Module 3 M3D1: Department of Defense Strategy for Cybersecurity The U.S. military has taken steps to respond to the threat of cyber-attacks with the formation of U.S. Cyber Command and the developme

Module 3

M3D1: Department of Defense Strategy for Cybersecurity

The U.S. military has taken steps to respond to the threat of cyber-attacks with the formation of U.S. Cyber Command and the development of cyber strategy. The cyber strategy has evolved as the threat has evolved. Is that evolution sufficient? What areas are under or over emphasized in the strategy?  What types of resources are required to effect the strategy?

As always be mindful of plagiarism.  The Excelsior Library Writing Help (Links to an external site.) and Online Writing Lab (OWL) (Links to an external site.) are available for assistance.


Questions

After completing the assigned readings for the module, please respond to the following question in your initial post:

  1. Identify and discuss the three most significant challenges the U.S. Department of Defense faces as it implements its April 2015 Department of Defense Cyberstrategy. Using the course readings and additional scholarly material, justify your choices and rank order them.

Note: Each question has a minimum of 300 words properly cited using the references given and free of plagiarism.


M3D2: Department of Defense Organization for Cybersecurity Currently, U.S. cyber forces are drawn from the Army, Navy, Air Force, Marine Corps, and even the U.S. Coast Guard.  These individuals are members of their armed service and are recruited, trained, and managed by their distinct service. Some respected authors and former military leaders have begun to argue for changes and perhaps the creation of a new cyber service and the elevation of U.S. Cyber Command to the same level as the Combatant Commanders.

After completing the assigned readings for the module, please respond to the following question in your initial post:

  1. How does the current organization of U.S. military cyber forces enhance or impede the ability of the U.S. to respond to a major cyber-attack?  Use course readings and additional scholarly material to support your conclusions.

Note: Each question has a minimum of 300 words properly cited using the references given and free of plagiarism.