CyberTerrorism

Cyberharassment Laws
August 15, 2017
Customer Service- project-Company selection and overview
August 15, 2017
Show all

CyberTerrorism

After reading the attached articles, choose TWO of the following questions and respond. 1. Based on the articles, how long do you think these attacks have been going on? 2. Compare and contrast China’s ability for computer network attack capabilities to the United States network attack capability. 3. How do you develop strategies or tactics to defend against these attacks? 4. Should the public be made more aware of this activity? Why or why not? 5. Based on the articles, do you feel there is significant evidence for solid attribution?

Leave a Reply

Your email address will not be published. Required fields are marked *