Reference no: EM13832093
1. Explain the differences in computer network exploitation, computer network defense, and computer network attack. How are these distinctions important in the practice of cyber intelligence?
2. Would you rank cyber threats above those of terrorism? Why or why not?
3. Explain the challenges of attribution and how you believe this impacts cyber intelligence.
References:
Reveron, Derek S. 2012. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World. Washington DC: Georgetown University Press.
Jason Healey, "Beyond Attribution: Seeking National Responsibility for Cyber Attacks," Atlantic Council Issue Paper, Cyber Statecraft Initiative (2011) https://www.acus.org/files/publication_pdfs/403/022212_ACUS_NatlResponsibilityCyber.PDF
David D. Clark, "Untangling Attribution," Proceedings of A Workshop on Deferring Cyber Attacks, 2 Harv. Nat'l Sec. J. 323 (2011).