Limited-time discount for students! | Solutions starting at $6 each

Cyber Policies of the United States Assignment PDF

Added on - 17 Jun 2021

  • 8


  • 1831


  • 46


  • 0


Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 3 of 8 pages
Running Head:CYBER POLICIES OF THE UNITED STATES1Cyber Policies of the United States and Other NationsInstitutionDateNameAssess the importance of cyber to US national security.
2CYBER POLICIES OF THE UNITED STATESThe United States government has no greater responsibility than protecting theAmerican people. This does not mean just protecting our borders (our obligations donot end at our borders), it goes a long way into far much other elements includingPreventing the Spread and Use of Weapons of Mass Destruction, Combating thePersistent Threat of Terrorism, Confronting Climate Change and most importantlyensuring that all government and citizen data whether public or private is kept secureat all times (Mead,2018).The Internet has turned into a center point of individual, political and businessaction, and also an essentially imperative medium for money related and scholarlytransactions. It should come as nothing unexpected, subsequently, that criminalenthusiasm for the Internet has grown accordingly. With the ability to transmit a fewhundred billion dollars of monetary esteem by means of the Internet framework andother IT frameworks consistently, the digital business in the US has turned into anenticing and lucrative focus for the cutting edge criminal ventures. It is importanttherefore for the government to implement strategies and policies that ensure thesecurity of federal institutions together with all her citizens (Song,Fink & Jeschke,2017).Distinguish acts of cyber crime, cyber espionage, cyber terrorism andcyberwar.Cyber terorism refers to the attacks that are computer generated and have a mainam of targeting computers in the cyberspace or the data that other computers in the
3CYBER POLICIES OF THE UNITED STATEScyber space contain. Cyber-terrorism happens exclusively in the cyberspace just likehacktivism and cyber-warfare(Kenney, 2015).Cyber-warfare on the other hand alludes to hostile PC attacks that try to harm orcrush foes' systems and foundations or deflect them from pursuing digital assaults oftheir own. Like traditional fighting, digital fighting is instrumental: belligerents try toforce their will on their foes by assaulting them in quest for some political objectiveor goal. However, as opposed to customary fighting, digital fighting happens only inthe over the web. Activities that physically decimate virtual systems by bombardingPC servers or media communications links are a type of customary fighting, notdigital fighting (Kenney, 2015).Cyber crime alludes to hostile PC attacks that try to harm or demolish foes'systems and frameworks or hinder them from pursuing digital assaults of their own.Like customary fighting, digital warfare is instrumental, in that; belligerents look toforce their will on their adversaries by assaulting them in quest for some politicalobjective or target. However, as opposed to customary fighting, digital warfarehappens only in the cyberspace. Those activities that physically pulverize virtualsystems by shelling PC servers or broadcast communications links are a type ofcustomary fighting, not digital warfare (Herrera, Ron& Rabadão,2017).Cyber espionage is known to be the utilization of computer networks for gainingillicit access to confidential information that is especially owned or held by the federalgovernment or any other organization for that matter. In a nutshell, this is the theft ofsecrets stored in digital formats or on computers and IT networks.
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document