SELECTING A TOPIC Selecting a Topic Dr. Irvin Heard University of the Cumberlands Running head: SELECTING A TOPIC Running head: SELECTING A TOPIC Abstract You have read several journal articles….
Designing Cyberwarfare Defense Strategies
Topic 2: Designing Cyberwarfare Defense Strategies
As noted in Theohary and Rollins (2015), trying to define what cyberwarfare actually is can be quite difficult. A large part of the problem in defining what constitutes cyberwarfare is the range of threat actors that engage in various cyberwarfare activities. Given a similar outcome of disruption either to a national government or a country’s infrastructure, discuss what differences there may be in defensive strategies that would depend on different threat actors. Consider the different motivations of different threat actors and how motivation might inform a particular defensive strategy.
Theohary, C., & Rollins, J. (2015, March 15). Cyberwarfare and cyberterrorism: In brief. Retrieved from http://fas.org/sgp/crs/natsec/R43955.pdf