CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners) by STEVEN MICHAEL & STEVEN MICHAEL

CYBER SECURITY: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (An Essential Guide to Ethical Hacking for Beginners) by STEVEN MICHAEL & STEVEN MICHAEL

Author:STEVEN, MICHAEL & STEVEN, MICHAEL [STEVEN, MICHAEL]
Language: eng
Format: epub
Published: 2019-09-03T16:00:00+00:00


Donald Trump - America First

The new Strategy has become a logical continuation of the policy of recent years, and now consolidates it at the doctrinal level. As already mentioned, the most similarities to her are with the policies of George W. Bush Jr., at the same time, some theses were taken from B. Obama and finalized to current needs. The first thing that got attention to itself in the new cyber strategy is the formation of an image of an external threat to freedom and democracy and a focus on providing peace with force. The Strategy lists, again and again, the primary opponents - Russia, China, Iran, North Korea, and international terrorism. Also, it is clear that a document of this level does not imply any evidence. On the contrary, it is said that most of the world accepts the American vision of “common and open cyberspace working for the common good,” while malicious actors attack other countries, and even dare to use cyberspace to counter military, economic and political superiority the USA. The strategy recognizes that a purely technocratic approach is not suitable for counteracting such actors - political steps are needed to contain and prevent further escalation. And one of these steps is the course towards rallying allies and friendly states around the United States.

The policy stated in the document is centered on four pillars: protecting American citizens, the country, and the American way of life; promoting America's prosperity; maintaining peace by force; the spread of American influence. In some areas, one can find specific examples of recent events that formed the basis of a new policy that could affect not only US cybersecurity but also international relations in the field of security of the ICT environment as a whole.

Cybersecurity risk management to increase the reliability and stability of information systems, including at mission-critical sites, is the main task of the first pillar of the new Strategy. One of the new things of domestic policy is the advancement of a risk management system in the federal level supply chains, which includes, inter alia, the definition of clear powers to exclude (in some cases) from the supply and procurement process those suppliers of products and services that are considered risky. These actions will be connected with efforts to manage risks in the supply chains associated with the country's infrastructure. It seems that the degree of risk of using the products of one or another supplier should be determined in each individual case. At the same time, the available examples of the implementation of such a policy allow us to state with confidence that, according to the United States, the leading unreliable suppliers are located in Russia and China. So, the first “touchstone" was the ban introduced last year for use in national networks of Kaspersky Lab software products. The adoption of such a decision was not prevented by the lack of evidence of the company's involvement in malicious activities. Such a decision, made under the pretext of national security,



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.