Topic 2: Designing Cyberwarfare Defense Strategies

As noted in Theohary and Rollins (2015), trying to define what cyberwarfare actually is can be quite difficult. A large part of the problem in defining what constitutes cyberwarfare is the range of threat actors that engage in various cyberwarfare activities. Given a similar outcome of disruption either to a national government or a country’s infrastructure, discuss what differences there may be in defensive strategies that would depend on different threat actors. Consider the different motivations of different threat actors and how motivation might inform a particular defensive strategy.

Theohary, C., & Rollins, J. (2015, March 15). Cyberwarfare and cyberterrorism: In brief. Retrieved from http://fas.org/sgp/crs/natsec/R43955.pdf

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!