M2D1: Cyber Threat to U.S. National Security Module 2 Cyber issues pose several threats to U.S. National Security. In the readings for this module and the Harknett and Stever article from Module 1, t

Module 2: Learning & Assessment Activities

During this module you will:

Read:

  • Required

    • Module Notes:  U.S. National Cybersecurity Strategy

    • Chapter 7 One Government’s Approach to Cybersecurity (Links to an external site.) in Bayuk, J. L., Schmidt, J., Weiss, J., Sachs, M. H., Healey, J., & Rohmeyer, P. (2012). Cyber Security Policy Guidebook. Hoboken: Wiley.  Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsebk&AN=535983&site=eds-live&scope=site

    • Dunn, Cavelty, M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities (Links to an external site.)Science & Engineering Ethics20(3), 701-715. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=97178206&site=eds-live&scope=site

    • Newmeyer, K. P. (2012). Who Should Lead U.S. Cybersecurity Efforts? (Links to an external site.)PRISM Security Studies Journal3(2), 115. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=73151318&site=eds-live&scope=site

    • Trautman, L. J. (2015). CYBERSECURITY: WHAT ABOUT U.S. POLICY? (Links to an external site.)Journal Of Law, Technology & Policy2015(2), 341. Retrieved from https://advance-lexis-com.vlib.excelsior.edu/api/permalink/a1d87fa0-a780-4d5a-b73c-c94375df5431/?context=1516831

    • Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War (Links to an external site.)Survival (00396338)53(1), 23-40. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=57658056&scope=site

View:

  • Required

    • Code wars: America's cyber threat (https://vlib.excelsior.edu/login?url=https://fod.infobase.com/PortalPlaylists.aspx?wID=103647&xtid=47288.) [Video file, 43:19 minutes]. (2011). In Films On Demand. Retrieved April 20, 2016

    • The President Speaks on the Cybersecurity National Action Plan (Links to an external site.) [Video file, 06:50 minutes]. (2016). Retrieved from https://www.youtube.com/watch?v=ZGFMZDQl9z0

  • Review the following webpages:

    • Department of Homeland Security: Cybersecurity (https://www.dhs.gov/topic/cybersecurity)

      • This webpage provides an overview of the Department’s cybersecurity programs.  Use it to familiarize yourself with the terms and offices involved as well as the role played by DHS in cybersecurity.  We will look at this in depth later in the course

    • National Cybersecurity Institute at Excelsior College (Links to an external site.)

      • This is Excelsior College’s effort on cybersecurity.  It contains several blogs and webinars that may be useful as the course progresses.  Consider it an additional source for information.

    • U.S. Government Accountability Office Cybersecurity (Links to an external site.)

      • The GAO performs research at the request of Congress.  It is a non-partisan government agency.  This page contains links to GAO research and publications on cybersecurity issues.  It provides several resources that may be useful in identifying topics for research papers as well as policy questions arising during the course.

Discuss:

M2D1: Cyber Threat to U.S. National Security

The module learning outcomes addressed in this activity are:

·        Describe cyber threats to U.S. national security including critical infrastructure, espionage, economic disruption, and criminal activity.

Question

After completing the assigned readings for the module, please respond to the following question in your initial post:

·        Identify and explain the three most significant cyber threats to U.S. national security.  Using the course readings and additional scholarly material justify your choices and rank order.

As always be mindful of plagiarism.  The Excelsior Library Writing Help (Links to an external site.) and Online Writing Lab (OWL) (Links to an external site.) are available for assistance.

    • Note: Please contribute one original post in response to each discussion question.  Response should be 2-3 paragraphs minimum 300 words and include citations and references in APA format. 

Use the EC Library resources for research assistance and to properly cite your work:

  • Military Leadership Research Guide (Links to an external site.)

  • National Security Research Guide (Links to an external site.) (Links to an external site.)

  • Plagiarism & Copyright (Links to an external site.)

  • Excelsior Library Writing Help (Links to an external site.)

  • APA Citation Help (Links to an external site.)

  • Excelsior College Online Writing Lab (OWL) (Links to an external site.)