Global network vulnerability has become the concession and price to pay in maintaining connectivity to the Internet. The leadership at Cisco Systems estimates there will be 50 billion IP linked devices by 2020 with the capability to produce ten times the amount of data that are produced today (Oltsik, 2014). Sharing data between different organizations is a simple keystroke, and system vulnerabilities have become the natural by-product.
For this Case, answer the following:
1. Identify the types of risk and vulnerabilities associated with military and corporate data.
2. Explain the vulnerabilities that exist within military and corporate data. How do they relate to the study of Cyber Threat Intelligence?
3. Is the study of Cyber Threat Intelligence timely staged to mitigate the data risk to both military and corporate enterprises?
Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: An attacker-centric gamified approach. Technology Innovation Management Review, 5(1), 5-14.
Claus, B.; Gandhi, R.; Rawnsley, J.; and Crowe, J. (2015). “Using the oldest military force for the newest national defense.” Journal of Strategic Security, 8(4), 1-22. Retrieved from http://scholarcommons.usf.edu/jss/vol8/iss4/1
Iasiello, E. (2014). Is cyber deterrence an illusory course of action? Journal of Strategic Security, 7(1), 54-67.
Oltsik, J. (2014, October). The Internet of things: a CISCO and network security perspective. Retrieved from http://www.cisco.com/c/dam/en_us/solutions/industries/docs/energy/network-security-perspective.pdf
Reed, J. C., & Dunaway, N. (2019). Cyberbiosecurity implications for the laboratory of the future. Frontiers in Bioengineering and Biotechnology, 7, 182.