Wednesday, May 6, 2020

China Saper Threat - 777 Words

Weak USA Cyber Policy vs China’s Security Threat to the USA? Abstract A cyber spy network based mainly in China hacked into classified documents from government and private organizations. One of the biggest questions still remains unanswered. Should the U.S. Congress conduct an in depth assessment of Chinese cyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage. In this paper I will review china’s cyber threat and possible USA solutions to protect against the threat. Could Weak USA Cyber Policy be the cause of China’s Security Threat? U.S. corporations and cyber security specialists have reported an daily attack of computer network intrusions originating from China. Of†¦show more content†¦cyber policy has embraced this idea. â€Å"The Plan declared that in order for it to succeed, government and the private sector must work together in a partnership. However since the regulation has been in place it has failed to provide the security necessary to protect U.S. critical infrastructure from a cyber attack. Even Congress has been slow to act regarding almost all aspects of cyber policy (Wolf, J. 12 July, 2012).† One of the problems facing a comprehensive cyber security bill is that computers have become so omnipresent in our daily lives that they cross every sector of the economy. It is not surprising that application of the laws of war to cyber attacks has recently been a popular topic in politics. Some have even analyzed whether a cyber attack can constitute an armed attack, it can but, whether a cyber attack with a specified effect constitutes a use of force. An example, if the U.S. could prove that Iran absolute sent a computer virus that infected a Wall Street, would dropping a bomb on Iran be justify? A responsible nation must always consider the possibilities of collateral damage in deciding whether an act of self defense is justified, be it cyber or kinetic. While the United States must undoubtedly increase its cyber defense capabilities, the nation cannot retreat behind a Line of firewalls. As in the fight against terrorism, the United States must be vigilant and aggressive in the face of both cyber attacks and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.