What is an asymmetric threat
1. Not only must asymmetric advantages be countered domestically, attackers often originate from outside the United States. Given that situation, describe how the Westphalian model would aid cybersecurity at the global level.
2. This week we are reviewing responses to an asymmetric threat.
A. What is an asymmetric threat?
B. Describe some dynamic approaches for defending against an asymmetric threat.
3. Revolutionary change often creates a paradigm shift. Given a new paradigm, it would be beneficial to redraw the cybersecurity landscape, critically assessing how the problem of cybersecurity should be defined.
What exactly is cybersecurity? Is it a function or task? Is it a strategy? Is it about crime? Is it about national security?
4Changes to business enterprises in response to the commercialization and growth of the Internet are often seen as by-products of revolutionary change.
A. Why is the Internet viewed as a revolutionary change?
B. Describe some of the attributes of revolutionary change brought about by the Internet and the impact on security.
You are encouraged to include real examples from your past studies that you can share with your fellow students.