Response to below post needed, needs to be a dialogue.After watching the video I have the following thoughts on the subjects discussed:The first speaker was asked about of his thoughts about being proactive against cyber-attacks instead of being reactive. Professor Hulnick stated that the intelligence community is anticipating how attacks might affect us, but there are not definitive answers yet. (YouTube, 2010) I feel that it may be possible to be proactive on some attacks, but it will never occur 100\%. There will always be new technology and new methods of attacks that will be developed which may not allow this, and we must react to these new attacks when they occur. Albeit, the second speaker did mention research, which may allow a more proactive stance.Dr. Popp stated he thought more research must be accomplished for analysis of fingerprints to predict attacks. But, he believed that this research should be done in an unclassified method and should include watchdog groups to ensure privacy is not being violated. (YouTube 2010) Now I really don’t know if accomplishing this in this unclassified manner is worthy. This might allow the procedures of “fingerprinting” to be fully known to the public, thus maybe making it easier for the bad guys to find ways around this.Lastly Professor Reyzin discussed cyber weapons, and mentioned a worm that traveled around ending up in a nuclear facility. This facility did not keep its operational systems and business systems separate, thus allowing the worm to infect its safety system. He mentioned that keeping these systems separate may be a form of defense. (YouTube, 2010) However in June 2010 there was an attack called Stuxnet, which jumped this air gap and infected the operational system of Iran nuclear facilities. Granted this worm did target specific systems by using removable media and multiple zero-day vulnerabilities, along with advanced targeting techniques. (ISC2, 2011) Nonetheless it did prove that keeping systems separate was not the perfect defense.On a different note, if you haven’t watched it and have access to it…Showtime has a documentary called Zero Days. This is a documentary about the Stuxnet virus and how it worked. Pretty interesting how it was discovered and designed.References:ISC2 Government Advisory Council Executive Writers Bureau. (2011, March 21). GCN. Retrieved from (2010, April 10). Cyber Terrorism and Warfare: The Emergent Threat. Retrieved from

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.