What are the three classes of cyberattacks

Assignment Help Other Subject
Reference no: EM133240793

Assignment - The Rise of Cyberwarfare Case Study

Description - Video Case Study - The Rise of Cyberwarfare

In recent years, cyberwar has left the realm of science fiction and has become the cold, hard reality of the modern age. Every statistic having to do with the increase in frequency and size of cyberattacks is on the rise. In 2015, hackers targeted eBay, Home Depot, JPMorgan Chase, Anthem Health, and even the White House, exposing personal information belonging to thousands of customers of these companies. But unlike past examples of warfare, the online battlefield doesn't just belong to the strongest nations, although the U.S., China, and Russia are all actively engaged in both offensive and defensive cyberwar efforts. The battlefield of the Internet has reduced differences between the strongest and weakest nations to a significant degree, and even one of the poorest countries on earth, North Korea, was alleged to have executed a successful attack on Sony's U.S. division, stealing, releasing, and destroying terabytes of private data. The reason behind the attack was the pending release of the movie The Interview, a comedy starring James Franco and Seth Rogen which depicts the assassination of Korean leader Kim Jong-un. An anonymous group calling themselves the "Guardians of Peace" orchestrated the attack, wreaking havoc on Sony's entire organization and insisting that The Interview be cancelled. Sony eventually cancelled the New York City premiere of the film and other major theatre chains balked at screening the film. Although the film was eventually released across a very low number of theatres and featured major revisions to the plot, the attackers were largely successful in their goals. Between bot networks, DDoS attacks, Trojans, phishing, ransomware, data theft, identity theft, credit card fraud, and spyware, there's no shortage of ways for cybercriminals to make an impact online. However, as cybersecurity expert Amy Zertag explains in this video, the difference between these types of attacks, which can be extremely annoying to the victims and have major implications for e-commerce, and the next wave of cyberattacks, which have the potential to damage or destroy important components of national infrastructure, is significant. Restoring a stolen identity is annoying, as anybody who's had to do it understands. Cancelling or interfering with a movie release has dire implications for creative expression. But attacks to systems such as self-driving car guidance systems, airplanes, or municipal power and water supplies, all of which are increasingly becoming computerized and automated, could have much more serious consequences. The Stuxnet worm, which destroyed thousands of Iranian nuclear centrifuges in an effort by the U.S. and Israel to cripple Iran's nuclear program, was an example of this type of attack in action. While it was successful in this regard, it was also a proof of concept of this type of attack, and similar attacks have been made against industrial control modules, computer systems, and networks. The world is moving towards the Internet of Things, where everyday objects such as TVs, thermostats, appliances, cars, and other equipment gain the ability to connect to the Internet and share information. The potential applications of these technologies to improve our lives are limitless, but the Internet of Things also creates a whole new area of attack for potential cybercriminals.

Video Case Questions -

1. What are the three classes of cyberattacks and their efects, according to Zertag?

2. What metaphor does Zertag use to describe the idea that online, there are "no safe neighbourhoods?" What does she mean?

3. What does Zertag mean when she says that the Internet has a "huge attack surface"? How will the "Internet of Things" exacerbate this issue?

4. What are the five differences between cyberwarfare and traditional warfare, according to Zertag?

5. How are the SSL/TLS protocols used in securing Internet communications?

Reference no: EM133240793

Questions Cloud

How you will implement it into your daily practices : Discuss what you gained/learned from the two meeting times with mr. smith. How you will implement it into your daily practices
What do you think are the top three perceptual distortions : What do you think are the top three perceptual distortions that employees are most likely to be affected by when forming perceptions of a new manager
What is the normal habitat of the organism : Question 1: What is the domain and kingdom of the organism tapeworm segment
Describe how these are essential business tools protect : Describe how these are essential business tools protect against unauthorized access. As a manager, how would you explain importance of each one to your staff
What are the three classes of cyberattacks : Video Case Study - The Rise of Cyberwarfare - What are the three classes of cyberattacks and their efects, according to Zertag
Incidence of weight-loss among overweight and obese men : What was the incidence of overweight/obesity in this group? What was the incidence of weight-loss among overweight/obese men?
Define the term risk pool and deductible : Define the term risk pool. What is the relationship between covered conditions and covered services in health insurance plans? Define deductible.
Discuss your observations about the foundational principles : Discuss your observations about the foundational principles supporting this theory. Discuss the theory of psychopathology - why people get sick - reflect
Describe the limits of each type of marital privilege : Describe the two types of marital privilege: the testimonial privilege and the communications privilege. Describe the limits of each type of marital privilege

Reviews

Write a Review

Other Subject Questions & Answers

  What are the benefits of having type of commission

What are the benefits of having this type of commission? What are the negative aspects of a civilian oversight board?

  Describe the feminist theoryin brief

This week your theoretical orientation is feminist theory. You will use the same case study that you chose in Week 2. Use the "Dissecting a Theory".

  What organizational skills can transfer to the workplace

Based upon a review of your learning this quarter, what can you do now as a student that will help your transition to the workplace? What organizational skills.

  What you interpertation of that persons identity be

If a person has a picture of sandy beach with bright colors prominently displayed in their office what you interpertation of that person's identity be?

  Develop one original fictional case study

Identify the treatment approach for your case based upon the theory you have chosen to explain the disorder. Then in 2-3 pages, write your own theoretical analysis of case characteristics in relation to the disorder the case represents.

  What training content will be used and how it will be used

State the goal, which should identify what training content will be used and how it will be used. The goal for this action plan is to assist managers with.

  Explain differences between two classes of personifications

Personifications are among the earliest and most important interpersonal dynamisms. What are the differences between the two classes of personifications?

  How will you assess the patient or groups learning needs

How will you assess patient or group's learning needs? Be sure to consider barriers in your response. How will you evaluate the effectiveness of the teaching?

  How demonstrate a connection to current work environment

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

  Contrast minimal-spanning tree-maximal-flow

Compare and contrast minimal-spanning tree, maximal-flow, and shortest route techniques. Describe the advantages and disadvantages of each technique.

  What can ofc lightly learn by looking at these elements

OFC Lightly decided to enlarge his scope to expand his plan to the whole community, whether or not its members have been victims of property crime.

  How differences reflect differences in roles of the forensic

Discuss how these differences reflect the differences and similarities in the roles of the forensic correctional counselor and the clinical counselor.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd