solved Discussion RequirementsA substantive comment should be approximately 300 words or

Discussion RequirementsA substantive comment should be approximately 300 words or more for each of the responses (2 responses TOTAL).Read the initial comments posted by your classmates and reflect upon them.Before writing your comments:Review the Discussion grading rubric to see what is expected for an excellent discussion, in order to earn full credit.Review some resources to help you synthesize, such as the following:Sullivan, J. (2011). Strategies for Synthesis Writing. Retrieved from http://www.findingdulcinea.com/features/edu/Strategies-for-Synthesis-Writing.htmlNOTE: You are required to cite sources and include a reference list for the second post if it is simply your opinion. However, if your opinion is based on facts (as it should be), it is good practice to strengthen your position by citing sources.Be sure to meet all of the criteria in the rubric, as noted in the instructions above.Third post for each module discussion:Read the initial and secondary comments posted by your classmates and reflect upon them.Directly respond to at least one classmate in a way that extends meaningful discussions, adds new information, and/or offers alternative perspectives.MY DISCUSSION (DO NOT RESPOND TO THIS POST PLEASE)(DO NOT RESPOND TO THIS POST PLEASE)(DO NOT RESPOND TO THIS POST PLEASE)(DO NOT RESPOND TO THIS POST PLEASE)Classmates and Professor,My biggest fear in cyberspace is the hacking of personal financial details by criminals. I imagine cyber criminals hacking into financial institutions and gaining access to the data on personal financial status and gaining access to that person’s finances. Banks and financial institutions should have strict ways of safeguarding the customer’s details and maintaining strong passwords that cannot be broken into. They should come up with ways of protecting personal data and make sure the data is not breached and that it is kept safe (Hartwig & Wilkinson, 2014). They should also introduce antivirus to their computers so that they are not easily broken into.The governments should think about cybercrime and try to come up with policies that can guard against cyber-crime. They should also consider coming up with a force that will prevent this serious crime and even establish a law-enforcing department where cyber-crime can be dealt with. Cybercrime is becoming the greatest threat to national security, and this should be addressed by all governments. There should be a global concern about cybercrime, and it is high time professionals are sought to deal with these cybercrimes (Causey, 2013). It should be a concern of all parliaments to come up with laws that deal with cybercrime and establish a force to deal with these crimes.I would rate cybercrime in the United States as the greatest threat to national security. Placing it at number one is because the threats are increasing daily in number and magnitude, and they have become a threat to national security and economic growth. Cyber-criminals are going to the extent of hacking the federal government’s information, leading to a severe breakdown of the national security system (Boot, Max, 2015). The United States has many threats to its security, such as terrorist attacks and nuclear weapons like those mounted by Russia, but cyber threats remain a threat to national security. Governments should train professionals who can fight this cybercrime and develop policies that deter this crime from happening. Individuals and companies should also look for ways of ensuring their computers are safe such as coming up with strong passwords for their computers.PedroReferencesBoot, M. (2015, July 12). What Is the Greatest Threat to U.S. National Security? Retrieved from Commentary: https://www.commentarymagazine.com/max-boot/greate…Causey, B. (2013 , January). How to Conduct an Effective IT Security Risk Assessment. Retrieved from Informative Week Reports: https://security.vt.edu/content/dam/security_vt_ed…Hartwig, R. P., & Wilkinson, C. (2014, June). Cyber Risks: The Growing Threat. Retrieved from Insurance Information Institute: https://www.iii.org/sites/default/files/docs/pdf/p…RESPONSE 1Classmates,There are several concerns about cyberspace. The first being that cybersecurity may fall out of step with cyber-attacks and cybercrimes; especially within the confines of business and government organizations. Mr. Singer highlights an interesting fact that MBA programs aren’t unanimously incorporating courses that cover cybersecurity as an integral part of management (Singer, 2014). Although the article is dated, I found that a mainstay is information technology MBAs that offer courses in cybersecurity and cybersecurity management practices. I’m not suggesting that if cybersecurity is a core course throughout all MBAs, regardless of concentration, that it will diminish the cybersecurity concern. Albeit, it will help guide smart and sound cybersecurity-related decisions for managers throughout businesses and government organizations. It will most likely also help account for proactive funding allotments instead of ‘after-the-fact’ adjustments and funding appropriations.Separately, the concern that as the cyber realm continues to expand and grow; both in size and complexity, as do the risks and vulnerabilities. For example, the U.S. critical infrastructure is highly interconnected and dependent on other critical infrastructures. Nearly all 17 different critical infrastructure sectors have some reliance on the energy infrastructure sector. If the power grid is hacked, disabled or otherwise incapacitated: agriculture, transportation, communication, energy, information technology, and other sectors will be undermined as well. This heavy reliance should be considered intimately when developing national security strategies and national cybersecurity programs.Cyber threats rank amongst the top 5 greatest threats to the U.S. Although, I don’t feel it’s that simple of an answer because national security threat categories (e.g. nuclear, cyber, terrorism, etc) and the actors behind those threats are intertwined. As ex-Chairman, Joint Chiefs of Staff, Joe Dunford mentioned that Russia, China, North Korea, and the Islamic State are amongst the