Research Questions
This study will address the following research questions:
1: What would the United States Air Force have to do to achieve cyberspace supremacy?
2: How can the typical computer user protect himself/herself from vulnerabilities and cyber threat actors?
3: What are some common sense rules and regulations that should be implemented in cyberspace?
4: What is the importance of cyberspace and why is it so critical to the Air Force and national security?
5: Do the current applicable rules and regulations in cyberspace are enough to deter cybercrime?
6: What are the limitations with prosecuting international cyber threat actors?
7: Are certain hardware and software classified as hacking tools? If yes, should the authorities account for the individuals who buy them?
8: Is it an achievable goal for the Air Force to attain cyberspace supremacy?
8: How can cyberspace users and/or organizations protect their ICT systems from cyber threat actors?