logo

Assignment on Cyberspace

   

Added on  2020-03-23

19 Pages4193 Words368 Views
Running head: CYBERSPACECyberspaceName of the Student:Name of the University:Author note:

1CYBERSPACETable of ContentsIntroduction..........................................................................................................................2Soft power in cyber space and its use..................................................................................3Hard power in cyber space and its use.................................................................................7Conclusion.........................................................................................................................13References..........................................................................................................................15

2CYBERSPACEIntroductionThe word cyberspace refers to virtual and also may be defined as an electronic mediumthat is used to make a computer network that is global to facilitate and increase onlinecommunication1. Cyberspace is a computer network that is very big which is made of allcomputer networks worldwide that employ the protocol of TCP/IP protocol to give a protectionon data exchange services and communication activities.On the other hand, a cyber attack is exploitation of computer systems, networks, andenterprises that are technology dependent. The computer codes that are malicious that are used toalter the real codes of the system are done in cyber attack2. The logic of the data and the codes ofcomputers are changed which results in dangerous consequences which leads to cyber crime thatincludes identity theft and data theft. Another name of cyber attack is Computer Network Attack(CNA).The study deals with the process that is followed by the states to deploy soft as well ashard power across cyber as well as other domains of the statecraft in order to achieve nationalsecurity objectives. In addition, the paper covers the definition of soft power in cyberspace andthe time when countries use soft power in defense is explained. On contrary, the definition of1Hurley, John, and Lanier Watkins. "Cyberspace: The new Battlefield." In11th InternationalConference on Cyber Warfare and Security: ICCWS2016, p. 180. Academic Conferences andpublishing limited, 2016.2Lee, Kwang-Hoon. "The conceptualization of country attractiveness: a review ofresearch."International Review of Administrative Sciences82, no. 4 (2016): 815.

3CYBERSPACEhardware and time period of using hardware for defending a war in cyber warfare to retaliatecyber attack is discussed in the present study. Soft power in cyber space and its useSoftware is the ability in order to get what is wanted through attraction as well aspersuasion. In other words, soft power is a way to influence the citizens of state to get a positionthat is desired via enticement, attraction and allure and also facilitation. For SPP (Soft PowerProjection) the government of a state follows public diplomacy and policies that are used in thatparticular state3. The use of test messages, website and emails, especially social networking sitesand blogs that are related to content design to influence and reinforce others for a particularreason. The true identity of the messages are obscured gives a high leverage-able asset mainly onthe international stage. The soft power capability and mindset that are followed by organizationsare increasing in amount with all having a success rate which indicates that they can mitigate therisk of cyber attack against well-established, larger and financed opponents. This soft power is anew course of political study and also the intelligence community that has mitigated the risk ofhard power and gives a benefit and value to the Soft Power Projection. Cyber Security is givingprotection to the network system and data4. The number of attacks increase in the areas of3Lindsay, Jon R. "Stuxnet and the limits of cyber warfare."Security Studies22, no. 3 (2013):381.4Davis, Paul K. "Deterrence, influence, cyber attack, and cyberwar."NYUJ Int'l L. & Pol.47(2014): 327.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Analyst, Policy, and Recommendations for Skyward Co
|10
|1963
|53

Cybersecurity in Banks: Contemporary Issues in Business
|21
|7343
|214

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Cyber Security and Resilience: A Report for the Board of the Company
|10
|3070
|72

The Business of Intelligence
|7
|1184
|365

Cyber Security and Cyber Resilience: A Board of Directors' Guide
|9
|2583
|350