Cyber terrorism vs. cyber warfare

Assignment Help Basic Computer Science
Reference no: EM132387325

Cyber terrorism vs. cyber war fare. The only known instance of cyberterrorism in the world today is the Stuxnet worm which was installed on computers in Iran to disable their nuclear reactors which can produce weapons grade fissionable material to enable Iran to develop a nuclear warhead. The Stuxnet worm was discovered by Kaspersky Labs which produced and marketed one of the most effective antivirus programs in the world. Kaspersky Labs traced the origins of the Stuxnet worm to the CIA. The Stuxnet worm was developed specifically to infect centrifuges in Iran's nuclear plant to disrupt their nuclear development program. It has been reported that Israeli security agencies were heavily involved in the mission to load the worm. A few years later, an NSA employee took various malware and tools home that the agency used in their cyber operations and loaded it on his personal computer. The computer had Kaspersky Labs antivirus loaded on it and alerted Kaspersky to the infection as antivirus programs are supposed to. It was reported that Israeli agents which were employed by Kaspersky reported that Kaspersky had ties to the Russian government. Shortly thereafter, US intelligence agencies released a report that Kaspersky had connections with the Russian government and recommended that Kaspersky antivirus and all other Kaspersky products be banned from Federal government computers. Considering the timing and sequence of events was Kaspersky banned because they had ties to the Russian government or were they banned because they exposed the Stuxnet worm and the CIA's attempt at disabling the Iranian nuclear program? Some people would say that the CIA's development and use of the Stuxnet worm was cyberwarfare. Others would say it was cyberterrorism. Which was it? Support your answer with research.

Reference no: EM132387325

Questions Cloud

Define strategic competitiveness and above average returns : Define strategic competitiveness and above average returns. How do they relate (What is the relationship between the two)?
What is the volume required to make purchasing : What is the volume required to make purchasing the widgets a good financial idea?
How many units are required to be sold each month : How many units are required to be sold each month if the selling price is $93?
How the employees might react to an manager use of the model : How the employees might react to an manager use of the model? Would this model allow manager to reveal the information they need in order to have an effective
Cyber terrorism vs. cyber warfare : Cyber terrorism vs. cyber war fare. The only known instance of cyber terrorism in the world today is the Stuxnet worm which was installed on computers in Iran
Consider celebrations of milestone events in life : Consider celebrations of milestone events in your life and how those celebrations affected your memory and attitudes toward achieving those objectives.
Small business networks in australia or your home country : How can social media such as LinkedIn, Facebook, and Twitter be used to improve knowledge sharing, build social capital, support innovation
What type of cancer would you target : You are starting a non-profit organization to raise money for cancer research. What type of cancer would you target, or would you target cancer as a whole?
Most critical tasks of all managers : Human Resource Management is one of the most critical tasks of all managers. Why?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create an er model for each of the following description

Each company operates four departments, and each department belongs to one company. Each company has a unique name, and each department has a unique number and name.

  Balance sheet for the central bank of an economy

Please write the new balance sheet if the bank makes a sterilized transaction by selling $100 of foreign assets for domestic currency

  What happens if an exception is thrown outside a try block

What happens if no catch handler matches the type of a thrown object?

  Write the differential equations for the mechanical systems

Write the differential equations for the mechanical systems shown in Fig. 2.39. For (a) and (b),

  Create direct-mapped data cache for the byte offset

Create the 128KB direct-mapped data cache which uses a 32 bit address and 16 bytes per block. Compute the following: How many bits are utilized for the byte offset?

  Equilibrium price and corresponding profits

Suppose a single firm produces all of the output in a contestable market. The market inverse demand function is P = 250 -5Q, and the firm's cost

  Suppose a finite deck of numeric cards

Suppose a finite deck of numeric cards 1, 2, 3, ... have been shuffled randomly. Repeat the following step: If the top card is numbered 1

  Define and discuss work breakdown structure

Define and discuss Work Breakdown Structure, Critical Path Analysis, PERT charts and GANTT charts. Describe the role of each in determining scope.

  What advantages does each topology have

What advantages does each topology have? What disadvantages? Compare the results of the two models.

  Describe the core skills the certification promotes

Using a Web browser, search on the terms "business continuity" and "certification." What do you find? Are there any certifications other than those listed in this chapter? If there is any, list one and describe the core skills the certification pr..

  Find the period and frequency of this spring

The second weight has a mass of 0.6 kilogram. Find the period and frequency of this spring.

  How would you go about deciding which car to buy

Let's say that you need a car. How would you go about deciding which car to buy?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd