Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Module 3 Discussion 1 Department of Defense Strategy for Cybersecurity

Module 3 Discussion 1 Department of Defense Strategy for Cybersecurity

Q Module 3 The U.S. military has taken steps to respond to the threat of cyber-attacks with the formation of U.S. Cyber Command and the development of cyberstrategy. The cyber strategy has evolved as the threat has evolved. Is that evolution sufficient? What areas are under or over emphasized in the strategy? What types of resources are required to effect the strategy? As always be mindful of plagiarism. The Excelsior Library Writing Help (Links to an external site.) and Online Writing Lab (OWL) (Links to an external site.) are available for assistance. The module learning outcomes addressed in this activity are: • Explain the roles and responsibilities of U.S Department of Defense in developing and executing national cybersecurity policy (CO #3, #4) • Discuss the organization and manning of U.S. cyber forces (CO #3, #4) • Describe the role of U.S. Cyber Command in responding to cyber threats to U.S. national security (CO #3,#4) The input of each student adds value to the course and creates a better experience for everyone. Although this is an online asynchronous course that you can access on your own schedule, your regular participation is mandatory. You will be expected to log in and participate at least two times per week on separate days throughout the term. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Please contribute at least one original post, due on Wednesday at 11:59 p.m. Eastern time, with at least two substantive replies to fellow students posted by Sunday at 11:59 p.m. Eastern time. Keep in mind that if reply posts come in Sunday evening, this is not a robust discussion. I reserve the right to ask you to contribute sooner or more frequently if this will enhance learning. Question After completing the assigned readings for the module, please respond to the following question in your initial post: • Identify and discuss the three most significant challenges the U.S. Department of Defense faces as it implements its April 2015 Department of Defense Cyberstrategy. Using the course readings and additional scholarly material, justify your choices and rank order them. Response: Your replies to classmates must be substantive; posting “I agree” is a start, but you also need to explain why. Replies should contribute to the discussion as a whole by integrating what you have learned from your required readings. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Use the EC Library resources for research assistance and to properly cite your work: • Military Leadership Research Guide (Links to an external site.) • National Security Research Guide (Links to an external site.) • Plagiarism & Copyright (Links to an external site.) • Excelsior Library Writing Help (Links to an external site.) • APA Citation Help (Links to an external site.) • Excelsior College Online Writing Lab (OWL) (Links to an external site.) Consult the Discussion Posting Guide for information about writing your discussion posts. It is recommended that you write your post in a document first. Check your work and correct any spelling or grammatical errors. This is a “post first” discussion forum, which means you must submit your initial post before you can view other students’ posts. When you are ready to make your initial post, click on "Reply." Then copy/paste the text into the message field, and click “Post Reply.” To respond to a peer, click “Reply” beneath her or his post and continue as with an initial post.

View Related Questions

Solution Preview

After the implementation of the April 2015 Department of Defense Cyberstrategy, the first significant challenge faced by the U.S. Department of Defense is the threat of development of cyber surrogates (Defense Cyber Strategy, 2015). Cyber surrogates are individuals/citizens belonging to America but try to retaliate/take revenge/show anger by assisting the members of the terrorist organizations (Defense Cyber Strategy, 2015). There can be individuals belonging to minority races/minority religions in America who might have been oppressed. There can be family members of such individuals who might have been oppressed in the past. Such individuals are vulnerable to being brainwashed and joining as secondary members of terrorist organization.