Defense bill approves offensive cyber warfare
Download
1 / 7

Offensive CyberSecurity Action - PowerPoint PPT Presentation


  • 139 Views
  • Uploaded on

Defense Bill Approves Offensive Cyber Warfare. Offensive CyberSecurity Action. National Defense Authorization Act Gives the military the right to perform cybersecurity attacks These attack must be carried out under presidential supervision and abide by the laws of warfare

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Offensive CyberSecurity Action' - craig


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Defense bill approves offensive cyber warfare

Defense Bill Approves Offensive Cyber Warfare

Offensive CyberSecurity Action


Overview

National Defense Authorization Act

Gives the military the right to perform cybersecurity attacks

These attack must be carried out under presidential supervision and abide by the laws of warfare

The act also requires that the DoD and DHS to report on Chinese military capabilities

Some of this spying is conducted on worldwide networks

Overview


8 step decision making process

Should the military have the right to conduct offensive cyber attacks on other countries?

The parties are both the U.S. government and the rest of the world’s civilian population.

The government wants to have the ability to protect its people(through offensive cyber attacks).

The people want to be safe from inaccurate attacks and keep their privacy.

8-step decision-making process


8 step decision making process cont

-One solution would be for the military to keep the power to use offensive action

-Another would be for the military to give up this power

-A compromise would be for this new power to be closely monitored and limited

-I would chose the last option, since military needs to possess the ability to attack on all fronts

8-step decision-making process (cont.)


8 step decision making process cont1

A) Yes! B)Yes again! use offensive action

I believe this solution coincides with nature and does not violate any laws of nature.

I believe this solution would be the most accepted and widely agreed upon.

Yes, of my own free will.

Pragmatism

8-step decision-making process (cont.)


Applying the acm code of ethics

2.3 Know and respect existing laws pertaining to professional work.

2.8 Access computing and communication resources only when authorized to do so.

3.5 Articulate and support policies that protect the dignity of users and others affected by a computing system.

Applying the ACM code of ethics


Citations

Hoover, Nicholas J. "InformationWeek: The Business Value of Technology." Defense Bill Approves Offensive Cyber Warfare. Web. 11 Apr. 2012. <http://www.informationweek.com/news/government/security/232301351>.

"Association for Computing Machinery." Code of Ethics —. Web. 11 Apr. 2012. <http://www.acm.org/about/code-of-ethics>.

Citations


ad