Threats in Cyberspace
Length: 900-1200 words.
Select one key issue related to cyberspace: Threats in Cyberspace
Components of the Essay:
1. Analyze how the selected issue bears upon, or relates to, national security, warfare and/or joint operations.
2. Advocate a position related to the selected issue. Fully support and defend your answer using course (required) and extracurricular (optional) sources.
3. You must use the many references provided. No outside sources.
Additional Requirements: The instructor requires in-text citations within the answers. Please place in-text citations for the information that is used and for the information that is not common information known to someone. Please use the format below.
*When you place your in-text citation within the answer, please input your page number where you found the information. Example: (Hodges 2003, 176)., Hodges (2003, 176) discussed..., In a 2003 article, Hodges (176) discussed.
Please reach out if you need more information.
Threats in Cyberspace
Name
Course Name and Number
Instructor’s Name
Due Date
Threats in Cyberspace
Threats in cyberspace have become more common in the modern era. These threats significantly affect various aspects of human life. There is no doubt that threats in cyberspace have had a significant impact on national security, warfare, and joint operations. Most of the government records and intelligence information are stored in computerized systems. Therefore, it would be a major threat to the security of a nation if unauthorized actors accessed such documents through cyber-attacks. Chong (2023, 1) argues that making systems utterly free of vulnerability is impossible. Further, Nakasone et al. (2017, 30) argue that technology grows and processing power doubles every two years. Growth in threats in cyberspace increases proportionally. Johnson (2015. 9) explains that information over the internet is shared as packers. Growth in internet use is likely to lead to more transmitted packets. The consequence is an increase in information that threats in cyberspace can act on. This paper will discuss how threats in cyberspace bears upon or relating to national security, warfare, and joint operations.
When it comes to national security, threats in cyber security could take different shapes. The threat involves interfering with the integrity, confidentiality, and availability of critical information/ data in all these different shapes. Most nations' military and security apparatus are heavily reliant on computerized systems for operations. Interference with these systems may cause significant debilitation when it comes to national security. In addition, hacktivists, state-sponsored actors, terrorists, or other groups with ulterior motives could conspire to collect data from critical organizations to cause harm. Some of the systems these groups could target include the energy grid, the financial system, and the transportation systems. As Hayden (2003, 2) notes, the web is "inherently insecure." Consequently, there is no way to guarantee that there will be no cyber-attacks. The best that governments can do is employ the best cyber security techniques to ensure that critical information is protected.
When thinking about modern warfare, it is almost inevitable not to think about cyber warfare. Traditionally, governments had focused on providing physical security. Therefore, the focus was to put in measures to protect land, sea, and air. However, in the modern days, ensuring the security of cyberspace has become an integral part of security. In his keynote address at Duke Law School, Glenn (2017, 6) advised that it is important for countries to come together and fight common enemies in cyberspace. Cyberwar may involve deceiving adversaries, disrupting logistics, and interfering with the supply chain. It can also include carrying out espionage on the adversary. Espionage provides information that puts the investigating party on the upper edge regarding cyber warfare. In light of these observations, threats in cyberspace have intensified cyber warfare. Considering the growth in the use of technology and the advancement of the same, it is likely that threats in cyberspace are likely to become more intense. The consequence of this phenomenon would be the intensification of cyber warfare.
Join operations involve two or more units of the army working together for a common purpose. Undoubtedly, such operations depend on high-level cooperation between the different units. There is also a need to share information during these operations. Applegate et al. (2017, 20) assert that understanding the operational environment is one of the most important things in an operation. Such understanding is enabled by consistent communication. Threats in cyberspace may come to play since the coordination o...