INTL440 Assignment 2 Philip
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
440
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
8
Uploaded by JusticePartridgePerson863
Assignment 2
1
Assignment 2
INTL440: Cyber Warfare
Professor Opstal
August 4, 2023
Assignment 2
2
Technology, it is the corner stone in every single first world country across the globe. In today’s world technology plays a pivotal role in every part of our society. Besides simply using social media, the internet and other types of devices that can access it are involved in every part of our country, from banking systems to everything across the electrical grid. Technology is still a fairly new element for us and as we have seen firsthand it is something that is always developing. With new hardware and sofwatre being developed there are always newer methods being created to exploit them. Todays modernized world has become a lot more globalized, which means we have become more dependent on technology to run our economy keeping it stable. Because if this the odds of these systems becoming compromised are a lot higher and most likely these systems will become disrupted. The cyber world has very quickly become home station for the testing of new methods of attack by individual users, terrorist groups, and other state-sponsored actors. With the newest age of cyberwarfare here it can very dangerous and
in some ways unethical. This is going to force the United States to act a lot faster in order to create and implement policies and procedures which would allow for better types of countermeasures and defensive tactics. This needs to be accomplished fast enough before cyberwar become the standard method for conducting attacks against our country. Cyber attacks can be done in multiple different ways but at the end of the day they all serve the same purpose. The attacks are usually designed to go after infrastructures, networks, or someone’s personal home computer. The intent is to gain access to a person’s data that can be used against them, or they want to access their information system in order to disrupt someone’s access or possibly eliminate network access. Cyber attackers are very dangerous and can be flexible people who think outside normal thoughts. This makes it difficult for us to identify them and counter their attacks making it even more difficult for inexperienced personnel. Some of the
Assignment 2
3
most common types of attacks we might see are malware, phishing scams, DDos attacks, and SQL injections attacks just to name a few. Some of these attacks are small and very easy to look past of we are not paying attention. Depending on what these attacks are designed to do they will
have different intentions. Some types of malware are designed simply to conduct surveillance which would allow the attacker to gain Intel on a person. This would give the attacker the ability to conduct blackmail or phishing attacks and allowing access to someone else’s account. When attackers use DDos attacks they are trying to disrupt someone’s access to a service or allowing an opening for an additional attack. An SQL injection would be used to give the attacker access to someone’s data base and gain sensitive information or completely shut down their data base. The cyber attacker must wait for the right opening before they can conduct an attack and just as quickly as the opening exists so does the development of security and detection. The cycle
of development is something that will always continue and so must the ability to conduct a cyber-attack. These attackers must also fully understand just how to create malware and conduct their attacks. With malware if attacker know where to look, they can find forums created by other hackers that help to explain the process in depth. The lack of knowledge by these individual really limits their ability to update, develop and execute these attacks. In the future, the methods and rules of warfare will become almost obsolete when it applies to how cyberwarfare is conducted. If you are looking at the rules of traditional warfare it would be illegal to target a building like a hospital or school. But with cyberwarfare it is a totally
different viewpoint. If you apply the same traditional war standards to cyber war, then attacking a system like a banking system or even the electrical grid could be viewed as a war crime. That’s
because just like attack a hospital or school, attacks on a banking system or electrical grid would affect people’s lives. Being able to establish Rules of Engagement (ROE) are going to prove very
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
The field of computer science - The Internet has had a profound effect on many facets of our everyday lives, including the ways in which we learn and relax. There are some drawbacks to using the Internet despite its numerous benefits. What are the most significant benefits and cons of using the Internet?
arrow_forward
In recent years, social media has become pervasive throughout society. No one can deny that social media have completely changed the context of privacy, shaping and reshaping relationships, exaggerating ideals of sharing, and reconstructing daily routines to visit one’s online friends at least once a day. Thanks to social media, people can now share every detail about the most mundane things in life. Updating where you are at any given moment alerts your friends to what you are up to but also allows enterprises to learn how to better market products and promote celebrities. Responding to the growing influence of social media and, in turn, demonstrating another crucial function of the phenomenon, all types of organizations are finding value in monitoring and digesting the nonstop flow of posts in the social media world. For example, traditional business intelligence (BI) will inform you where your products are selling well and where they are not. But it will not tell you why your…
arrow_forward
computer science - The Internet has influenced several facets of modern life. The Internet's positives far outweigh its drawbacks. What are the primary benefits and cons of using the internet?
arrow_forward
The Internet has quickly risen to prominence as a critical tool for exercising one's right to freedom of expression. Many individuals and even groups take use of the power afforded them by social media platforms such as Facebook and Twitter to disseminate hate speech. Does it make sense for freedom of expression to be unrestricted on the internet? What measures should social media platforms take to prevent hate speech from spreading?
arrow_forward
Since our birth, technology in the Information Age—including computers, iPads, and our internet connection—has progressed rapidly. In what ways do you see technology progress improving people's lives and the world at large?
arrow_forward
Social media has made it possible for people of all ages to keep in contact with loved ones, acquaintances, and coworkers. So many people who use social media don't know what happens when they share too much personal information.
