Discussion 9 | CRJ 631 Security & Protection for Cybercrime | Ashford University

 Cyberattacks

Prior to beginning work on this discussion, please read all of the required resources for this week. Review the instructions below and research a minimum of three additional scholarly sources in the UAGC Library that were published within the last 10 years to help support your statements. Be sure to include a reference list for your articles at the end of your post in APA format as outlined by the UAGC Writing Center.

Cyberattacks are a dangerous innovation in warfare and have become one of the greatest threats to national security since the turn of the 21st century. From a professional, evidence-based perspective, address the following.

  • Evaluate at least one key ethical and one key legal challenge pertaining to the United States government engaging in cyberattacks against other nations and entities.
  • Explain at least one technique that the United States currently utilizes to protect valuable data from potential cyberattacks from other nations and entities.
    • Analyze whether the technique you explained has any legal, ethical, or moral ambiguities.

 

Required Resources

Articles

Brust, R. (2012). Cyberattacks: Computer warfare looms as the next big conflict in international lawLinks to an external site.. American Bar Association Journal, 98(5), 40-45.

  • The full-text version of this article can be accessed through the Academic OneFile database in the UAGC Library. This article explores some of the realities and hidden dangers related to cyberattacks from an international law perspective.

Healey, J. (2011). The spectrum of national responsibility for cyberattacksLinks to an external site.. Brown Journal of World Affairs, 18(1), 57-70.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines who is responsible for cyberattacks on a national level.

Ristuccia, H. & Baich, R. (2012). Preparing for corporate cyberattacksLinks to an external site.. Corporate Board, 33(196), 11-15.

  • The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores the increasing external threats that companies may face from outside cyberattacks.

Robb, D. (2014). Could HR Be the Next Target?Links to an external site.. HR Magazine, 59(7), 50-53.

  • The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores whether HR departments and professionals are vulnerable to cyberattacks, and includes suggestions for prevention.

Woldt, J. (2016). Prepare now for a cyberattackLinks to an external site.. Credit Union Magazine, 82(1), 24-28.

  • The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article discusses how credit unions can prepare for a cyberattack.

Recommended Resource

Website

MSCJ Professional SourcesLinks to an external site.. (http://ashford-mscj.weebly.com/)

  • This resource site will provide assistance in researching additional sources for the assessments within this course.
Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.