1. Not only must asymmetric advantages be countered domestically, attackers often originate from outside the United States. Given that situation, describe how the Westphalian model would aid cybersecurity at the global level.
Answer:
2. This week we are reviewing responses to an asymmetric threat.
A. What is an asymmetric threat?
B. Describe some dynamic approaches for defending against an asymmetric threat.
Answer:
3. Revolutionary change often creates a paradigm shift. Given a new paradigm, it would be beneficial to redraw the cybersecurity landscape, critically assessing how the problem of cybersecurity should be defined.
What exactly is cybersecurity? Is it a function or task? Is it a strategy? Is it about crime? Is it about national security?