top existential threats (Boot, 2015). The means of how those nations pose threats to our national security changes as time progresses. Cyber being the latest and most potent in decades since the Cold War and the nuclear escalation between the U.S. and U.S.S.R. The, then Director of National Intelligence, Daniel Coats, mentioned that the tactics of our well-known adversaries continue to change and diversify, but the actors perpetrating the attacks are more consistent (Fredericks, 2019). I agree; I think that the greatest threat is a two-part answer, in which Russia or China would top the greatest sponsor of attacks against the United States. Secondly, the great threat by means of the type they utilize to attack with would be cyber-based.BishopReferences:Boot, M. (2015, July 12). What Is the Greatest Threat to U.S. National Security? Retrieved from: https://www.commentarymagazine.com/max-boot/greatest-threat-to-national-security/Fredericks, B. (2019, January 29). Intel officials reveal the greatest threats to US national security. Retrieved from: https://nypost.com/2019/01/29/intel-officials-reveal-the-greatest-threats-to-us-national-security/Singer, P.W. (2014, January 12). What Americans should fear in cyberspace. Retrieved from: http://www.latimes.com/opinion/op-ed/la-oe-singer-cyber-security-20140122-story.html#ixzz2rB3lXtNMRESPONSE 2Classmate and Professor,What is your biggest fear in cyberspace?Cyberspace threats are and will still be a problem for many people (Singer, 2014). The reason is that almost all aspects of life are becoming technologically driven. Thus, as long as we use the Internet, there will be cyber risks. Conversely, my biggest fear in cyberspace is a phishing attack. The type of attack is becoming rampant and increasing at an alarming rate. There is also a lot of security gaps within the new technology. Therefore, cybercriminals are going to take this advantage and attack people from different angles. With phishing, cybercriminals can easily attempt to obtain sensitive information such as usernames and passwords by posing as a trustworthy entity in the electronic communication medium. Phishing is the biggest fear in cyberspace because it quickly lures users by communication purporting to be from trusted sources such as banks and social media sites. Equally, phishing cybercriminals use technology and human knowledge to manipulate people into actions that serve the purposes of the attackers.Where do you think cyber threats rate compared to all threats to U.S. national security? Justify your answer.Compared to the weapon of mass destruction and other attacks, a cyber attack is the number one risk to U.S national security. The argument is based on the recent pool that concluded that “Americans are more afraid of a cyber attack than they are of Iranian nuclear weapons, the rise of China or climate change (Boot, 2015)”. Cyber attacks are a big deal. Once launched, they can cause electrical blackouts and breaches to national security secrets. They can also lead to the failure of military equipment. Equally, cyber threats to U.S national security are increasing in terms of severity of impact, scale, and frequency. The range and method s of cyber attacks are also expanding by targeting different systems in the U.S national security. Certainly, there are increasing threats in the cyber world, which puts the U.S national security at more risks.ThomasReferencesBoot, M. (2015). What Is the Greatest Threat to U.S. National Security? Commentary Magazine. Retrieved from https://www.commentarymagazine.com/max-boot/greate…Singer, P. (2014). What Americans should fear in cyberspace. Los Angeles Times. Retrieved from https://www.latimes.com/opinion/op-ed/la-oe-singer…_________________________________________________________________________________________________Module 4 – BackgroundPOINTS OF DISTRIBUTION (PODS) AND THE STRATEGIC NATIONAL STOCKPILERequired ReadingAlameda County. (2012). Points of dispensing: Just in time training videos 1-10. Retrieved from http://www.acphd.org/phep/podtraining.aspxCarbon County Public Health (2014) Point of dispensing operations. Retrieved from DHHS (n.d). BARDA strategic plan: 2011-1016. Retrieved from https://www.phe.gov/about/barda/Documents/barda-st…FEMA (2016) Emergency Support Function (ESF) #8, National Response Framework. (read Coordination for obtaining, assembling, and delivering medical equipment and supplies to the incident area.) Retrieved from https://www.fema.gov/media-library-data/1470149644…Hernandez, I., Ramirez-Marquez, J.E., Starr, D., McKay, R., Guthartz, S., . . . Barcellona, J. (2015). Optimal staffing strategies for points of dispensing. Computers and Industrial Engineering, 83, 172-183. Available at Trident Online Library.Khan, S. & Richter, A. (2012). Dispensing mass prophylaxis — The search for the perfect solution. Homeland Security Affairs 8(3). Retrieved from https://www.hsaj.org/articles/206Oregon Public Health Division (2012) Mass prophylaxis point of dispensing (POD) field operation guide. Retrieved from https://www.oregon.gov/oha/PH/PREPAREDNESS/PARTNER…Paul, J. A., & Hariharan, G. (2012). Location-allocation planning of stockpiles for effective disaster mitigation. Annals of Operations Research, 196(1) 469-490. Available at Trident Online Library.Potter, M.A., Brown, S.T., Lee, B.Y., Grefenstette, J., Keane, C.R., Lin, C.J., . . .Burke, D.S. (2012). Preparedness for pandemics: Does variation among states affect the nation as a whole? Journal of Public Health Management Practice, 18(3), 233-240. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC37582… . Read “Discussions and Limitations” and “Conclusions.”Rebman, T., Loux, T.M., Zink, T.K., Swick, Z., & Wakefield, M.(2015). Infection prevention and mass vaccination training for U.S. point of dispensing staff and volunteers: A national study. American Journal of Infection Control, 43, 222-227. Available at Trident Online Library.Required WebsitesCDC 12 Hour Push Package. https://www.cdc.gov/phpr/stockpile/pushpackage.htmCDC Strategic National Stockpile. https://www.cdc.gov/phpr/stockpile/index.htmGovernment Response to Coronavirus, COVID-19. https://www.usa.gov/coronavirus

Looking for an Assignment Help? Order a custom-written, plagiarism-free paper

Order Now