INTL440 Assignment 2 Philip

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

440

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

8

Uploaded by JusticePartridgePerson863

Report
Assignment 2 1 Assignment 2 INTL440: Cyber Warfare Professor Opstal August 4, 2023
Assignment 2 2 Technology, it is the corner stone in every single first world country across the globe. In today’s world technology plays a pivotal role in every part of our society. Besides simply using social media, the internet and other types of devices that can access it are involved in every part of our country, from banking systems to everything across the electrical grid. Technology is still a fairly new element for us and as we have seen firsthand it is something that is always developing. With new hardware and sofwatre being developed there are always newer methods being created to exploit them. Todays modernized world has become a lot more globalized, which means we have become more dependent on technology to run our economy keeping it stable. Because if this the odds of these systems becoming compromised are a lot higher and most likely these systems will become disrupted. The cyber world has very quickly become home station for the testing of new methods of attack by individual users, terrorist groups, and other state-sponsored actors. With the newest age of cyberwarfare here it can very dangerous and in some ways unethical. This is going to force the United States to act a lot faster in order to create and implement policies and procedures which would allow for better types of countermeasures and defensive tactics. This needs to be accomplished fast enough before cyberwar become the standard method for conducting attacks against our country. Cyber attacks can be done in multiple different ways but at the end of the day they all serve the same purpose. The attacks are usually designed to go after infrastructures, networks, or someone’s personal home computer. The intent is to gain access to a person’s data that can be used against them, or they want to access their information system in order to disrupt someone’s access or possibly eliminate network access. Cyber attackers are very dangerous and can be flexible people who think outside normal thoughts. This makes it difficult for us to identify them and counter their attacks making it even more difficult for inexperienced personnel. Some of the
Assignment 2 3 most common types of attacks we might see are malware, phishing scams, DDos attacks, and SQL injections attacks just to name a few. Some of these attacks are small and very easy to look past of we are not paying attention. Depending on what these attacks are designed to do they will have different intentions. Some types of malware are designed simply to conduct surveillance which would allow the attacker to gain Intel on a person. This would give the attacker the ability to conduct blackmail or phishing attacks and allowing access to someone else’s account. When attackers use DDos attacks they are trying to disrupt someone’s access to a service or allowing an opening for an additional attack. An SQL injection would be used to give the attacker access to someone’s data base and gain sensitive information or completely shut down their data base. The cyber attacker must wait for the right opening before they can conduct an attack and just as quickly as the opening exists so does the development of security and detection. The cycle of development is something that will always continue and so must the ability to conduct a cyber-attack. These attackers must also fully understand just how to create malware and conduct their attacks. With malware if attacker know where to look, they can find forums created by other hackers that help to explain the process in depth. The lack of knowledge by these individual really limits their ability to update, develop and execute these attacks. In the future, the methods and rules of warfare will become almost obsolete when it applies to how cyberwarfare is conducted. If you are looking at the rules of traditional warfare it would be illegal to target a building like a hospital or school. But with cyberwarfare it is a totally different viewpoint. If you apply the same traditional war standards to cyber war, then attacking a system like a banking system or even the electrical grid could be viewed as a war crime. That’s because just like attack a hospital or school, attacks on a banking system or electrical grid would affect people’s lives. Being able to establish Rules of Engagement (ROE) are going to prove very
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help