." Computer Science and Telecommunications Board, National Research Council,
Washington DC: The National Academies Press (2014).
14 Davis, Paul K. "Deterrence, influence, cyber attack, and cyberwar." NYUJ Int'l L. & Pol. 47
(2014): 327.
15 Belk, Robert, and Matthew Noyes. On the Use of Offensive Cyber Capabilities: A Policy
Analysis on Offensive US Cyber Policy. JOHN F KENNEDY SCHOOL OF GOVERNMENT
CAMBRIDGE MA, 2012.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CYBERSPACE
the ability of political body and nation which uses the military strength and the incentives and
also other behaviors are also influenced. The approach of hard power in cyberspace is not
transferable in this era. The behavior of hard power depends on payment and coercion. There are
four parts of the operation that goes by offering assurance to national security. The four
viewpoints are as per the following: 1. maintaining and building the internet; the 2. opportunity
of activity that lies on the internet is denied; 3. The flexibility of activity is guaranteed inside the
internet, and 4. impacts are made on the internet in all spaces. The capacity to reshape the
inclinations is the capacity that lies in the delicate power. The contemporary practices that
depend on group approach rely upon making arrangement benevolent and furthermore draw in
the group to accomplish the goals that are shared16. The power that originates from fascination
has been unmistakably comprehended by the government officials. Popularity based approaches
and military utilize delicate power as staple17. The inclination is that is related to resources that
are immaterial has a capacity to build up inclination, for example, culture, organizations,
political esteems and identity to expand the ethical expert and true blue18. On the off chance that
16 Carlin, John P. "Detect, Disrupt, Deter: A Whole-of-Government Approach to National
Security Cyber Threats." Harv. Nat'l Sec. J. 7 (2015): 391.
17 Lindsay, Jon R. "Tipping the scales: the attribution problem and the feasibility of deterrence
against cyberattack." Journal of Cybersecurity 1, no. 1 (2015): 66.
18 Chen, Jim, and Alan Dinerman. "On Cyber Dominance in Modern Warfare." In European
Conference on Cyber Warfare and Security, p. 52. Academic Conferences International Limited,
2016.
Document Page
11CYBERSPACE
the esteem is known to the government that the resident of the state needs to take after, at that
point, it will be taken a toll productive. Hard power is produced inside then cyberspace.
Operations are included in external forces. Hard power policy is a demonstrated in some states in
regard to war and handle the crisis in that state.
The physical military means that are needed to force the regime of the enemy for
changing the ways or to change the regimes is the work of hard power. The control over the
adversary is produced by hard power success19. The class of hard power is becoming less usable
in the United States mainly in the congested regions and the critical regions. Direct adversaries
are aimed for the hard power. The threat of the soft power is on the environmental condition. The
hard powers against cyber attack are the attack that includes inserting malware to steal the data
within the cyberspace, denial of services20. The hard powers that a state can deploy are giving
protection against the denial of services and also protection hardware so that the intruder cannot
insert any type of malware in the cyberspace to steal the data. Hard power is highly vulnerable to
cost, risk and are violent. The thing that is to be judged for the countries like the United States is
the count that soft power prevents the aggression by those antagonistic countries. The P2C is
risky and violent. Hard powers are used in countries to gain more and aggressive and offer fast
service. Hard power is the strong potential that has dividends that are healthy at moderate risk.
19 Cavaiola, Lawrence J., David C. Gompert, and Martin Libicki. "Cyber House Rules: On War,
Retaliation and Escalation." Survival 57, no. 1 (2015): 99.
20 Gompert, David C., and Hans Binnendijk. The Power to Coerce: Countering Adversaries
Without Going to War. Rand Corporation, 2016.
Document Page
12CYBERSPACE
Hard Power is seldom used and is vulnerable to risk21. Hard Power is also very much costly. In
P2C, the hard powers are generally targeted and are also not used continuously when needed.
The situation becomes more problematic by using hard power22. Hard Power is used by military
forces to coerce. The influenced regional opposition to sensitive data are faced by China and are
also increased by the influence if the United States, Iran, and Russia. Through hard power, the
ability to use economic incentives or military strengths in order to influence behaviors of other
actor is achieved23. It relies on measurement of power. Hard power strategies consist of wide
range of measures that are geared for coercing different entities into the compliance.
Conclusion
From the above discussion, it can be concluded that Digital Security is offering assurance
to the system framework and information. The quantity of assaults expanding in the regions of
money related, military systems and government has expanded digital fear mongering and made
it a need of national security. The word the internet alludes to the PC world that is virtual and
furthermore might be characterized as electronic medium that is utilized to influence a PC to
21 Nye, Joseph. 2017. "Information Warfare Versus Soft Power By Joseph S. Nye - Project
Syndicate". Project Syndicate. https://www.project-syndicate.org/commentary/cyber-warfare-
weakens-russia-soft-power-by-joseph-s--nye-2017-05?barrier=accessreg.
22 Graham, Matt. "US Cyber Force: One War Away." Military Review 96, no. 3 (2016): 111.
23 Zhao, Kejin. "China’s Rise and Its Discursive Power Strategy." Chinese Political Science
Review 1, no. 3 (2016): 554.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13CYBERSPACE
arrange that is worldwide to encourage and increment online correspondence. The internet is a
PC organizes that is huge which is made of all PC systems worldwide that utilizes the convention
of TCP/IP convention to give an assurance on information trade administrations and
correspondence exercises. A digital assault is abuse of PC frameworks, systems and undertakings
that are innovation subordinate. The PC codes that are malignant that are utilized to adjust the
genuine codes of the framework are done in digital assault. The rationale of the information and
the codes of PCs are changed which brings about risky results which prompts digital wrongdoing
that incorporates wholesale fraud and information robbery. Delicate power is an approach to
impact the nationals of state to get a position that is wanted by means of temptation, fascination
and charm and furthermore assistance. For SPP (Soft Power Projection) the legislature of a state
takes after open strategy and arrangements that are utilized as a part of that specific state. The
utilization of test messages, site and messages, particularly long range informal communication
destinations and web journals that are identified with content outline to impact and fortify others
for a specific reason. Hard Power Projection (HPP) is principally utilized as a part of military
which manages the utilization of benefits of military which incorporates troops, maritime
vessels, air ships and tanks. The hard power is a way which characterizes the capacity of political
body and country which utilizes the military quality and the motivators and furthermore different
practices are additionally impacted. This study comprises of the reason the need of delicate
power and hard power in a nation to ensure the area of the internet and spare the goals of
national security. Delicate Power offers residents to do and trust the things they are doing. It
changes the perspective of the subjects to see each other and the entire world. States utilizes the
energy of delicate energy to have a benefit in the regional power which controls view of human.
The hard powers against digital assault are the assault that incorporates embed malware to take
Document Page
14CYBERSPACE
the information inside the internet, foreswearing of administrations. The hard powers that a state
can send are giving assurance against the refusal of administrations and furthermore security
equipment so the gatecrasher can't embed any sort of malware in the internet to take the
information. This additionally gives a detailed meaning of the Soft Power and Hard Power and
furthermore demonstrates the time when the nations need to execute Soft Power and hard Power
to have resistance against the digital assault to give a national security to their state.
Document Page
15CYBERSPACE
References
Belk, Robert, and Matthew Noyes. On the Use of Offensive Cyber Capabilities: A Policy
Analysis on Offensive US Cyber Policy. JOHN F KENNEDY SCHOOL OF GOVERNMENT
CAMBRIDGE MA, 2012.
Carlin, John P. "Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security
Cyber Threats." Harv. Nat'l Sec. J. 7 (2015): 391.
Cavaiola, Lawrence J., David C. Gompert, and Martin Libicki. "Cyber House Rules: On War,
Retaliation and Escalation." Survival 57, no. 1 (2015): 99.
Chen, Jim, and Alan Dinerman. "On Cyber Dominance in Modern Warfare." In European
Conference on Cyber Warfare and Security, p. 52. Academic Conferences International Limited,
2016.
Clark, David, Thomas Berson, and Herbert S. Lin. "At the Nexus of Cybersecurity and Public
Policy." Computer Science and Telecommunications Board, National Research Council,
Washington DC: The National Academies Press (2014).
Davis, Paul K. "Deterrence, influence, cyber attack, and cyberwar." NYUJ Int'l L. & Pol. 47
(2014): 327.
Deibert, Ronald J. "Bounding cyber power: Escalation and restraint in global
cyberspace." Organized Chaos: Reimagining the Internet (2014).
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16CYBERSPACE
Duncan, Bob, Andreas Happe, and Alfred Bratterud. "Cloud Cyber Security: Finding an
Effective Approach with Unikernels." SECURITY IN COMPUTING AND
COMMUNICATIONS (2017): 31.
Gartzke, Erik, and Jon R. Lindsay. "Weaving tangled webs: offense, defense, and deception in
cyberspace." Security Studies 24, no. 2 (2015): 321.
Gompert, David C., and Hans Binnendijk. The Power to Coerce: Countering Adversaries
Without Going to War. Rand Corporation, 2016.
Graham, Matt. "US Cyber Force: One War Away." Military Review 96, no. 3 (2016): 111.
Hurley, John, and Lanier Watkins. "Cyberspace: The new Battlefield." In 11th International
Conference on Cyber Warfare and Security: ICCWS2016, p. 180. Academic Conferences and
publishing limited, 2016.
Inkster, Nigel. "Measuring Military Cyber Power." Survival 59, no. 4 (2017): 31.
Lee, Kwang-Hoon. "The conceptualization of country attractiveness: a review of
research." International Review of Administrative Sciences 82, no. 4 (2016): 815.
Lindsay, Jon R. "Stuxnet and the limits of cyber warfare." Security Studies 22, no. 3 (2013): 381.
Lindsay, Jon R. "Tipping the scales: the attribution problem and the feasibility of deterrence
against cyberattack." Journal of Cybersecurity 1, no. 1 (2015): 66.
Nye, Joseph. 2017. "Information Warfare Versus Soft Power By Joseph S. Nye - Project
Syndicate". Project Syndicate. https://www.project-syndicate.org/commentary/cyber-warfare-
weakens-russia-soft-power-by-joseph-s--nye-2017-05?barrier=accessreg.
Document Page
17CYBERSPACE
Rid, Thomas. Cyber war will not take place. Oxford University Press, USA, 2013.
Ridout, Tim. "Building a Comprehensive Strategy of Cyber Defense, Deterrence, and
Resilience." Fletcher F. World Aff. 40 (2016): 63.
Tor, Uri. "‘Cumulative Deterrence’as a New Paradigm for Cyber Deterrence." Journal of
Strategic Studies 40, no. 1-2 (2017): 110.
Zhang, Li. "A Chinese perspective on cyber war." International Review of the Red Cross 94, no.
886 (2012): 806.
Zhao, Kejin. "China’s Rise and Its Discursive Power Strategy." Chinese Political Science
Review 1, no. 3 (2016): 554.
Document Page
18CYBERSPACE
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]