Purchase Solution

Cyber security, offense vs. defense

Not what you're looking for?

Ask Custom Question

Defense cyber strategy: We can and will hit back, by Amber Corrin, C4&ISR Networks, Jul 1 2015
http://www.c4isrnet.com/story/military-tech/omr/cyberstrat/2015/07/01/defense-cyber-strategy-power/29558285/

Cybersecurity: The Best Defense is a Good Offense, by Taylor Schlacter, May 8, 2015
http://mysteriousuniverse.org/2015/05/cyber-security-the-best-defense-is-a-good-offense/

1. Do you think that the best cyber defense includes being on the offensive?
2. Should the government and/or private companies engage in cyber warfare?
Please provide any additional references and at least 200 words.

Purchase this Solution

Solution Summary

Defense cyber strategy: We can and will hit back, by Amber Corrin, C4&ISR Networks, Jul 1 2015
http://www.c4isrnet.com/story/military-tech/omr/cyberstrat/2015/07/01/defense-cyber-strategy-power/29558285/

Cybersecurity: The Best Defense is a Good Offense, by Taylor Schlacter, May 8, 2015
http://mysteriousuniverse.org/2015/05/cyber-security-the-best-defense-is-a-good-offense/

1. Do you think that the best cyber defense includes being on the offensive?
2. Should the government and/or private companies engage in cyber warfare?

Solution Preview

**500+ words with additional references. I hope this helps.***

Cyber security is an important consideration for any organization, from private corporations to government entities. Private companies need to be concerned about protecting their intellectual capital, as well as the personal information of their employees and customers. There are numerous incidents of client credit card data being stolen and affecting the company's reputation along with negatively affecting their stock price and customer base. Cyber crime can be expensive, and as foreign countries increase their internet presence, and the value of the US dollar is important, unfortunately, there will continue to be attacks on companies to obtain this type of data. One of the solutions for companies to maintain a cyber security department to protect them from cyber attacks. This can range from installing anti-virus with mal-ware protection on employee computers, to installing an enterprise-wide server protection, with a full staff monitoring the integrity of databases and potential breaches from strange IP addresses (Lewis, 2010).

This type of security is necessary for governments as well. The ...

Purchase this Solution


Free BrainMass Quizzes
Basic Networking Questions

This quiz consists of some basic networking questions.

Basic UNIX commands

Use this quiz to check your knowledge of a few common UNIX commands. The quiz covers some of the most essential UNIX commands and their basic usage. If you can pass this quiz then you are clearly on your way to becoming an effective UNIX command line user.

C# variables and classes

This quiz contains questions about C# classes and variables.

Inserting and deleting in a linked list

This quiz tests your understanding of how to insert and delete elements in a linked list. Understanding of the use of linked lists, and the related performance aspects, is an important fundamental skill of computer science data structures.

Word 2010: Table of Contents

Ever wondered where a Table of Contents in a Word document comes from? Maybe you need a refresher on the topic? This quiz will remind you of the keywords and options used when working with a T.O.C. in Word 2010.