(10 points) Question 1. The United States has taken the position that the acceptability of cyber espionage depends upon the motivation of the espionage and what is done with the stolen information. This is most obvious in the United States position towards China’s espionage activities. What does the United States believe is an appropriate motivation for espionage, and what is inappropriate? Your answer must include an example of each. (your answer to this question should be 100-200 words)
(10 points) Question 2. You are in charge of IT for an electric utility. The CEO of the company suggests disconnecting the company’s computer network from the internet so that you don’t have to worry about all of that “cybersecurity stuff”. Describe two reasons why you would still have to worry about all of that cybersecurity stuff. (your answer to this question should be 100-200 words)
(10 points) Question 3. Explain whether you believe the following statement to be true, and why or why not? Countries are unlikely to attack the United States in cyberspace because they fear that the United States will retaliate with cyberattacks against them. (your answer to this question should be 100-200 words)
(20 points) Question 4. You have been hired by a presidential candidate as a cybersecurity advisor. Write an essay for the candidate proposing what you believe is the most important action/policy/law the candidate should pursue (if elected) to improve cybersecurity in the United States.
Your essay must include the following:
- A description of the proposal.
- What effect would implementing the proposal have – how would it improve cybersecurity?
- Which of the three elements of deterrence is the proposal most closely related to?
- Identify at least one cyber attack we have read about this quarter (sony attack, Target attack) where the proposal would make the attack less likely to succeed, and explain why. (your answer to this question should be 250-350 words)