Cyberattacks Prior to beginning work on this discussion, please read


 Cyberattacks

Prior to beginning work on this discussion, please read all of the required resources for this week. Review the instructions below and research a minimum of three additional scholarly sources in the UAGC Library that were published within the last 10 years to help support your statements. Be sure to include a reference list for your articles at the end of your post in APA format as outlined by the UAGC Writing Center.

Cyberattacks are a dangerous innovation in warfare and have become one of the greatest threats to national security since the turn of the 21st century. From a professional, evidence-based perspective, address the following.

  • Evaluate at least one key ethical and one key legal challenge pertaining to the United States government engaging in cyberattacks against other nations and entities.
  • Explain at least one technique that the United States currently utilizes to protect valuable data from potential cyberattacks from other nations and entities.
    • Analyze whether the technique you explained has any legal, ethical, or moral ambiguities.

 

Required Resources

Articles

Brust, R. (2012). Cyberattacks: Computer warfare looms as the next big conflict in international lawLinks to an external site.. American Bar Association Journal, 98(5), 40-45.

  • The full-text version of this article can be accessed through the Academic OneFile database in the UAGC Library. This article explores some of the realities and hidden dangers related to cyberattacks from an international law perspective.

Healey, J. (2011). The spectrum of national responsibility for cyberattacksLinks to an external site.. Brown Journal of World Affairs, 18(1), 57-70.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines who is responsible for cyberattacks on a national level.

Ristuccia, H. & Baich, R. (2012). Preparing for corporate cyberattacksLinks to an external site.. Corporate Board, 33(196), 11-15.

  • The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores the increasing external threats that companies may face from outside cyberattacks.

Robb, D. (2014). Could HR Be the Next Target?Links to an external site.. HR Magazine, 59(7), 50-53.

  • The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores whether HR departments and professionals are vulnerable to cyberattacks, and includes suggestions for prevention.

Woldt, J. (2016). Prepare now for a cyberattackLinks to an external site.. Credit Union Magazine, 82(1), 24-28.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article discusses how credit unions can prepare for a cyberattack.

Recommended Resource

Website

MSCJ Professional SourcesLinks to an external site.. (http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.

Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!