How should the us government react to the situation

Assignment Help Computer Engineering
Reference no: EM132083450

North Korea Fights Back?

North Korea has been accused by the Federal Bureau of Investigation (FBI) of being the mastermind behind the devastating attack against Sony Pictures Entertainment in December 2014.

However, it is far from certain that this was a state sponsored attack by a foreign government; some evidence points to a group of hactivists behind the attack. If North Korea is being falsely accused, as they have claimed, of being behind the attack they may now be fighting back to even the score.

The web site of the state-run North Korean news agency, which many users may have visited in order to get the Korean's side of the story, contains the file FlashPlayer10.zip served up by JavaScript code.

Not all users who visit the news agency web site are prompted to download this file: the JavaScript code looks first at the user's operating system, language preference, web browser version, and location before determining if the user should be prompted to download the file. This file contains two executable files--"Install Flash Player 10 Activex.exe" and "Install Flash Player 10 Plugin.exe"--that pretend to be part of the Adobe Flash player installation process but instead contain malware.

These files appear to steal passwords from browsers and perhaps perform other malicious actions. The time stamp on these files is actually prior to the Sony attack, but since time stamps can be easily manipulated it's not clear how long these files have been on the North Korean site.

Users who may have visited this site were urged to scan their computers for malware. In addition, Adobe itself later issued a fix for a critical vulnerability in its Flash software for both Windows and Mac OS editions.

Stay secure!

Homework Think Critically North Korea Fights Back:

Most Recent Activity

Submit an essay based on real-world scenario. The essay should be no more than 1-2 double spaced pages, size 12 font. It should have an introduction, a body and a conclusion. The essay could address any of the following questions:

1) Do you think North Korea was acting in what they thought was their best interest?

2) From a security stand point, what are people supposed to do?

3) How should the US government react to the situation?

4) What would be a good foreign policy when dealing with Cyber incidents like this?

5) How are computers supposed to be secure when hackers are coming up with new ways to attack computers every day?

6) What do you think the affect of actions like this are when it comes to computer security?

7) If there is another area you would like to address, feel free, but it should be relevant to the topic.

Requirements: I understand that students may not be the strongest writers, but you only get better with practice. I am not going to be the grammar police when it comes to this assignment but I would like you to write in complete sentences and synthesize your ideas.

I normally grade these assignments on whether or not you complete them as long as it is well written and follows a STRICT no plagiarism policy. You should use APA citation styles and all sources should be cited. If you are not familiar with APA, please google it. You should use at least 2 resources for the paper.

Reference no: EM132083450

Questions Cloud

Describe a way to modify algorithms such as scan : Give three or more examples of circumstances in which it is important that the operating system be unfair in serving 1/O requests.
How would you approach setting up the network : Newton is considering adding a new office and is exploring potential locations in Tacoma, Washington; Rochester, New York; or Fayetteville, North Carolina.
Explain the overlap by giving an example application : Explain the overlap by giving an example application in which the originator's usage period for the shared secret key begins before the recipient's usage.
Provide the journal entry for the october 15 : Provide the journal entry for the October 15 warranty work. If an amount box does not require an entry, leave it blank or enter "0"
How should the us government react to the situation : How are computers supposed to be secure when hackers are coming up with new ways to attack computers every day?
What is the current share price : What is the current share price? (Do not round intermediate calculations and round your final answer to 2 decimal places. (e.g., 32.16))
Which assets should delta corporation have elected : Which assets should Delta Corporation have elected Section 179 expensing for to have maxi- mized its depreciation expense and why
What is the price of the stock : A firm had EPS of $5.10 and paid dividends of $2.04 (think payout rate). The firm has a ROA of 12% and a ROE of 15%.
What is the price of the stock : A company has earnings per share of $3.82 from which it just paid $1.34 in dividends (think payout rate).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a new project in your ide named animalinfo

Create a new project in your IDE named "AnimalInfo." Create a class called "AnimalInfo" as the main class for the program.

  Implement the queue with a static array

Implement the Queue with a static array and the Floating Front Design Approach described on page 225 in your text.

  Prepare a visual rendering depicting your design via the

as the lead software engineer for a medium-sized hospital you have been asked to spearhead an effort to improve the

  Summarize the last section in the given chapter

Read chapter 4 in Computer Science: An Overview and note especially section 4.5 on Security. Create a 1 page document which will summarize the last section in the chapter on "Legal Approaches to Network Security."

  Describe the injection molding process and its phases

What are the differences between injection molding and machining? Describe the injection molding process and its phases (elements).

  Explain what is meant by effective html code

Explain what is meant by effective HTML code. Decide if all HTML code should be the same (standardized) or at the discretion of the designer. Explain your decision.

  What is difference between a label-text field-and-text area

What is the difference between a label, a text field, and a text area? Name a method that is declared in J Text Area, a method that J Text Area inherits.

  Why do bidirectional data ports on a microcontroller

Use a 74HC 138 1-of-8 decoder and a 74HC 151 8-to-1 multiplexer to design a key-board scanner that will scan an 8 x 8 keyboard matrix.

  Find the heat transfer from the outer surfaces of the duct

Repeat Problem, assuming the fan fails and thus the entire heat generated inside the duct must be rejected to the ambient air by natural convection.

  Web-based sites offer file sharing equal to napster

Do a Web search for stories about Napster and its legal battles. Why has the Recording Industry Association of America (RIAA) filed its lawsuit? How is this different from making a VHS copy of a movie or TV show with your VCR.

  Accessible technology solutions

Accessible Technology Solutions

  Write program in java to count zeros in factorial of number

Write a program in java to count the zeros in a factorial of a given number?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd