First role is cyber security governance and practices. - Essay Prowess

First role is cyber security governance and practices.


Kindly ADD this product to cart at only $5


Respond with 150 word

My post :

Forum Post   Hint: swipe through items ↔ NEW ALL Military Role of Defending Computer Networks You | 4 days ago | 685 words

The world has experience a lot of transformation through the emergence of sophisticated information systems. However, this has also resulted to new major challenges for governments. The traditional security framework existing in most modern states does not accommodate cyber threats. Thus, law enforcement has evolved to protect citizens from such threats within the society with the military primarily evolving to protect citizens from external threats. In many cases, cyber threats arise from overseas which makes it hard for the law enforcement to punish them hence, this warrants a military response. Therefore, the military plays a significant role in defending computer networks and cyberspace as explained below.   The military is involved in various ways in defending the cyberspace, computer networks as well as carrying out offensive attacks. First role is cyber security governance and practices. This involves collaborating and enacting policies that govern cyber security by standardizing operation procedures in cyberspace enhancing better control of classified networks. This is mostly applied in diplomacy, law enforcement, crucial-war fighting, counter terrorism and intelligence and operations of homeland security. Second is cyber threat research and warning by collaboratively researching the state of and emerging cyber threat and developing appropriate policies and governance of cybersecurity for addressing them (Rawlings, 2014). Another role is developing cyber security measures and implementation as well as testing of new technologies against cyber threats. Lastly, the military plays a role in cyber security training and awareness as a result of the massive resources invested in new technologies. For this reason, it requires people with the right skills and knowledge to implement the technologies that will bring the difference while achieving mission success (Dieterle, 2013).   With respect to the role of the military in defending cyberspace and computer networks is associated with a number of issues. Generally, there is undoubted attraction to using the military in the role of defending cyberspace since they have the features that every government would want in an effective cyber defense force. Military has cyber capability that can both support fighting in battlefield as well as defending their own systems during times of peace (Lynn & William, 2010). The military is known to provide the national signal intelligence of the nation as well as the information underpinning the most technical and sophisticated cyber operations. lastly, the military is better resourced compared to other arms of government.   The military cannot be the only one carrying out this role in the United States government. This is because the responsibilities associated with protecting offensive attacks and critical Information Technology jobs are many and so demanding and the total tasks are larger than the army. Therefore, other entities should be involved to enable split of the IT jobs among the different organizations. For example, the military could install various software and leave them for the organizations to run. Secondly, there is need to prevent the overuse of the military that could become so challenging. Leaving this role to the military could cause crowding-out effect due to the high rate of proliferation of the cyber threats as a result of increased use of information system. Hence, the discipline of cyber security will require the attention of every person and organization.   The other entities can contribute in the defending computer networks and offensive attacks in a number of ways. They include harmonizing technology, processes and people so as to increase resilience in the confrontation of cyber-attack or offensive breach, transfer of risk through using corporate risk strategies that leverage cyber insurance to ensure operational integrity of the business, defend corporate value and ensure privacy of customer data, and sharing information associated with the threat (Lynn & William, 2010).   References  Dieterle, D. (2013). Chinese hackers steal designs for top US Military Tech – Now What.  Cyber Arms – Computer Security.  Lynn III & William J. (2010). Defending a new domain. Foreign Affairs, 89(5), 97-108.  Rawlings, P. (2014). Survey: Cyber security tops IA compliance agenda. Business Source  Complete.   

Reply from professor :

Re: Military Role of Defending Computer Networks Herbert Kemp | 20 hours ago | 64 words 

You certainly make a key point here — while the military has a role to play, this really is a whole of government requirement. Moreover, most of the nation’s critical data moves on non-government networks that are beyond the purview of DoD, hence the need to non-government network security measures as well. Are there additional partnering arrangements that would be beneficial?

Are there additional partnering arrangements that would be beneficial?  

Response arond 150 word

Reply  to professor : 

…………………………………………….150 word