Should the attack be considered a crime or act of war

Assignment Help Other Subject
Reference no: EM131381108

Cyber security

I am looking to buy the paper below if you have it, I don't have time for someone to work on it. I will buy and a edit it myself

Please read

A recent cyber attack occurred where a botnet type attack targeted a major US defense firm. No physical damage occurred to the firm's network, but significant technological secrets about a new surveillance and targeting system from the firm, Defense Applications International (DAI), appear to have been compromised. Incidental, but nonetheless as a result of the attack, the virus also infected a software program that DAI was testing at electrical plant in Pennsylvania. The plant had to be shut down for 12 hours while repairs were made. The NSA believes it has credible evidence that the attack had a direct connection to the elite cyber unit Department 2112, of the country of Redistan, an adversary of the United States, although the attack itself appears to include private citizens of Redistan. The attack however, was routed through several third countries including Bluelandia, an ally of the United States.

You are a new cyber desk officer working for the National Security Council. The Deputy National Security Advisor has asked you to write an eight page memorandum addressing key issues of cyber policy. In the memorandum you have been asked to address the following issues:

1) Based off of the facts we know, should the attack be considered a crime, espionage or act of war? What should the US response be? How can the US best defend itself from future attacks such as the one that just occurred?

2) Should the United States assign US Cyber Command with the responsibility of protecting certain private companies and if so what should the general standard be for determining what companies the government should be responsible for defending.

3) Should the United States lead the effort at an international cyber agreement? Why or why not? What challenges would the President face in trying to get an agreement? Are there any alternatives?

4) Are there any substantive changes that should be made to our current US cyber policy?

Reference no: EM131381108

Questions Cloud

How did us foreign-policy develop during the 1816-1850 time : How did US foreign-policy develop during the 1816-1850 time perio? What was the impact of interactions with other nations?
Catastrophe in bangladesh : As a consumer, do you play any part in the catastrophe in Bangladesh? Is your behavior as a consumer ethical when you shop at Wal-Mart?
What are the cpt codes : Mrs. Edison and management of her diabetes. The doctor then called the patient to discuss the diet changes and decided to bill for the telephone call with the patient. The call length is 24 minutes. What are the CPT codes.
Risk management plan occurs : The creation of the risk management plan occurs in the planning stage before the project actually begins. However, what happens to this plan once the project starts? Should it be revisited from time to time? Why or why not?
Should the attack be considered a crime or act of war : Based off of the facts we know, should the attack be considered a crime, espionage or act of war? What should the US response be? How can the US best defend itself from future attacks such as the one that just occurred?
New employees of appropriate and inappropriate : Create an medical office policy for new employees of appropriate and inappropriate uses of the Internet when at work. This includes both office computers and personal cell phones. Are there allowances for breaks?
Characteristics of a learning organisation : Q1. List 10 of the characteristics of a learning organisation Q2. Outline how discrimination legislation applied to performance management. Provide examples (200-250 words)
How emerging technologies can be used to save lives : For this Discussion, consider how emerging technologies, such as emergency alert systems and risk-modeling techniques, can be used to save lives and reduce damages.
Evaluation plan for accountable care organization formation : You are a health care administrator for a large community hospital in an urban market. Your hospital has already made substantial investments in health information technology and physician participation. In response to health care reform, several ..

Reviews

Write a Review

Other Subject Questions & Answers

  Evaluate the utilities of the new information system

Part A: Your systems analysis team is close to completing a system for Meecham Feeds. Roger is quite confident that the programs that he has written for Meecham's inventory system will perform as necessary, because they are similar to programs he has..

  Document a strategic plan for a service

Document a strategic plan for a service, with contingencies for implementation. Identify and apply criteria to critically analyse and evaluate a plan.

  Examine us foreign policy and clandestine activities

The dirty wars in Latin America offer an opportunity to understand the "darker side" of US foreign policy. Pick one of the following case studies: El Salvador, Honduras, Argentina, and critically examine US foreign policy and clandestine activitie..

  The components of DSS

The components of a DSS are the-database, data query language, and user interface. data visualization tools, software, and graphics capabilities.

  Organizational structure communication methods

What is the importance of these communication methods within this organizational structure?

  What have been experiences of racial group throughout us

use at least one concept or theory from the internet and one concept or theory from our text when completing this

  What is one important distinction-boston tea party

What is one important distinction you could not overlook making when critically evaluating the information provided in these materials about the Boston Tea Party? Clarify the importance of that distinction.

  Bibliography provides the publication details

I need A good annotated bibliography provides the publication details, describes the key points of the source, uncovers controversies introduced by the source, and evaluates the merits of the source.

  Explain the null hypothesis

Address the following items in 2-3 slides - explain the null hypothesis

  Trivialize the actions of killers

Imagine such a game (video games?. What do you think of this game? Is it insensitive, does it trivialize the actions of killers or would it serve as a prodrome to those who play it, urging them to heed warning signs? How could an online game about..

  Find a balance between treating animals

Explain if, and how, you think humans can find a balance between treating animals ethically while also raising them for food and for other reasons, such as the testing of pharmaceuticals.

  Control in an experimental situation involves

Control in an experimental situation involves?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd