{"id":326,"date":"2023-12-05T04:07:49","date_gmt":"2023-12-05T04:07:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ethanlombos\/?p=326"},"modified":"2023-12-05T04:07:49","modified_gmt":"2023-12-05T04:07:49","slug":"article-2-review","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ethanlombos\/2023\/12\/05\/article-2-review\/","title":{"rendered":"Article 2 Review"},"content":{"rendered":"\n<p>Today I will be reviewing the article \u201cIs there a cyber security dilemma? \u201d by Carly E<br>Beckerman. This article goes over the rise of cyber attacks and tries to fully understand cyber<br>attacks. As governments are trying to understand cyber attacks and battle cyber attacks. Cyber<br>attacks are still on the rise and wreaking havoc in the cyber space. Also this article goes over the<br>dangers that cyber attacks can introduce to the world. Plus it shows what the higher ups are<br>trying to do to prevent a cyber attack happening.<\/p>\n\n\n\n<p>While the title of this article is \u201cIs there a cyber security dilemma?\u201d This article states<br>that there is no dilemma. But it is more of higher ups and people trying to fully understand what<br>a cyber attack is and how to prohibit cyber attacks from happening. One aspect that higher ups<br>are trying to get a grasp of is if a cyber attack does happen to a state. They are trying to find out<br>if that cyber attack leads to a war between the two states. While this is currently a mixed answer<br>to that question. It is tough to say because cyber attacks are such a new and shiny threat no one<br>really knows unless it happens. But the best thing to do is prepare for the worst and that is what<br>the higher ups are currently doing while trying to understand cyber attacks.<\/p>\n\n\n\n<p>One of the precautions that the higher ups are preparing for is a NCR framework. A NCR<br>framework ensures safety from cyber attacks. The article states \u201cNCR allows for a layered<br>framework to interrogate the interplay between these different levels of analysis \u201d and \u201cThis<br>means that, in order to explain any foreign policy case or phenomena, NCR frameworks must<br>untangle the role played by systemic prompts and constraints but also pin-point which unit-level<br>variables are intervening within that structural context\u201d. It seems like a NCR framework is a<br>great thing to have on your side while battling cyber attacks based on what the article says.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Source <\/h2>\n\n\n\n<p><a href=\"https:\/\/academic.oup.com\/cybersecurity\/article\/8\/1\/tyac012\/6705410?searchresult=1\">https:\/\/academic.oup.com\/cybersecurity\/article\/8\/1\/tyac012\/6705410?searchresult=1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today I will be reviewing the article \u201cIs there a cyber security dilemma? \u201d by Carly EBeckerman. This article goes over the rise of cyber attacks and tries to fully understand cyberattacks. As governments are trying to understand cyber attacks and battle cyber attacks. Cyberattacks are still on the rise and wreaking havoc in the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ethanlombos\/2023\/12\/05\/article-2-review\/\">Read More<\/a><\/div>\n","protected":false},"author":25871,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts\/326"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/users\/25871"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/comments?post=326"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts\/326\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/posts\/326\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/media?parent=326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/categories?post=326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ethanlombos\/wp-json\/wp\/v2\/tags?post=326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}