Student Solution

-->

"Education is the most powerful weapon which you can use to change the world”
– Nelson Mandela

1 University

1 Course

1 Subject

Module 6 Discussion 2 Cyberespionage

Module 6 Discussion 2 Cyberespionage

Q Module 6 Cyberespionage presents both security and economic challenges to the United States and other countries. Stealing industrial secrets or negotiating strategies allows the one side to use the other side’s information to its own advantage. While spying for strategic insights is accepted in the rules of the game between nation states, the theft of intellectual property for commercial advantage is not. The increasing reliance on digital systems for the development and storage of intellectual property makes the cyberespionage market quite lucrative. How should nation states respond when their economies are threatened by commercial espionage? What countermeasures might be effective The module learning outcomes addressed in this activity are: • Discuss the national security implications of cybercrime and cyberespionage (CO #3) • Assess the strengths and weaknesses of domestic and international efforts to counter cybercrime and cyberespionage (CO #3) The input of each student adds value to the course and creates a better experience for everyone. Although this is an online asynchronous course that you can access on your own schedule, your regular participation is mandatory. You will be expected to log in and participate at least two times per week on separate days throughout the term. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Please contribute at least one original post, due on Wednesday at 11:59 p.m. Eastern time, with at least two substantive replies to fellow students posted by Sunday at 11:59 p.m. Eastern time. Keep in mind that if reply posts come in Sunday evening, this is not a robust discussion. I reserve the right to ask you to contribute sooner or more frequently if this will enhance learning. Question After completing the assigned readings for the module, please respond to the following question in your initial post: • As indicated by the Director of the FBI and discussed in the Mandiant report (Links to an external site.) on Advanced Persistent Threat 1 (APT1), there appears to be a concerted effort by foreign actors to steal the intellectual property of U.S. companies. Assume you are a Congressman/Congresswoman addressing your constituents in a town hall meeting. You are asked the following question: “What is the risk to national security of foreign countries stealing our business secrets and what should we do about it?” Response: Your replies to classmates must be substantive; posting “I agree” is a start, but you also need to explain why. Replies should contribute to the discussion as a whole by integrating what you have learned from your required readings. When participating in the discussion forums, be both honest and respectful of ideas and comments from your classmates. Please remember the board discussions take place in an open forum, so refrain from vulgar language and racial, sexist, or any other comments that an individual might find offensive. Use the EC Library resources for research assistance and to properly cite your work: • Military Leadership Research Guide (Links to an external site.) • National Security Research Guide (Links to an external site.) • Plagiarism & Copyright (Links to an external site.) • Excelsior Library Writing Help (Links to an external site.) • APA Citation Help (Links to an external site.) • Excelsior College Online Writing Lab (OWL) (Links to an external site.) Consult the Discussion Posting Guide for information about writing your discussion posts. It is recommended that you write your post in a document first. Check your work and correct any spelling or grammatical errors. This is a “post first” discussion forum, which means you must submit your initial post before you can view other students’ posts. When you are ready to make your initial post, click on "Reply." Then copy/paste the text into the message field, and click “Post Reply.” To respond to a peer, click “Reply” beneath her or his post and continue as with an initial post. Evaluation This discussion will be graded using the SPS Default Discussion Rubric. Please review this rubric, located on the Rubrics page within the Start Here module of the course, prior to beginning your work to ensure your participation meets the criteria in place for this discussion. All discussions combined are worth 30% of your final course grade.

View Related Questions

Solution Preview

According to my research and knowledge, the risk to national security of foreign countries stealing the business secrets of America is high. This is because there is jealousy of the foreign countries to see the growing status of the economy of America. Therefore, the foreign countries will always want to ensure that America is in some problem or is always caused harm. Therefore, there has to be continuous and constant steps taken by America to ensure that the risks are mitigated ad the activities attempting cyberespionage are prevented.