Why are countries and businesses concerned about cyber

Assignment Help Management Information Sys
Reference no: EM131302480

LAST ISSUE -CYBER ESPIONAGE

Businesses and government agencies in many countries experienced a spike in targeted attacks originating outside their borders, many from China and/or Russia. Analysis of the attacks leads security experts to believe that many governments are involved in cyber espionage. Cyber espionage is the use of the Internet to spy on other governments. Not only is the Internet being leveraged for international espionage, but it is also being used for economic espionage. Economic espionage refers to the use of the Internet by nation-states to steal corporate information in an effort to gain economic advantages in multinational deals.
One report describes how Chinese hackers infected the Rolls Royce corporate network with a Trojan horse that sent secret corporate information from the network to a remote server. Shell Oil Company discovered a Chinese cyber spy ring in Houston, Texas, working to steal confidential pricing information from servers at its operation in Africa.

Although it would be easy to jump to the conclusion that the Chinese government is behind all of these attacks, experts are quick to point out that it is difficult to pinpoint the origin of an attack. The Internet makes it possible for hackers to launch attacks from any server in the world. If an attack originates in China and is engineered by a Chinese citizen, it still cannot be determined if that person is working for the government. The Chinese government vehemently denies any part in cyber espionage. Still, most governments hold the Chinese government accountable for not cracking down on hackers if not actually sponsoring them. It is estimated that 30 percent of malicious software is created in China. The next largest distributor of malware is Russia and Eastern Europe.

A report developed by security firm McAfee states that "120 countries are developing ways to use the Internet as a weapon to target financial markets, government computer systems, and utilities." A number of experts are calling this the "cyber cold war."

The Internet of Things may become the Internet of Threats!

Questions:

1. Why are countries and businesses concerned about cyber espionage that originates in China and Russia?

2. What are the dangers if the cyber cold war turns into an actual cyber war?

3. Find a recent article concerning Hacking or Cyber espionage. Recap the article. Then create your own question and answer from the content.

Reference no: EM131302480

Questions Cloud

What are the possible causes of this : You are the director of a visual art organization. An artist you are working with proposes a public art project that involves covering a large city park with a huge suspended canopy made of metal threads. What steps will you take to develop the pr..
Identify the essential characteristics of decision making : Identify the essential characteristics of decision making and indicate the range and types of decisions a manager makes Considering the activities, assignments, etc. What has been most useful?
Evaluate how interest rate risk can be managed : Argue the benefits of utilizing duration for measuring interest rate risk in financial institutions. If needed, feel free to include numerical illustrations for clarifying your discussion.
Determine effect that implementation of the rfc have : Determine the effect that the implementation of the RFC will have on service targets, service charges and service assumptions related to this agreement.
Why are countries and businesses concerned about cyber : Why are countries and businesses concerned about cyber espionage that originates in China and Russia? What are the dangers if the cyber cold war turns into an actual cyber war?Find a recent article concerning Hacking or Cyber espionage.
How important is ordering in v-blast : We may call such a system V-BLAST with no ordering. How does it compare with the V-BLAST (ZF nulling) curve in Figure 9.10? How important is ordering in V-BLAST?
Active business operation for research : It is recommended you visit a relative small but active business operation for this research.  A company with 50 to 100 employees can be better evaluated than a large corporation with many different work centers employing thousands of workers.  Yo..
Explain what stages were most challenging and why : Discuss the influence the decision-making process had on the outcome. Evaluate the effectiveness of the process. What stages were most challenging and why?
Calculation of the total project cost : Calculation of critical path and critical duration for the project - Calculation of the total project cost and suggest ways on how to optimize the cost

Reviews

Write a Review

Management Information Sys Questions & Answers

  Auditing of infromation systems process

Auditing of infromation systems process, The body of your paper should reflect the results of your research, from peer reviewed sources, that support your thesis.

  Would you always select uncorrelated random variables

Would you always select uncorrelated random variables, or would there be times when it would help to have them correlated?

  Why is mobile computing so important to these three firms

Why is mobile computing so important to these three firms? Evaluate the mobile strategies of each firm. Mobile computing consists in doing activities which involve the internet without being fixed to a particular place but at the discretion of the ..

  Determine the goals in your completed diagram

Determine the goals, in your completed diagram, that require further refinement and explain why. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

  What default system message logging alert should you capture

What default System Message Logging (Syslog) alerts should you capture on your route? How is best to view and store the alerts?

  Identify what we can do to counter this biological attack

A terrorist threat has been made via phone against the water system. The caller stated that they would be releasing Tularemia into the water system in the next 4-6 hours. We are not certain of where this action may take place, but we must protect ..

  Differences between a waterfall model and a prototype

The organization has asked for a new Web-based customer tracking system to be developed. Take this opportunity to describe the differences between a waterfall model and a prototype

  Uniform and zone pricing schemeswhy are uniform and zone

uniform and zone pricing schemeswhy are uniform and zone pricing schemes fair for customers on the whole but

  Which proposal should michaels accept

The average term of either loan is expected to be 35 days.-  With an average receivables balance of $250,000, which proposal should Michael's accept?

  Determine a critical element in the process

Determine a critical element in the process for implementing a health information management system, and specify the conditions under which this element would improve the implementation of the system.

  Describe why it is important to use a tool like ms project

Describe why it is important to use a tool like MS Project instead of using other tools (e.g., MS Word, MS Excel) to manage and track your schedule.

  Describe argument for the hims development method

Create an argument for the HIMS development method you think would be the most effective in a health care organization. Justify your response

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd