Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Paper Critique

Task 1 will assess your understanding of making decisions in the modern information environment. Task 2 will assess your understanding of the theoretical and practical aspects of computer security and operations. Task 3 will assess your understanding of advanced principles in computer security from a systems perspective. All tasks are small academic reports and as such the following report structure is expected for each milestone report:

  1. Introduction, where you will discuss your plan for solving the problem introduced by the module team
  2. Main Body, where you will develop your arguments
  3. Conclusions, where you will critically discuss your findings
  4. References, aim for an average of 20 references

You are expected to demonstrate an insight into the implications of the problem introduced in each task by using clear and concise arguments. The reports should be well written (and word-processed), showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative.

You are required to expand on the title and develop your arguments to clearly state why there is so much uncertainty in decision making for cyber security and how to overcome it. The deadline for the DRAFT Task 1 is on week 12 by electronic submission via Canvas. The module team will then provide general formative feedback, allowing you the opportunity to reflect on your activities and improve your work where necessary. The final copy of Task 1 should be included in the final Portfolio. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.

It is expected you will discuss the notions in the above table and explain the fundamental issues behind the complex problem of cyber security today; taking the wrong decisions and/or not acting in a timely manner because of the environmental and systemic uncertainty.

You are expected to critique the paper “Deception and Manoeuvre Warfare utilising Cloud Resources”: Stilianos Vidalis & Olga Angelopoulou (2013) Deception and Maneuver Warfare Utilizing Cloud Resources, Information Security Journal: A Global Perspective, 22:4, 151-158, DOI: 10.1080/19393555.2013.780273. In your critique you should explain how cyber manoeuvre principles can underpin the offensive and defensive operations in the modern information environment. The deadline for DRAFT Task 2 is on week 16 by electronic submission via Canvas. The module team will then provide general formative feedback, allowing you the opportunity to reflect on your activities and improve your work where necessary. The final copy of Task 2 should be included in the final Portfolio. Although there are no allocated marks for references and bibliography you are expected to use appropriate peer reviewed sources for developing your arguments, and the Harvard referencing style as per the University regulations.

ou are expected to conduct an analysis of the network packet capture that will be made available to you, using Wireshark. You are required to present your findings in a factual manner to convince decision makers of a large corporation on business strategies. The capture will be made available to you in LB154 and through Canvas. The analysis rig you will have to use for this activity will also be setup in LB154 but you can use Wireshark from your own device. There is no DRAFT deadline for this Task. The FINAL deadline for Task 3 and for the WHOLE portfolio is on the 19.12.2019 by electronic submission via Canvas.

Paper Critique

The US military joint doctrine describes the cyber operations as the operations that can be used to focus on powers by the implementation of force by using the cyberspace (Gellman and Nakashima 2013). Cyber space is nothing but a virtual computer world. It is used to generate a global computer network that is used to perform online communication (Blowers and Williams 2014). The main feature of the cyberspace is an interactive and virtual framework for a large range of participants. It is used to share the information, transfer ideas, plays games and many others. Computer Network Operations are intentional operations to optimize the networks (Barrett 2013). In this report an article review is performed based on the Manoeuvre Warfare Utilizing Cloud Resources. This report discusses the Manoeuvre operations principles. It also elaborates regarding the cyber operations in modern environment.   

The author mentions that technology is a driving force in human society. Internet enhances the lifestyle of the people (Barrett 2013). When it is related to cyberspace, security is a big deal. At the present stage, new technologies are implemented. Information security should be proactive. At present scenario it becomes offensive. Techniques and methods are available in the virtual world. The author mentions that threat is a human being to cause damage or danger. Three keywords are involved in this particular case. These include human being, material and damage. The threat agent is used to express an individual or group that is utilised to clear the threats. These threats are not concerned with the information gain. The author mentions in detail regarding Information and Manoeuvre Warfare (Blowers and Williams 2014). In this paper the Psychological Operations are discussed. It is elaborated as planned operations to deliver specified information. The entire of Psychological Operations is to try and influence the people. In this paper the author discusses regarding the Operational Security, Military Deception and Cloud Resources (Gellman and Nakashima 2013). As per the NIST model there are different kinds of cloud resources. These include Public, Private, Hybrid and Community. It also discusses the Infrastructure as a Service, Platform as a Service and Software as a Service.

In this paper, the author does not discuss the disadvantages of cloud computing. This paper does not provide any idea regarding the advantages of Cybersecurity and cyber operations (Jun, LaFoy and Sohn 2016). In this paper the author does not discuss regarding the deception strategy and its methodologies in detail. 

Manoeuvre operations principles

Cyber Maneuver is the implementation to capture, disrupt, degrade, deny and manipulate the computing as well as information resources to reach to the position of advantages concerning the competitors. It generally relates to the transfer of military forces and the implementation of fires (Junio 2013). In cyberspace, there is no transfer of forces in the kinetic sense. It is a virtual platform. It is related to the implementation of forces to some exact points of attack. It is a special code to detect the purpose of the attackers. Forces are not able to move in the cyberspace. It is responsible for making the observation very complicated. Cyber Maneuver is used to influence the machine as well as human behaviour. It is a redundant statement. The basic goal of the influencing machine behaviour is to influence human behaviour. There are no open, state-to-state cyber wars. It is a fixed state of conflict between different states (Kallberg 2013). International laws are not strong enough for cyber warfare. It is quite obvious that the state will grip this issue to take steps in the cyberspace.  

