Reference no: EM133076423
Assignment - The Stages of Cyber Operations
Cyber operations have a long and storied history that has evolved tremendously over the last few decades. Cyber operations, and in particular its subset of cyber warfare, came into realization during the 1980s, took-off as an information-gathering mechanism during the late 1990s and early 2000s, then became militarized and still is to this day. Two major incidents that characterize the late 1990s and early 2000s are the Moonlight Maze and the Stuxnet incidents, respectively. Cyber operations were performed throughout each of these incidents.
You will describe the goals and objectives of cyber operations, examine the Moonlight Maze and Stuxnet incidents, and identify the regulations or laws that were instituted in the U.S. because of these incidents.
The specific course learning outcome associated with this assignment is:
1. Evaluate the stages and motivating factors of a cyber operation in network traffic.
2. Describe the goals and objectives of each of the seven stages of cyber operations, defined for this assignment as:
o Target recognition.
o Reconnaissance.
o Gaining access.
o Hiding presence.
o Establishing persistence.
o Execution.
o Assessment.
Moonlight Maze Incident
1. Explain how each cyber operations stage of the Moonlight Maze incident was implemented and what motivated the activities during each stage.
2. Describe the regulations or laws that were instituted in the U.S. because of the Moonlight Maze incident, citing specific, credible sources.
Stuxnet Incident
1. Explain how each cyber operations stage of the Stuxnet incident was implemented and what motivated the activities during each stage.
2. Describe the regulations or laws that were instituted in the U.S. because of the Stuxnet incident, citing specific, credible sources.
Knowledge Of Management Practices
: Examine efficiency and effectiveness issues that affect decision-making in the workplace. Analyze the key components of relationship building for managers.
|
Viable erp solutions presentation
: Determine the main selection criteria that ERP packages have in common. Compares and contrasts how each package handles SCM, CRM, and ERP.
|
NEXIS-Uni Legal Research Database
: Using the NEXIS-Uni Legal Research Database. identify and explain the requirements and elements for a valid contract.
|
Facebook Live Killings
: Discuss whether you believe that Facebook has a legal or ethical duty as to what gets posted on its platform.
|
The stages of cyber operations
: You will describe the goals and objectives of cyber operations. Evaluate the stages and motivating factors of a cyber operation in network traffic.
|
Secure assertion markup language
: Single Sign On (SSO) simplifies login to multiple applications. Secure Assertion Markup Language (SAML) can be used to define how to provide both authentication
|
The impact of mismanagement
: What is change control and why does it need to be managed? Give two examples of the impact of mismanagement.
|
Correlation and regression
: An educational psychologist wanted to know the effects of four different methods of teaching arithmetic.
|
Information technology and business applications
: Write a concise position statement identifying current issues with respect to global business based on current events.
|