{"id":198,"date":"2021-03-08T22:37:04","date_gmt":"2021-03-08T22:37:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/?p=198"},"modified":"2021-04-26T14:25:33","modified_gmt":"2021-04-26T14:25:33","slug":"compare-cyber-security-risks-in-the-united-states-and-another-country","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/03\/08\/compare-cyber-security-risks-in-the-united-states-and-another-country\/","title":{"rendered":"J4: Compare cyber security risks in the United States and another country."},"content":{"rendered":"Comparing China and the United States.\n\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n\nThe United States and China are vastly different, partially because \u201cit is\ndifficult to unpack, mainly because it does no fir traditional interpretations\nof how a state regulates operations in other non-cyber domains\u201d (Potter).\u00a0 The United States seems to really struggle with responding to China\u2019s cybersecurity policy.\n\nReason 1: \u201cScale is difficult to define\u201d (Potter).\u00a0 It is already difficult as is to get an\naccurate account of the scale of cyber threats because of the various number of\nfactors, as \u201ccompanies are often cyber immature.\u201d\u00a0 In other words, they aren\u2019t practicing solid and secure cyber security regimes. \u00a0This can lead to organizations failing to correctly establish protective measures against the threat environment \u2013 or simply put, threats will go unnoticed.\u00a0 If threats go unnoticed, things continue as\nis, nothing gets fixed, and it provides a false sense of security.\n\nReason 2: \u201cChine sees cyber security differently \u2013 cyber [security] is no\nexclusively a government enterprise.\u201d The average United States Company,\ncybersecurity threats are just business risks and \u201ctreated as an extension of\ntraditional physical security.\u201d\u00a0 As stated by most governments, especially the United States, cyber security falls under two primary categories: extension of traditional espionage and extension of weapons development.\u00a0 In China, there is nothing more to it \u2013 they consistently use \u201ccyber security attacks as a natural extension of its sovereignty.\u201d Within China, more specifically, Beijing define cyber security as ownership and control.\u00a0 Those doing business are required to comply with regulations set forth.\n<!-- [if !supportLineBreakNewLine]-->\n<!--[endif]-->\n\n<!-- \/wp:paragraph -->\n<p class=\"MsoNormal\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Comparing China and the United States. The United States and China are vastly different, partially because \u201cit is difficult to unpack, mainly because it does no fir traditional interpretations of how a state regulates operations in other non-cyber domains\u201d (Potter).\u00a0 The United States seems to really struggle with responding to China\u2019s cybersecurity policy. Reason 1: &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/moralesrebekah\/2021\/03\/08\/compare-cyber-security-risks-in-the-united-states-and-another-country\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">J4: Compare cyber security risks in the United States and another country.<\/span><\/a><\/p>\n","protected":false},"author":19836,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/198"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/users\/19836"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/comments?post=198"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/198\/revisions"}],"predecessor-version":[{"id":218,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/posts\/198\/revisions\/218"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/media?parent=198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/categories?post=198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/moralesrebekah\/wp-json\/wp\/v2\/tags?post=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}