Tip:
Highlight text to annotate it
X
[ Music ]
>> As a citizen of the United States if an organization
or an individual actually turned off my power or poisoned my water or caused an airplane to crash
through the electronic systems that support that,
I sure hope the United States would respond somehow.
>> That brings up the whole issue of attribution, which is; in my opinion at least,
is probably the most difficult problem in cyber security.
You know, guaranteeing you need to be pretty certain
who launched the attack before you strike back.
And that's very, very difficult to do because we can make attacks.
I shouldn't say we.
People can make attacks look like they originated from almost anywhere.
In reality, many of them originate right here in the United States
and just routed through other countries.
>> We have very clear policy about the use of nuclear weapons, for example.
It's unambiguous what the United State's response would be
if somebody fired a nuclear weapon at us.
We have very clear policy on invasion.
You know, somebody came in through Mexico or Canada, we'd know what we're going to do.
But we don't have clear, national policy that says it is the policy of the United States
to do the following if there's a cyber attack that meets such and such a threshold.
>> And I think that's one of--
>> And I think we have to have that.
Right?
>> Agreed.
>> And I think that's one of the great things about the UMUC curriculum
because there are courses where students are challenged
to think critically about those policy issues.
And that area is ripe with opportunity.
Whether you're a student, whether you're a private citizen, whether you're a member
of the government to include the legislative branch or the judicial branch of the government,
those discussions need to happen before we actually wake up one day
and see a catastrophic effect of a cyber attack.
[ Music ]