Discus the cyber threats rate compared to all threats to U.S. national security

Question #1

Vulnerability is becoming a focal problem, especially with the increase use of drones and the real probability of drone hijacking by hackers.

In the field of construction, vulnerability is defined as a measure of the susceptibility of an element or combination of elements to fail once they are exposed to potentially damaging natural phenomena. It is obvious that this definition is deficient given the potential threats to in this country’s infrastructure from terrorist activities.

Traditionally, vulnerability analysis met five basic objectives. These objectives are as follows: 1) identification and quantification of hazards that can affect system, whether they are natural or derive from human activity; 2) estimation of the susceptibility to damage of components that are considered essential to providing water in case and disaster; 3) definition of measures to be included in the mitigation plan. These measures aimed to decrease the physical vulnerability of the systems components; 4) Identification of measures and procedures for developing and emergency plan; and, 5) evaluation of the effectiveness of the mitigation and emergency plans, and implementation of training activities.

  1. In your opinion, which of the above basic objectives need revision because of increased threat brought about by cyber threats and social media prevalence (people posting pictures and snippets that could divulge information, like layouts, schedules, or problems).
  2. What additional objective would you propose? If there is consensus on a few objectives, what are the issues that would arise if these are accepted?

Question # 2

Read the following articles:

What Americans should fear in cyberspace, by P.W. Singer, January 12, 2014

What Is the Greatest Threat to U.S. National Security?  By Max Boot, July 12, 2015

  1. What is your biggest fear in cyber space?
  2. Where do you think cyber threats rate compared to all threats to U.S. national security?  Justify your answer.