1 / 7

Offensive CyberSecurity Action

Defense Bill Approves Offensive Cyber Warfare. Offensive CyberSecurity Action. National Defense Authorization Act Gives the military the right to perform cybersecurity attacks These attack must be carried out under presidential supervision and abide by the laws of warfare

craig
Download Presentation

Offensive CyberSecurity Action

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Defense Bill Approves Offensive Cyber Warfare Offensive CyberSecurity Action

  2. National Defense Authorization Act Gives the military the right to perform cybersecurity attacks These attack must be carried out under presidential supervision and abide by the laws of warfare The act also requires that the DoD and DHS to report on Chinese military capabilities Some of this spying is conducted on worldwide networks Overview

  3. Should the military have the right to conduct offensive cyber attacks on other countries? The parties are both the U.S. government and the rest of the world’s civilian population. The government wants to have the ability to protect its people(through offensive cyber attacks). The people want to be safe from inaccurate attacks and keep their privacy. 8-step decision-making process

  4. -One solution would be for the military to keep the power to use offensive action -Another would be for the military to give up this power -A compromise would be for this new power to be closely monitored and limited -I would chose the last option, since military needs to possess the ability to attack on all fronts 8-step decision-making process (cont.)

  5. A) Yes! B)Yes again! I believe this solution coincides with nature and does not violate any laws of nature. I believe this solution would be the most accepted and widely agreed upon. Yes, of my own free will. Pragmatism 8-step decision-making process (cont.)

  6. 2.3 Know and respect existing laws pertaining to professional work. 2.8 Access computing and communication resources only when authorized to do so. 3.5 Articulate and support policies that protect the dignity of users and others affected by a computing system. Applying the ACM code of ethics

  7. Hoover, Nicholas J. "InformationWeek: The Business Value of Technology." Defense Bill Approves Offensive Cyber Warfare. Web. 11 Apr. 2012. <http://www.informationweek.com/news/government/security/232301351>. "Association for Computing Machinery." Code of Ethics —. Web. 11 Apr. 2012. <http://www.acm.org/about/code-of-ethics>. Citations

More Related