This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Responses DB 5 DSS

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Responses DB 5 DSS

Hello Jose, you have provided a good discussion on the two 2018 cyber strategies by DOD and the National government. Basing on the objective sit is clear that the 2018 Cyber strategy is concerned with defending the United States’ critical infrastructure to help in preventing the impacts that can be caused by cyber-attacks aimed at compromising the critical infrastructure. The move shows that DOD is aware of adversaries’ capability to cause chaos and disrupt operations in the country using malicious software. Malicious software forms a popular agent used by adversaries to conduct their operations. DOD’s 2018 cyber strategy aims to partner with other countries to help eliminate the potential harm of malicious software. The 2018 National cyber strategy is concerned with preventing the united states against cybercrimes. It is important to note that the strategy recognizes the interconnectivity of American networks and systems, which can bring negative impacts if access by cybercriminals. The internet is an excellent platform that enhances effective service delivery; the cyber tools must be used for enhancing good in society rather than causing harm. The establishment of the National strategy ensures that individuals who are found indulging in cybercrime are held accountable and punished by law.

Hello Shelby, I agree with you that the 2018 DOD and National cyber strategies highlight the vulnerabilities of the united states cyberspace. The fact that adversaries have been successful in more than one occasion shows that the country has not invested adequately in ensuring cyberspace’s security. You have highlighted the importance of internet governance as supported by the National cyber strategy. Through internet governance, appropriate policies will be established to punish cybercriminals and instill accountability among internet users in the United States. The lack of internet oversight has allowed most activities to be done in cyberspace that compromises the United States’ standards. The attackers invest in cyberspace anonymity to conduct cyber-attacks and leave the United States in a state of confusion on how to punish potential suspects. The National security strategy gives the authority to the law enforcement officers to apprehend and prosecute individuals found in engaging in cybercrime. The DOD strategy recognizes the need for the United States to partner with other countries to prevent cyber warfare. The united states DOD needs to ensure that they allocate adequate resources to recruit cybersecurity experts and acquire tools to help in retaliating to hackers who compromise the United States networks and systems.

Hello David, you have highlighted the various strategies recommended by DOD and National security in dealing with cyber threats. The DOD suggests the use of a defend forward strategy to help in dealing with cyber-attacks. The approach suggests that the United States will stud and identify vulnerabilities in the cyberspace of adversaries to help in warning the adversaries not to launch an attack on the United space Cyberspace or risk being attacked too. The strategy is similar to the deployment of military personnel in identified countries to help deal with the terrorists while still at their homeland. You have highlighted how the DOD strategy is concerned with the three tenets as a response to the continuous cyber-attacks. By identifying qualified personnel, it will be possible to gather intelligence, prepare the battlefield, and defend forwards to prevent future attacks on the United States citizens.  The DOD cyber strategy is meant to send a clear message to adversaries that they have dedicated their resources and efforts in tackling cyberspace issues. The united states government has realized that adequate policies and dedication are essential in dealing with cybercrime and cyber warfare.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask