Expert answer:Cyber Attack Questions

  

Solved by verified expert:CLLASIFICATION UNCLASSIFIED PART 1Respond to the questionQuestion: The threat posed by cyber actors is significant and growing. Do you agree with the Director of National Intelligence that Cyber issues have become as important as terrorism as an intelligence priority?Please provide reasons why / examples and scenarios SourceReveron, Derek S. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, Edited by Derek S. Reverson. Washington, DC: Georgetown University Press, 2012. (Chapter 4). Pages 57-71.Singer, Peter.W., “The Cyber Terror Bogeyman,” The Brookings Institute (November 1, 2012). pp. 1-4. Accessed at: https://www.brookings.edu/articles/the-cyber-terror-bogeyman/:Symantec. Internet Security Threat Report (ISTR), 2019. pp.1-61. Click here.U.S. Government. Office of the Director of National Intelligence (ODNI), “U.S. Intelligence Community: Worldwide Threat Assessment” Statement for the Record, January 29, 2019 (see section on Cyber). pp. 5-7. Click here.U.S. Government. Office of the National Counterintelligence Executive. Foreign Spies Stealing US Economic Secrets in Cyberspace (October 2013). PagesPART 2Respond to the attached post in 300 wordsSee attachment CLASSIFICATION UNCLASSIFIED
nickolay_post.docx

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Expert answer:Cyber Attack Questions
Just from $10/Page
Order Essay

Nikolay Petukhov
New! Cyber Threats
Nikolay Petukhov(Jun 3, 2019 3:35 AM) – Read by: 3
Mark as ReadReply to This Message Reply
I absolutely agree with the Director of National Intelligence that cyber issues have become as important as
terrorism, if not more. As James Clapper once said, “A lot of people find this surprising in our post-9/11 world but in
2013 ‘cyber’ bumped ‘terrorism’ out of the top spot on our list of national threats, and cyber has led our report
every year since then.”(Boyd, 2016). In my personal opinion, the roles of cyber defense and cyber operations will
only continue to grow, considering how quickly the technology changes nowadays. We face sophisticated cyber
threats from foreign intelligence agencies, hackers for hire, organized crime syndicates, and terrorists and these
threat actors constantly seek to access and steal our nation’s classified information, trade secrets, technology, and
ideas?all of which are of great importance to our national and economic security (Wray, 2017). With the
widespread distribution of social media, terrorists can spot, assess, recruit, and radicalize vulnerable persons of all
ages in the United States either to travel or to conduct a homeland attack. Through the Internet, terrorists overseas
now have direct access into our local communities to target and recruit our citizens and spread the message of
radicalization faster than we imagined just a few years ago (Wray, 2017).
As it was mentioned in the Statement before the Senate Homeland Security and Government Affairs Committee by
the Director of the FBI, many foreign terrorist organizations use various digital communication platforms to reach
individuals they believe may be susceptible and sympathetic to extremist messages, however, no group has been as
successful at drawing people into its perverse ideology as ISIS and it has proven dangerously competent at
employing such tools for its nefarious strategy (Wray, 2017). ISIS uses high-quality, traditional media platforms, as
well as widespread social media campaigns to propagate its extremist ideology. They are also good at using secure
messaging platforms with strong encryption for their recruitment efforts. The exploitation of encrypted platforms
presents serious challenges to law enforcement’s ability to identify, investigate, and disrupt threats that range from
counterterrorism to child exploitation, gangs, drug traffickers and white-collar crimes (Wray, 2017).
So, what can we do counter all these threats? Well, we can increase cybersecurity funding and spend more money
on better training for IT security personnel. We also need to educate the end-users, because more often than not,
they are the weakest link. Ultimately, top-to-bottom commitment and buy-in to a greater purpose is vital. If
government agencies want to make a dent in their cybersecurity shortcomings, it is imperative that they employ
awareness campaigns demonstrating the clear value that heightened security brings to each individual person, not
just the organization. Without the end-users buy-in, it will be hard to address these issues and be successful in
combating online radicalization and recruitment campaigns, spread of disinformation, political hacktivism, and
much more.
Boyd A. (2016). DNI Clapper: Cyber bigger threat than terrorism. Retrieved
fromhttps://www.federaltimes.com/management/2016/02/04/dni-clapper-cyber-bigger-threat-than-terrorism/
Wray C. (2017). Statement before the Senate Homeland Security and Government Affairs Committee Washington,
D.C. Retrieved fromhttps://www.fbi.gov/news/testimony/current-threats-to-the-homeland

Purchase answer to see full
attachment

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 30% with the discount code ESSAYSHELP