How can we use social media to facilitate social engineering?Is there anything individuals and organizations can do to ensure the security of sensitive data?
arrow_forward
The science of computing The Internet has altered many facets of modern life.
There are many positives to using the Internet, but it also comes with a few
drawbacks. In your opinion, what are the Internet's primary benefits and
drawbacks?
arrow_forward
Since our birth in this century, dubbed as the Information Age, everything from computers to tablets and even our internet connection has improved. What are the potential benefits of technology improvements in our everyday lives and communities, in your opinion?
arrow_forward
In addition to forums, newsletters, blogs, and IM, it would be great if you could
include an explanation of social networking, online discussion groups, chat
rooms, mailing lists, podcasts, RSS feeds, webinars, and email lists. How do
these innovations improve the quality of internet-based research?
arrow_forward
The internet is widely considered to be one of the most prominent instances of information and communication technology. Every assertion that you make has to be backed up with concrete evidence, such as examples and explanations.
arrow_forward
What role, if any, does the internet play in the daily lives of those who have some kind of disability? What kinds of future technological advances in the field of assistive technology do you see for people who have disabilities? Should assistive technology, if it is available, be made accessible to members of the general public?
arrow_forward
The use of the Internet as a vital instrument for exercising one's right to free speech has gained
popularity swiftly. Many people, including organizations, exploit the influence that social media sites
like Facebook and Twitter provide them to spread hate speech. Does it make sense for there to be
no restrictions on freedom of speech on the internet? What steps should social media sites take to
stop the spread of hate speech?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- The field of computer science - The Internet has had a profound effect on many facets of our everyday lives, including the ways in which we learn and relax. There are some drawbacks to using the Internet despite its numerous benefits. What are the most significant benefits and cons of using the Internet?arrow_forwardIn recent years, social media has become pervasive throughout society. No one can deny that social media have completely changed the context of privacy, shaping and reshaping relationships, exaggerating ideals of sharing, and reconstructing daily routines to visit one’s online friends at least once a day. Thanks to social media, people can now share every detail about the most mundane things in life. Updating where you are at any given moment alerts your friends to what you are up to but also allows enterprises to learn how to better market products and promote celebrities. Responding to the growing influence of social media and, in turn, demonstrating another crucial function of the phenomenon, all types of organizations are finding value in monitoring and digesting the nonstop flow of posts in the social media world. For example, traditional business intelligence (BI) will inform you where your products are selling well and where they are not. But it will not tell you why your…arrow_forwardcomputer science - The Internet has influenced several facets of modern life. The Internet's positives far outweigh its drawbacks. What are the primary benefits and cons of using the internet?arrow_forward
- The Internet has quickly risen to prominence as a critical tool for exercising one's right to freedom of expression. Many individuals and even groups take use of the power afforded them by social media platforms such as Facebook and Twitter to disseminate hate speech. Does it make sense for freedom of expression to be unrestricted on the internet? What measures should social media platforms take to prevent hate speech from spreading?arrow_forwardSince our birth, technology in the Information Age—including computers, iPads, and our internet connection—has progressed rapidly. In what ways do you see technology progress improving people's lives and the world at large?arrow_forwardSocial media has made it possible for people of all ages to keep in contact with loved ones, acquaintances, and coworkers. So many people who use social media don't know what happens when they share too much personal information. How can we use social media to facilitate social engineering?Is there anything individuals and organizations can do to ensure the security of sensitive data?arrow_forward
- The science of computing The Internet has altered many facets of modern life. There are many positives to using the Internet, but it also comes with a few drawbacks. In your opinion, what are the Internet's primary benefits and drawbacks?arrow_forwardSince our birth in this century, dubbed as the Information Age, everything from computers to tablets and even our internet connection has improved. What are the potential benefits of technology improvements in our everyday lives and communities, in your opinion?arrow_forwardIn addition to forums, newsletters, blogs, and IM, it would be great if you could include an explanation of social networking, online discussion groups, chat rooms, mailing lists, podcasts, RSS feeds, webinars, and email lists. How do these innovations improve the quality of internet-based research?arrow_forward
- The internet is widely considered to be one of the most prominent instances of information and communication technology. Every assertion that you make has to be backed up with concrete evidence, such as examples and explanations.arrow_forwardWhat role, if any, does the internet play in the daily lives of those who have some kind of disability? What kinds of future technological advances in the field of assistive technology do you see for people who have disabilities? Should assistive technology, if it is available, be made accessible to members of the general public?arrow_forwardThe use of the Internet as a vital instrument for exercising one's right to free speech has gained popularity swiftly. Many people, including organizations, exploit the influence that social media sites like Facebook and Twitter provide them to spread hate speech. Does it make sense for there to be no restrictions on freedom of speech on the internet? What steps should social media sites take to stop the spread of hate speech?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning