Notice: Trying to access array offset on value of type bool in /home/flixwrit/domains/ on line 2421
Expert answer:Cyber Attack Questions - Ray writers

Solved by verified expert:CLLASIFICATION UNCLASSIFIED PART 1Respond to the questionQuestion: The threat posed by cyber actors is significant and growing. Do you agree with the Director of National Intelligence that Cyber issues have become as important as terrorism as an intelligence priority?Please provide reasons why / examples and scenarios SourceReveron, Derek S. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, Edited by Derek S. Reverson. Washington, DC: Georgetown University Press, 2012. (Chapter 4). Pages 57-71.Singer, Peter.W., “The Cyber Terror Bogeyman,” The Brookings Institute (November 1, 2012). pp. 1-4. Accessed at: Internet Security Threat Report (ISTR), 2019. pp.1-61. Click here.U.S. Government. Office of the Director of National Intelligence (ODNI), “U.S. Intelligence Community: Worldwide Threat Assessment” Statement for the Record, January 29, 2019 (see section on Cyber). pp. 5-7. Click here.U.S. Government. Office of the National Counterintelligence Executive. Foreign Spies Stealing US Economic Secrets in Cyberspace (October 2013). PagesPART 2Respond to the attached post in 300 wordsSee attachment CLASSIFICATION UNCLASSIFIED

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Expert answer:Cyber Attack Questions
Just from $10/Page
Order Essay

Nikolay Petukhov
New! Cyber Threats
Nikolay Petukhov(Jun 3, 2019 3:35 AM) – Read by: 3
Mark as ReadReply to This Message Reply
I absolutely agree with the Director of National Intelligence that cyber issues have become as important as
terrorism, if not more. As James Clapper once said, “A lot of people find this surprising in our post-9/11 world but in
2013 ‘cyber’ bumped ‘terrorism’ out of the top spot on our list of national threats, and cyber has led our report
every year since then.”(Boyd, 2016). In my personal opinion, the roles of cyber defense and cyber operations will
only continue to grow, considering how quickly the technology changes nowadays. We face sophisticated cyber
threats from foreign intelligence agencies, hackers for hire, organized crime syndicates, and terrorists and these
threat actors constantly seek to access and steal our nation’s classified information, trade secrets, technology, and
ideas?all of which are of great importance to our national and economic security (Wray, 2017). With the
widespread distribution of social media, terrorists can spot, assess, recruit, and radicalize vulnerable persons of all
ages in the United States either to travel or to conduct a homeland attack. Through the Internet, terrorists overseas
now have direct access into our local communities to target and recruit our citizens and spread the message of
radicalization faster than we imagined just a few years ago (Wray, 2017).
As it was mentioned in the Statement before the Senate Homeland Security and Government Affairs Committee by
the Director of the FBI, many foreign terrorist organizations use various digital communication platforms to reach
individuals they believe may be susceptible and sympathetic to extremist messages, however, no group has been as
successful at drawing people into its perverse ideology as ISIS and it has proven dangerously competent at
employing such tools for its nefarious strategy (Wray, 2017). ISIS uses high-quality, traditional media platforms, as
well as widespread social media campaigns to propagate its extremist ideology. They are also good at using secure
messaging platforms with strong encryption for their recruitment efforts. The exploitation of encrypted platforms
presents serious challenges to law enforcement’s ability to identify, investigate, and disrupt threats that range from
counterterrorism to child exploitation, gangs, drug traffickers and white-collar crimes (Wray, 2017).
So, what can we do counter all these threats? Well, we can increase cybersecurity funding and spend more money
on better training for IT security personnel. We also need to educate the end-users, because more often than not,
they are the weakest link. Ultimately, top-to-bottom commitment and buy-in to a greater purpose is vital. If
government agencies want to make a dent in their cybersecurity shortcomings, it is imperative that they employ
awareness campaigns demonstrating the clear value that heightened security brings to each individual person, not
just the organization. Without the end-users buy-in, it will be hard to address these issues and be successful in
combating online radicalization and recruitment campaigns, spread of disinformation, political hacktivism, and
much more.
Boyd A. (2016). DNI Clapper: Cyber bigger threat than terrorism. Retrieved
Wray C. (2017). Statement before the Senate Homeland Security and Government Affairs Committee Washington,
D.C. Retrieved from

Purchase answer to see full

Ray writers

Order your essay today and save 30% with the discount code ESSAYSHELP