Emerging Threats & Countermeas

profileraj123

Discuss how the security principles of deception and separation can be applied at the national level to protect against attacks from hostile foreign nations. Identify the four stages of deceptions and how this can employed at the national level. Also, in discussing the concept of separation, ensure to identify how the concept of separation would be different in the context of national infrastructure protection. Please provide examples to support your discussion.






Recently, the Pentagon has concluded that computer sabotage coming from another country can constitute an act of war. The pentagon’s first formal cyber strategy, unclassified portions of which became public in June of 2011, represents an early attempt to grapple with a changing world in which a hacker could pose a significant threat to U.S nuclear reactors, subways or pipelines from a hostile country’s military. Recent cyber-attacks on the Pentagon’s systems by another foreign country have given new urgency to U.S efforts to develop a more formalized approach to cyber-attacks.

Read more  https://www.judiciary.senate.gov/imo/media/doc/08-21-18%20Lewis%20Testimony.pdf


Text book

 

Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier

    • Posted: 10 days ago
    • Due: 
    • Budget: $10
    Tags: WORKHOME
    Answers 1
    • hi, RATE ME
      Answer rating:5Stars out of1ratings

    Purchase the answer to view it

    blurred-text
    • Rated 1 times

      discussion 2

      Recently, the Pentagon has concluded that computer sabotage coming from another country can constitute an act of war. The pentagon’s first formal cyber strategy, unclassified portions of which …

    • Not rated

      Discussion

      Discuss how the security principles of deception and separation can be applied at the national level to protect against attacks from hostile foreign nations. Identify the four stages of …