Cybersecurity and cyberwarfare critical thinking examples

Never trust your gut

Cyber space deals with artificial manmade machines and technology. Therefore, this will require system analysis, tests and checks to ascertain they are working in order (Gourley 1). One cannot just believe that they will work okay. If there is a fault, the system will definitely malfunction..

Devices in Cyber space are at risk of danger to opposition control

The various devices in cyberspace may be at risk of being compromised in terms of security. Measures need to be put in place to separate any device that is compromised and ensure their interactions with the rest of the cyberspace system are stopped (Gourley 1).

Do not look back you are never completely alone

The enemy is always on the lookout for any movements thus it is important also to be on the lookout for them also.

Do not harass the opposition

Harassing the opposition may result to the attacks, which expose the weaknesses in cyberspace. As long as the opposition is not harassed, chances of attacks are reduced.

Keeping options open

Never settle to the level of technology that is in use. Always strive to establish more powerful and new technology and individuals that are more experienced.

Protection of data

Vital data needs to be protected more secure than other data readily available. The number of individuals with access to important data needs to be few. Further there is need to have updating of classified rules for warfare (Shanker 1). This is because cyber threat is increasing at a high rate.

Vary your sources of information

Never rely on a single source to obtain credible information.
Always be prepared
The numbers of facilities that can be suffer a cyber attacks are many (Rauscher 1)
The cyber defenses running at all times even after an attack. Kneel (1) notes that hacking can occur in a matter of seconds, thus defenses need to be always up and running.

Works Cited

Gourley, Bob . ” Moscow Rules: The original protocol for operating in the presence of adversaries can be applied to cyber defense.” CTOvisioncom. N. p., n. d. Web. 6 Mar. 2014. http://www. ctovision. com/2013/05/moscow-rules-the-original-protocol-for-operating-in-the-presence-of-adversaries-can-be-applied-to-cyber-defense/
Knefel, John . ” How Do the Laws of War Apply to Cyberspace?.” Rolling Stone. N. p., n. d. Web. 6 Mar. 2014. http://www. rollingstone. com/politics/news/how-do-the-laws-of-war-apply-to-cyberspace-20130701
Rauscher , Karl . ” It’s Time to Write the Rules of Cyberwar.” – IEEE Spectrum. N. p., n. d. Web. 6 Mar. 2014. http://spectrum. ieee. org/telecom/security/its-time-to-write-the-rules-of-cyberwar
Shanker, Thom. ” Pentagon Is Updating Conflict Rules in Cyberspace.” The New York Times. The New York Times, 27 June 2013. Web. 6 Mar. 2014. http://www. nytimes. com/2013/06/28/us/pentagon-is-updating-conflict-rules-in-cyberspace. html