The Next War

    The Next War

     

    Select one of the studies presented in Case Studies I (Week 6 Lesson) or Case Studies II
    (Week 7 Lesson) Course Notes or another case of your choosing with instructor approval.
    Using the references provided and other available open source material, write a 5-8 page
    analysis paper providing more details of the attack and addressing the following:
    a. Victim, attacker, and probable motivation for the attack.
    b. Nature and sophistication of the attack.
    c. What was the desired outcome of the attack ?
    d. How successful was it ?
    e. How effective were the attackers in covering their tracks ?
    f. How did the victim respond ?
    Use Chicago Turabian citation style and format.

    Week 6
    Case Studies I
    Scope: Examine and evaluate various state sponsored capabilities based on reported
    cyber attacks. This week we’ll focus on the People’s Republic of China (PRC).
    Objectives:
    1. Recognize the value of integrating cyber warfare with political and military strategy.
    2. Appreciate the difficulty in positively identifying attackers and the degree of state sponsorship.
    Required Reading:
    (a) Cyber War: Chapter 6

    (b) Bryan Krekel, Capability of the People’s Republic of China to Conduct Cyber Warfare and
    Computer Network Exploitation, prepared by Northrop Grumman for The US-China Economic
    and Security Review Commission, Oct. 2009,
    http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA509000&Location=U2&doc=GetTRDoc.pdf

    (c) Timothy L. Thomas, “Google Confronts China’s “Three Warfares”,” U.S. Army War College
    Parameters (Summer 2010): pages 101-113,
    http://www.carlisle.army.mil/USAWC/parameters/Articles/2010summer/Thomas.pdf

    (d) Thornbaugh, “The Invasion of the Chinese Cyberspies,” Time, August 29, 2005,
    http://www.time.com/time/magazine/article/0,9171,1098961-1,00.html

    (e) Larry Wortzel, China’s Approach to Cyber Operations: Implications for the United States,
    Testimony before the Committee on Foreign Affairs House of Representatives, Mar. 10, 2010,
    http://www.internationalrelations.house.gov/111/wor031010.pdf
    Video
    Chinese State Media Reveals PLA’s Cyber Attack Efforts

    Web sites to explore
    (a) The Dark Visitor – Inside the World of Chinese Hackers. Former Army Intelligence Officer
    Scott Henderson’s site tracking PRC cyber activities
    http://www.thedarkvisitor.com/
    120119
    2
    (b) Center for Strategic and International Studies
    Selected Bibliography for Cyber Security
    http://csis.org/files/publication/110909_Cybersecurity_Bibliography.pdf

     

    ORDER THIS ESSAY HERE NOW AND GET A DISCOUNT !!!

     

                                                                                                                                      Order Now