Task 1:,Instructions: Use examples from the readings, or from your own research, to support your views, as appropriate. Encouraged to conduct research and use other sources to support your answers.

Instructions: Add additional insight opinions or challenge opinions and you can visit a couple of the web sites contributed and share your opinion of these sites. Minimum of 150 words for each. 
1) In recent decades the word cyber has been used to describe anything that is associated with networks and computers, especially in security sectors. While others define cyberspace as a domain which is characterized by the use of electromagnetic spectrum and electronics to modify, exchange and store data via networked systems which associates with physical environment (Ottis & Lorents, 2010) There are some emerging fields which are associated with cyberspace, which includes the following conflict in cyberspace, cyber terrorism, cyber militias and state-on-state warfare. Norbert Wiener who was the father of cybernetic defined cyberspace as a time-dependent set of interconnected information systems and human users who interact with those systems. This term had popular culture from the departments of science fictions and the art but also has ventured in technological strategists, governments, military, security professionals and industry leaders. It has been used to demonstrate the domain of global technology. 
According to Ottis and Lorents (2010), Cyber Network Defense is a set of protective measures and processes that use the computer network to monitor detect, defend against network interruptions which may lead to services or network degradation or denial. Cyber defense assists mostly military institutions or even the government to retaliate against network attacks and intrusion. The key aim of cyber network defense is to ensure that there are no unauthorized, malicious traffic or even illegitimate (Mayank, 2017). The user or an application is issued an access to the confidential environment or network. Similarly, cyber network defense fights against computer hackers and identifies theft. Cyber network defense has some limitations which include the following; it requires updating the new software in order to keep the security up to dare also it is costly for the average users. The human factor is an aspect of cyber network defense operations with increasing importance. 
Cyber-attack similarly means the act of war which involves actively breaking into a computer network and installing malicious software to take over that network (Mayank, 2017). In other words, it's hacking. According to U.S military, computer network exploitation meant spying. Both Cyber Network Exploitation and Cyber Network Attack may look the same but the only difference is their end results. Cyber Network Exploitation consists of techniques and processes that include the use of computer networks and computer so as to penetrate targeted networks or systems. Cyber network exploitation is a part of computer network operations which contain a series of techniques for attacking, exploiting and de fending against malicious users (Mayank, 2017). Technically, for an attack of networks or computer systems network exploitation is required. But the difference is network attack is to destroying and installing malware while network exploitation is to spy so as to prevent these malicious users. 
Cyberwar is defined as an action by a nation or state to penetrate another nation's computer or networks for the intention of causing disruption or damage (Gutzwiller et.al, 2015). This was a definition by the U.S government security. Cyberwar and effort may result in the advancement of national agenda. This can be done through the use of cyber operators who work as cyber defenders. Through the use of cyber operators mutually and beneficial relationship can be found by intelligence obtained from the attack on sy stem and flaws found in the system ( Gutzwiller et.al,2015). The most difficult problem is in regard to cyber war is to identify cyber espionage, this is factors like identifying the attack, the nature of the damage and how stolen information is used. Another impact is that as a result of cyberwar today's nation employs very numerous types of tools for prevention. Cyberwar has influenced the existence of laws as it is a form of conflict. World power has begun to define what constitutes and countermeasures which are legally allowed. 

Respond Here in 150 words


2) Cyberspace can be a challenging area to protect and defend but it is also used as a platform to attack. Three areas that we should understand within the Cyberspace arena are Cyber Network Defense (CND), Cyber Network Exploitation (CNE), and Cyber Network Attack (CNA). Before looking at how these areas are different they must be defined. 
Cyber Network Defense is simply defending the network. It is those tasks that need to be done to protect, monitor, analyze, detect, and respond to attacks against or activities that should not be happening on the network (DISA n.d.). Cyber Network Exploitation is basically espionage and reconnaissance done over the network. These operations are conducted to steal data or gather intelligence and are normally done in such a way as to not allow the attacker to be found (Zetter 2016). A Cyber Network Attack is just that, an attack against the network. It is designed to disrupt or cause damage (Zetter 2016). In some attacks the attacker protects their anonymity and in others that want people to know who they are. The differences in these areas are fairly straight forward although there can be some gray area between CNE and CNA. The CND is the defensive side of Cyber Warfare designed to protect the network, whereas CNE and CNA are the offensive side designed to prepare for or attack someone else. CNE is based more around the intelligence gathering while the CNA is focused more on the actual attack and causing damage. Since the CNE and CNA are closely linked there could be some crossover that would blur the lines between the two. 
The basics of Cyberwarfare is not completely removed from traditional warfare. There are many of the same activities such as espionage, intelligence gathering, defense, and attacks that occur in both. The main difference is that Cyberwarfare takes place in Cyberspace, as oppose to a physical battlefield, and in many ways is harder to deal with than a physical war. Cyber war includes not only military targets but also critical infrastructure. Public health, safety, and prosperity are all at increased risk from cyber threats as we integrate more critical infrastructure with newer technologies (Coats 2017). Cyberwarfare can be broken down into three historical stages: Realization 1980-1998, Takeoff 1998-2003, and Militarization 2003-present. The realization stage is during the early era of the internet which was basic exploration, while the takeoff stage was mainly information gathering which has grown into the militarization stage in which cyber warfare could be used to cause major damage to infrastructure and capabilities (Haizler 2017). Each of these stages have their own level of threat to national security but none more than the militarization stage. 
There are many aspects to cyberwar and how it affects national security and intelligence. Technology changes at a rapid pace and brings with it new capabilities and new security challenges. The more that technology is used and the more our dependence grows the more ways that it can be exploited and used against us in war. 
Respond here in 150 words