Module 3 M3D1: Department of Defense Strategy for Cybersecurity The U.S. military has taken steps to respond to the threat of cyber-attacks with the formation of U.S. Cyber Command and the developme
Module 3: Learning & Assessment Activities
During this module you will:
Read:
Required
Module Notes: U.S. National Cybersecurity Strategy
Arquilla, J. (2011). From Blitzkrieg to Bitskrieg: The Military Encounter with Computers (Links to an external site.). Communications of the ACM, 54(10), 58-65. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=66736069&site=eds-live&scope=site
Babcock, C. (2015). Preparing for the Cyber Battleground of the Future (Links to an external site.). Air & Space Power Journal, 29(6), 61-73. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=110742248&site=eds-live&scope=site
Defense Cyber Strategy (Links to an external site.) [PDF, File size 6.18MB] (April 2015). Retrieved from https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FINAL.PDF
Jasper, S. (2015). Deterring Malicious Behavior in Cyberspace. (Links to an external site.)Strategic Studies Quarterly, 9(1), 60. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=101721572&site=eds-live&scope=site
Kirschbaum, J. W. (2016). DOD Needs to Clarify Its Roles and Responsibilities for Defense Support of Civil Authorities during Cyber Incidents (Links to an external site.). GAO Reports, 1-27. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=114250318&site=eds-live&scope=site
Stavridis, J., & Weinstein, D. (2014). Time for a U.S. Cyber Force (Links to an external site.). U.S. Naval Institute Proceedings, 140(1), 40-44. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=93741719&site=eds-live&scope=site
Optional
Wilshusen, G. C., & Barkakati, N. (2013). CYBERSECURITY: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented (Links to an external site.). GAO Reports, 1. Retrieved from http://vlib.excelsior.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=ulh&AN=86699071&site=eds-live&scope=site
View:
Required
Is There a Cyber Pearl Harbor on the Horizon? (Links to an external site.) [Video file, 04:32 minutes]. (2013). Bloomberg. Retrieved May 1, 2016, from Academic Video Online: Premium.
Messick, G. (Producer). (2012). Stuxnet (Links to an external site.) [Video file, 14:36 minutes]. Columbia Broadcasting System. Retrieved May 1, 2016, from Academic Video Online: Premium.
Review the following webpages:
Department of Defense (DOD) Cyberstrategy (Links to an external site.)
This website serves as an information portal for the U.S. Department of Defense Cyberstrategy. The portal provides links to current news stories, video segments, as well as fact sheets on the DOD strategy. It is maintained by the Department of Defense and content is periodically updated.
Discuss:
M3D1: Department of Defense Strategy for Cybersecurity
M3D2: Department of Defense Organization for Cybersecurity
Note: Please contribute one original post in response to each discussion question. Response should be 2-3 paragraphs or at least 300 words and include citations and references in APA format. As always be mindful of plagiarism.