Cyber Warfare 1.) In our globally connected world businesses can become "victims" of nation-state political...
70.2K
Verified Solution
Question
Accounting
Cyber Warfare
1.) In our globally connected world businesses can become "victims" of nation-state political objectives including becoming the target of cyber warfare. There is a growing list of examples where companies are attacked to achieve military objectives. The Cybersecurity and Infrastructure Security Agency (CISA) provides an assessment of various countries' malicious cyber activities. The Office of the Director of National Intelligence (ODNI) creates an annual threat assessment that evaluates threats to the United States from other countries, which includes cyber threats. One famous example is "the world's first cyber war" (Tamkin, 2017) where Russia presumably attacked Estonian cyber assets including banks, newspapers, broadcasters, and more. These attacks crippled Estonia; its citizens relied on digital currency and couldn't buy food when the banks were offline. They also couldn't get any information on the banking outage due to attacks against newspapers and broadcasters. Without belaboring the point, think about organizations where you might work. Are they potential cyber warfare targets? What damage could a nation-state actor cause with an attack? What can you do to protect the organization from attack? Consider these questions and more as you proceed with the Discussion Forum.
2.) The Amy Zegart video describes 5 Key Ways the Cyber Threat is Different and the NBC News video notes that Russia has been using Ukraine for perfecting cyber attack. With these observations in mind:
- Discuss the parameters that would be necessary in order for a cyber attack to be considered an act of war.
- In traditional warfare, people are divided into lawful combatants, unlawful combatants, and non-combatants per the Geneva Conventions and other legislation and accords. Essentially, non-combatants should never be targeted by a military operation. Are nation-state actors bound by any similar rules regarding cyber targets? If the US were to pursue future international accords to protect non-combatant cyber assets, what types of systems should be protected and what types of systems should be legitimate warfare targets? Provide your rationale and justification for this position.
- The key here is for me to assess your ability to support & advocate for your position as well as assess some critical analysis skills.
- Im also looking for indicators that you understand MIS concepts as they apply in this scenario. Are your assertions reasonable given the characteristics of modern MIS systems?
- (Hint:) Though not a strict requirement, a strongly-supported argument often includes cited sources & references.
Get Answers to Unlimited Questions
Join us to gain access to millions of questions and expert answers. Enjoy exclusive benefits tailored just for you!
Membership Benefits:
- Unlimited Question Access with detailed Answers
- Zin AI - 3 Million Words
- 10 Dall-E 3 Images
- 20 Plot Generations
- Conversation with Dialogue Memory
- No Ads, Ever!
- Access to Our Best AI Platform: Flex AI - Your personal assistant for all your inquiries!
Other questions asked by students
StudyZin's Question Purchase
1 Answer
$0.99
(Save $1 )
One time Pay
- No Ads
- Answer to 1 Question
- Get free Zin AI - 50 Thousand Words per Month
Unlimited
$4.99*
(Save $5 )
Billed Monthly
- No Ads
- Answers to Unlimited Questions
- Get free Zin AI - 3 Million Words per Month
*First month only
Free
$0
- Get this answer for free!
- Sign up now to unlock the answer instantly
You can see the logs in the Dashboard.