Monday, March 4, 2013

ILP 7

1) Situated Logos
         The key piece of evidence in this article is how the Pentagon wants to increase the Defense Department’s Command. They want more than 4,000 people to be a part of the Cyber Command than the current 900. They would like to implement three different forces under the Cyber Command to ensure security on the Pentagon’s computer systems, including “national mission force”, which protects computer systems that support the nation’s power grid and critical infrastructure; “combat mission forces,” plans and executes attacks on adversaries; and “cyber protection forces,” which secures the Pentagons computer system. According to the Pentagon, the forces are important to decrease the vulnerability of foreign computer hackers.
            I do trust the Pentagon’s opinion on why we should increase the cyber security there. I think the evidence the writer provided was enough and could not have included any other kinds of evidence. The article included a proposal on what should be done about the Pentagon’s cyber security, why it should specifically be done, and then gave example on what could happen if cyber security is not increased and the tragic things that have already happened.

2) Invented Logos
          The text makes use of the evidence by providing many examples. The author writes that the United States may have been facing a possible “Cyber-Pearl Harbor” without the needed protection. Then later goes on to state that America could be in for a national catastrophe if more technological advances are made in China, Russia, Iran and militant groups and if we don’t have the right protection.
The reasoning for this is understood because of their use of cause and effect in the article. There is only one main kind of value system being presupposed. That is, the Cyber Command increasing at the Pentagon to protect America, even though it may mean cuts in other areas at the Pentagon. They believe it’s vital to stop against emerging war attacks form the Iran in cyberspace, dismantling of the nation’s grid, transportation systems, financial network and security. The logic of the arguments made in the text makes the author credible because he interviews worker from the Pentagon, and gives many current examples.

3) Invention
           A potential research project that comes to mind when pondering upon this article is one consisting of why cyber security is important, why it needs to be stronger, examples of what could and can happen if we do not tighten our protection, and examples/ events of how it already has affected us.  I would have a great amount of detail on my project, and spend most of my time looking at proposals; seeing which ones work best for America. The majority of the articles, that I have read, go into to detail about how we should protect our cyber systems. Some proposals differentiate from one another, while others have similar plans to protect. Cyber security is a great challenge for America, and will no way be an easy task to protecting our systems. First, engineers have to be on one accord and agree upon how to make cyberspace safer, and then actually go about implementing just that.




1 comment:

  1. Great analysis, Najja--sounds like a very interesting article

    ReplyDelete