Discover The CTU Experience
There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.
In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.
These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.
The East African region, and neighboring Yemen – located just across the Bab al Mandab straight – have been a central area of activity for al Qaeda, its affiliates and fellow travelers. Prior to 9/11, al Qaeda carried out its first major attack against the United States in the region when, in August of 1998, al Qaeda suicide bombers attacked the U.S. embassies in Nairobi, Kenya and Dar es Salaam, Tanzania.
Cyber is in. Government officials share worries over cybersecurity. The Intelligence Community warns of cyber threats from nation states, anarchist groups and lone wolves. Civil liberties watch groups decry infringements of privacy and individual rights by state-sponsored cyber eavesdropping.
Another technology is making inroads into our professional lives, while experts begin to weigh its benefits against the security risks.
All governing systems have their pros and cons and the constitutional system that we have in the United States is no exception. One could argue that the single theme that has served as a central thread throughout American history is the old argument between Thomas Jefferson and James Madison over the role, power and authority of state versus federal governments.
How secure is your business from a cyber attack? If your organization is attacked, what will you lose, both in the attack and in the aftermath or recovery?
The People’s Republic of China is governed by the Chinese Communist Party or CCP. China is a one-party authoritarian state and the CCP is committed to maintaining a permanent monopoly on political power. China today has a collective leadership and major decisions require consensus among the CCP’s senior echelons, unlike North Korea and Cuba whose Communist parties have acted as support structures for the rule of dictators.
At the dawn of the Twentieth Century, China found itself divided, weak, and subject to the predations of colonial powers.
On August 5, 2012, white supremacist Wade Michael Page carried out an act of domestic terrorism gunning down six Sikh worshipers and injuring several others, including a police officer who responded to the emergency call.
We need to take a hard look at our cybersecurity policy and ensure those that that frame it are the best minds private and public sectors can bring to the table.
Our Global Security Series offers background and analysis on issues related to U.S. national and global security. In Dr. Morag’s fourth post covering Syria, he continues to provide insight into the history and key players in Middle-Eastern conflict.
The Waldo Canyon fire is mostly gone, now, but has left its mark on the mountainside, the neighborhood, and the hearts of people. My thoughts go out to those who lost their homes.
CTU’s Global Security Series offers background and analysis on issues related to U.S. national security and homeland security. In Dr. Morag’s third post covering Syria, he provides an overview of the country’s role in regional conflict.
Copyright © 2016 Colorado Technical University (CTU). All rights reserved. No information may be duplicated without CTU's permission. The CTU logo is a registered trademark of Career Education Corporation. CTU cannot guarantee employment or salary. Not all programs are available to residents of all states. Programs vary by location and modality; see catalog for details. Financial aid is available for those who qualify. See the Accreditation & Licensure section for information on the agencies that approve and regulate the school's programs, including relevant complaint procedures here. Find employment rates, financial obligations and other disclosures below.