What are the three classes of cyberattacks

Assignment Help Other Subject
Reference no: EM133240793

Assignment - The Rise of Cyberwarfare Case Study

Description - Video Case Study - The Rise of Cyberwarfare

In recent years, cyberwar has left the realm of science fiction and has become the cold, hard reality of the modern age. Every statistic having to do with the increase in frequency and size of cyberattacks is on the rise. In 2015, hackers targeted eBay, Home Depot, JPMorgan Chase, Anthem Health, and even the White House, exposing personal information belonging to thousands of customers of these companies. But unlike past examples of warfare, the online battlefield doesn't just belong to the strongest nations, although the U.S., China, and Russia are all actively engaged in both offensive and defensive cyberwar efforts. The battlefield of the Internet has reduced differences between the strongest and weakest nations to a significant degree, and even one of the poorest countries on earth, North Korea, was alleged to have executed a successful attack on Sony's U.S. division, stealing, releasing, and destroying terabytes of private data. The reason behind the attack was the pending release of the movie The Interview, a comedy starring James Franco and Seth Rogen which depicts the assassination of Korean leader Kim Jong-un. An anonymous group calling themselves the "Guardians of Peace" orchestrated the attack, wreaking havoc on Sony's entire organization and insisting that The Interview be cancelled. Sony eventually cancelled the New York City premiere of the film and other major theatre chains balked at screening the film. Although the film was eventually released across a very low number of theatres and featured major revisions to the plot, the attackers were largely successful in their goals. Between bot networks, DDoS attacks, Trojans, phishing, ransomware, data theft, identity theft, credit card fraud, and spyware, there's no shortage of ways for cybercriminals to make an impact online. However, as cybersecurity expert Amy Zertag explains in this video, the difference between these types of attacks, which can be extremely annoying to the victims and have major implications for e-commerce, and the next wave of cyberattacks, which have the potential to damage or destroy important components of national infrastructure, is significant. Restoring a stolen identity is annoying, as anybody who's had to do it understands. Cancelling or interfering with a movie release has dire implications for creative expression. But attacks to systems such as self-driving car guidance systems, airplanes, or municipal power and water supplies, all of which are increasingly becoming computerized and automated, could have much more serious consequences. The Stuxnet worm, which destroyed thousands of Iranian nuclear centrifuges in an effort by the U.S. and Israel to cripple Iran's nuclear program, was an example of this type of attack in action. While it was successful in this regard, it was also a proof of concept of this type of attack, and similar attacks have been made against industrial control modules, computer systems, and networks. The world is moving towards the Internet of Things, where everyday objects such as TVs, thermostats, appliances, cars, and other equipment gain the ability to connect to the Internet and share information. The potential applications of these technologies to improve our lives are limitless, but the Internet of Things also creates a whole new area of attack for potential cybercriminals.

Video Case Questions -

1. What are the three classes of cyberattacks and their efects, according to Zertag?

2. What metaphor does Zertag use to describe the idea that online, there are "no safe neighbourhoods?" What does she mean?

3. What does Zertag mean when she says that the Internet has a "huge attack surface"? How will the "Internet of Things" exacerbate this issue?

4. What are the five differences between cyberwarfare and traditional warfare, according to Zertag?

5. How are the SSL/TLS protocols used in securing Internet communications?

Reference no: EM133240793

Questions Cloud

How you will implement it into your daily practices : Discuss what you gained/learned from the two meeting times with mr. smith. How you will implement it into your daily practices
What do you think are the top three perceptual distortions : What do you think are the top three perceptual distortions that employees are most likely to be affected by when forming perceptions of a new manager
What is the normal habitat of the organism : Question 1: What is the domain and kingdom of the organism tapeworm segment
Describe how these are essential business tools protect : Describe how these are essential business tools protect against unauthorized access. As a manager, how would you explain importance of each one to your staff
What are the three classes of cyberattacks : Video Case Study - The Rise of Cyberwarfare - What are the three classes of cyberattacks and their efects, according to Zertag
Incidence of weight-loss among overweight and obese men : What was the incidence of overweight/obesity in this group? What was the incidence of weight-loss among overweight/obese men?
Define the term risk pool and deductible : Define the term risk pool. What is the relationship between covered conditions and covered services in health insurance plans? Define deductible.
Discuss your observations about the foundational principles : Discuss your observations about the foundational principles supporting this theory. Discuss the theory of psychopathology - why people get sick - reflect
Describe the limits of each type of marital privilege : Describe the two types of marital privilege: the testimonial privilege and the communications privilege. Describe the limits of each type of marital privilege

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd