Strategic analogies from cybersecurity strategy

In a short paragraph or two, post on this week's discussion board a response to this prompt:

Identify 1 or 2 strategic analogies from this week's readings that you think would be helpful for US cybersecurity strategy. What about these analogies makes them particularly applicable to cyber?

Sample Solution