Question

In: Computer Science

How should the U.S. government respond to a hacking attack by China in which the hackers...

How should the U.S. government respond to a hacking attack by China in which the hackers shut down critical military communications for several hours?*

*This is hypothetical; such an attack has not occurred.

Solutions

Expert Solution

1). ANSWER :

GIVENTHAT :

In 1899, diplomatic representatives from the world’s leading nations, many in elegant suits adorned with gold pocket watches and sporting exquisite waxed mustaches, gathered in the Hague, Netherlands, for a grand conference. The diplomats set out to achieve nothing less than taming the destructive potential of a new military technology. The recent invention of motor-driven military aircraft had led all nations to fear man-made storms of balloons raining bombs on their cities.

The United States again confronts the grim challenge of managing technological advances and their implications for warfare (as it has several times since, from chemical weapons to missiles to drones). Today, cyberweapons are nearly as synonymous with military power as fighter jets. What’s more, as demonstrated by the recent New York Times report on the cyberattacks used to disrupt North Korean ballistic missile tests and the latest WikiLeaks claims about a CIA hacking unit, cyber capabilities are too tempting for governments to refrain from using — even in peacetime.


Related Solutions

How did the U.S. government respond to the challenges of the Great Depression and World War...
How did the U.S. government respond to the challenges of the Great Depression and World War II with a more interventionist role in the economy and society? How did the messages of sacrifice, service, and community manifest during these two crises?
After WikiLeaks released thousands of confidential U.S. government diplomatic and military documents on the Web, hackers...
After WikiLeaks released thousands of confidential U.S. government diplomatic and military documents on the Web, hackers conducted a denial-of-service attack on the WikiLeaks website. On the other hand, when major credit card companies stopped processing donation to WikiLeaks, other hackers attacked the credit card companies. Do you think that it is justifiable for each of the above action? Please justify your answer with arguments based on two workable ethical theories. i.e. Kantianism, Utilitarianism (Act and Rule), Social Contract, and Virtue
Mischievous hackers have employed ‘Theft of Service Attack’ on your IT infrastructure. How would you explain...
Mischievous hackers have employed ‘Theft of Service Attack’ on your IT infrastructure. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
How did the U.S. government and Federal Reserve respond to the perfect financial storm in 2008-2009...
How did the U.S. government and Federal Reserve respond to the perfect financial storm in 2008-2009 and recent world health pandemic (covid-19) Briefly explain.
How should government policymakers respond to the business cycles? (Hint: “The Federal Reserve’s job is to...
How should government policymakers respond to the business cycles? (Hint: “The Federal Reserve’s job is to take away the punch bowl just as the party gets going” says William Mc Chesney Martin. On the other hand Milton Friedman says “What we need is not a skilled monetary driver of the economic vehicle continuously turning the steering wheel to adjust to the unexpected irregularities of the route, but some means of keeping the monetary passenger who is in the back seat...
Write a brief report on KRACK Attack . The report should include how the attack works...
Write a brief report on KRACK Attack . The report should include how the attack works ? How the devices can be protected against this attack
The u.s government should or should not reduce environment regulations to promote economic growth. how environmental...
The u.s government should or should not reduce environment regulations to promote economic growth. how environmental regulation stimulating technological innovation ? how does environmental regulations benefit the companies ? how does " green economy " created more jobs nowadays ? how does  environmental regulations and technological innovation be complementary ?
Should the U.S. government create an "automatic annuity" system in which, some portion of IRA or...
Should the U.S. government create an "automatic annuity" system in which, some portion of IRA or 401(K) balances are converted to a fixed annuity at retirement? Explain your opinion
Someone posted from a discussion question.... (Respond to it) Three roles of the U.S Government in...
Someone posted from a discussion question.... (Respond to it) Three roles of the U.S Government in the health care system and in health insurance are provider, payer and lawmaker. The Government are the providers of healthcare services. Some of these healthcare services include Veterans Health Association, Medicare, Medicaid and they support research into new healthcare. The Government are the payers of the third party services. The two main kinds of third party services are private insurance and government programs. Lawmakers...
How should companies respond to government request to break their own security systems. Apple has had...
How should companies respond to government request to break their own security systems. Apple has had numerous requests from law enforcement to break into iPhones confiscated in criminal and terrorism cases. Can Apple be forced to provide a “backdoor” allowing government agencies to defeat the security they have designed into their products
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT