scispace - formally typeset
Open Access

The Future Role of the Department of Defense in Protecting and Defending America's Economy in Cyberspace

Reads0
Chats0
TLDR
This research paper looks at the roles and responsibilities of the Department of Defense as it relates to Homeland Defense and the protection of credit card information transitioning across the Internet.
Abstract
: Cyberspace attacks continue in the United States with many of these incidents crossing international borders. The global nature of cyberspace makes it difficult to determine if a breach into a computer system is an act of cyberterrorism, cyber crime, or cyber warfare. An attack to steal credit card information may be all three simultaneously. The Department of Defense is ready to protect the nation against all enemies in the air, on the land, or on the sea. These domains are well protected with military forces postured to respond. Our nation's economy is under constant attack through the cyberspace domain. Attacks through electronic means happen at the speed of light and require a quick response to contain. Proactive approaches defend our borders, but not our economy. Instead, the United States has a passive defense relying on the goodwill of commercial enterprises and the investigative approaches of law enforcement agencies. Through the United States Cyber Command, the Department of Defense has capability that can be used to defend America. This research paper looks at the roles and responsibilities of the Department of Defense as it relates to Homeland Defense and the protection of credit card information transitioning across the Internet.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Cyber Conflict Bibliography, 2015 Update

TL;DR: The purpose of this bibliography, originally prepared for the Future of Cyber Warfare Symposium held at The George Washington University Law School in April 2012, is to provide scholarly and other resources principally focused on cyber conflict, cyber attacks, information warfare and cyber war published between 2008 and the present as mentioned in this paper.
References
More filters
Journal ArticleDOI

Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers

TL;DR: An overview of the types of case study designs is provided along with general recommendations for writing the research questions, developing propositions, determining the “case” under study, binding the case and a discussion of data sources and triangulation.
Book

Qualitative inquiry & research design : choosing among five approaches

TL;DR: This chapter discusses five Qualitative Approaches to Inquiry, the design of a Qualitative Study, and standards of Validation and Reliability in Qualitative Research.
Book

Cyber War: The Next Threat to National Security and What to Do About It

TL;DR: Clarke and Knake as mentioned in this paper argue that what we have already lost in the new millennium's cyber battles is tantamount to the Soviet and Chinese theft of our nuclear bomb secrets in the 1940s and 1950s.