The Cyber Operation Mission Area is modifying the upcoming warfare by using cyber operations (Roscini 2014). It is used to focus on providing assurance of the targets of the Department of Defense and providing the major solutions to give authorisation for intelligence and military operations (Jun,  LaFoy and Sohn 2016). It is used to develop the systems that underpin the operational capabilities in the cyberspace. At Trident Warrior, Engineers develops new wireless technology. They developed the next-generation secure mobile networking technology for wireless communication. It acts between the gadgets using the light to transmit and position (Barrett 2013). The military develops Li-Fi for providing the secured high-data-rate communications for vehicles, facilities and submarines (Schmitt 2017). The Navy of United States of America wants to observe the effects of shock and vibration occurred due to the wireless link. They design the custom mounts to install commercial Li-Fi inside the laboratory. But this gadget is failed in the extreme testing at APL.

The Naval Academy of USA waits to inaugurate the centre of cyber studies. The expenditure is dollar one hundred twenty million (Roscini 2014). They will provide the education facility and state-of-art training. Several persons will gain a huge amount of knowledge related to the real time Cybersecurity (Kallberg 2013). Three midshipmen will get an outstanding opportunity to share their work in the Navy Cyber Forum Laboratory. A Senior Subject Matter Expert from APL conducts training on cyber-related problems. They perform an outstanding job by providing many cyber operations projects (Kallberg 2013). Among the midshipmen, there are many college students who are working as an intern in APL. The numbers of interns are increasing exponentially (Gellman and Nakashima 2013). In this summer there are thirty-eight students from the Naval Academy. Two cadets of USA Military academy also join in this internship at West Point.     

Conclusion

Cyber Security and Cyber Operations result from the inherent character of information technology. There are lots of threats that are involved in cyber operations as well as Cybersecurity. There are new methodologies that are used to terminate the older threats. The attacker develops new technologies and methodologies to hamper the security of cyber operations. It reflects a static picture in the Cybersecurity methodology in United States. There are several IT vendors who are providing tremendous effort to improve the security of cyber operation. At the end it is concluded that cyber operations and Cybersecurity are very important in the current era. 

References

Barrett, E.T., 2013. Warfare in a new domain: The ethics of military cyber-operations. Journal of Military Ethics, 12(1), pp.4-17.

Blowers, M. and Williams, J., 2014. Machine learning applied to cyber operations. In Network science and cybersecurity (pp. 155-175). Springer, New York, NY.

Gellman, B. and Nakashima, E., 2013. US spy agencies mounted 231 offensive cyber-operations in 2011, documents show. The Washington Post, 30.

Jun, J., LaFoy, S. and Sohn, E., 2016. North Korea's cyber operations: Strategy and responses. Rowman & Littlefield.

Junio, T.J., 2013. How probable is cyber war? Bringing IR theory back in to the cyber conflict debate. Journal of Strategic Studies, 36(1), pp.125-133.

Kallberg, J., 2013. Cyber Operations–Bridging from Concept to Cyber Superiority. Joint Forces Quarterly, (68).

 Roscini, M., 2014. Cyber operations and the use of force in international law. Oxford University Press, USA.

Schmitt, M.N. ed., 2017. Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). Assessment Of Making Decisions In Modern Information Environment, Theoretical And Practical Aspects Of Computer Security And Operations, And Advanced Principles In Computer Security From A Systems Perspective Essay.. Retrieved from https://myassignmenthelp.com/free-samples/7com1069-cyber-operations.

"Assessment Of Making Decisions In Modern Information Environment, Theoretical And Practical Aspects Of Computer Security And Operations, And Advanced Principles In Computer Security From A Systems Perspective Essay.." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/7com1069-cyber-operations.

My Assignment Help (2020) Assessment Of Making Decisions In Modern Information Environment, Theoretical And Practical Aspects Of Computer Security And Operations, And Advanced Principles In Computer Security From A Systems Perspective Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/7com1069-cyber-operations
[Accessed 22 November 2024].

My Assignment Help. 'Assessment Of Making Decisions In Modern Information Environment, Theoretical And Practical Aspects Of Computer Security And Operations, And Advanced Principles In Computer Security From A Systems Perspective Essay.' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/7com1069-cyber-operations> accessed 22 November 2024.

My Assignment Help. Assessment Of Making Decisions In Modern Information Environment, Theoretical And Practical Aspects Of Computer Security And Operations, And Advanced Principles In Computer Security From A Systems Perspective Essay. [Internet]. My Assignment Help. 2020 [cited 22 November 2024]. Available from: https://myassignmenthelp.com/free-samples/7com1069-cyber-operations.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close