This assignment is a “take home” essay requirement to test knowledge and assimilation of the course learning objectives. The exclusive use of required texts and readings, as well as resources provided in the course is mandatory, although references to your personal experiences are allowed, if properly annotated and relevant. No outside sources are expected. The assignment should be no more and no fewer than eight pages. Attach the assignment as a word document. The assignment must follow the Chicago Style Manual guidelines. Refer to Kate Turabian, A Manual for Writers of Research Papers, Theses, and Dissertations, 7th ed.Chicago: University of Chicago Press found at All written submissions should be submitted in Times New Roman 12 pt font with 1” margins, typewritten in double-spaced format. Follow the Turabian Format as the sole citation and reference style used in written work submitted as part of coursework.

Complete the following:

A recent cyber attack occurred where a botnet type attack targeted a major US defense firm. No physical damage occurred to the firm’s network, but significant technological secrets about a new surveillance and targeting system from the firm, Defense Applications International (DAI), appear to have been compromised. Incidental, but nonetheless as a result of the attack, the virus also infected a software program that DAI was testing at electrical plant in Pennsylvania. The plant had to be shut down for 12 hours while repairs were made. The NSA believes it has credible evidence that the attack had a direct connection to the elite cyber unit Department 2112, of the country of Redistan, an adversary of the United States, although the attack itself appears to include private citizens of Redistan. The attack however, was routed through several third countries including Bluelandia, an ally of the United States.

You are a new cyber desk officer working for the National Security Council. The Deputy National Security Advisor has asked you to write an eight page memorandum addressing key issues of cyber policy. In the memorandum you have been asked to address the following issues:

1) Based off of the facts we know, should the attack be considered a crime, espionage or act of war? What should the US response be? How can the US best defend itself from future attacks such as the one that just occurred?

2) Should the United States assign US Cyber Command with the responsibility of protecting certain private companies and if so what should the general standard be for determining what companies the government should be responsible for defending.

3) Should the United States lead the effort at an international cyber agreement? Why or why not? What challenges would the President face in trying to get an agreement? Are there any alternatives?

4) Are there any substantive changes that should be made to our current US cyber policy?

Note: In crafting your memorandum you may allocate the content according to the importance of the issue. For example, you can allocate several pages to one issue if you believe it deserves more attention than the others, however, ensure that each question specified by the Deputy National Security Advisor is addressed. No more and no less than eight pages. Use Cyberpower and National Security authored by Franklin D. Kramer as a refercne.

You can leave a response, or trackback from your own site.


16 Responses to “Memorandum”

  1. 433446 572818i was just surfing along and came upon your blog. just wanted to say very good job and this post really helped me. 248652

  2. diamond art says:

    84515 334923This will likely be a great web site, may you be interested in performing an interview about how you developed it? If so e-mail me! 96536

  3. 401172 941116This internet internet site is my aspiration, quite outstanding style and style and Perfect topic matter. 533855

  4. 985670 325122Wow! This can be 1 certain with the most helpful blogs We have ever arrive across on this subject. Really Fantastic. Im also an expert in this subject so I can comprehend your hard work. 630180

  5. 379196 652398In todays news reporting clever journalists function their very own slant into a story. Bloggers use it promote their works and several just use it for fun or to stay in touch with buddies far away. 672740

  6. 452774 669799Man you legend. return see my web site, you need to get pleasure from it. 195707

  7. 13272 350005A quite exciting go by means of, I may possibly not agree completely, but you do make some really legitimate factors. 161464

  8. 601033 993611There is an ending. Just remember that I meant for this to be an art game. I do feel like I spent an inordinate amount of time on the a lot more traditional gameplay elements, which may possibly make the meaning of the game a bit unclear. In the event you mess about with it though, youll locate it. 452925

  9. diamond art says:

    961167 23014This is a great topic to talk about. Sometimes I fav stuff like this on Redit. This post probably wont do properly with that crowd. I will probably be sure to submit something else though. 261975

  10. 986226 170937I like the way you conduct your posts. Have a good Thursday! 740811

  11. 308195 575297I recognize there is undoubtedly a fantastic deal of spam on this blog. Do you want support cleansing them up? I could support in between classes! 872554

  12. Cell Phone 925 flows through the site.Gambling concrete.

  13. 509524 470903This sort of in search of get the enhancements created on this particular lifestyle and diet, begin your L . a . Shifting the pounds diet answer is really a huge procedure into accesing which usually hope. weight loss 684179

  14. Fishing.Football in the northern side of the city.

  15. Young Player DialogThe hotel is within 24 hours.

  16. 798170 339528Many thanks for this certain information I was basically browsing all Search engines to discover it! 780160

Leave a Reply

Powered by WordPress | Designed by: buy backlinks | Thanks to webdesign berlin, House Plans and voucher codes