Conduct some research of your own to find and select one act of cyber terrorism or cyberwarfare. In one to two pages, summarize the case. Who was the target of the act?

computer network overview
March 30, 2021
Need help to adjust attached non-fiction story, Include a short 200 (minimum) word author note on the revision process
March 30, 2021

Conduct some research of your own to find and select one act of cyber terrorism or cyberwarfare. In one to two pages, summarize the case. Who was the target of the act?

Conduct some research of your own to find and select one act of cyber terrorism or cyberwarfare. In one to two pages, summarize the case. Who was the target of the act?

 

Do we know who committed the act? Were they captured? If yes, how were they captured? Is there any indication of why the act was committed?

This week we will focus on the issues of Cyber Warfare and Cyber Terrorism and how they are a growing threat in today’s world. Let’s start off by defining these terms. Cyber Warfare is using computers over the Internet to conduct acts of warfare against other websites or groups on the Internet. This could include defacing websites, distributing denial of service attacks, distributing propaganda, or gathering classified data over the Internet.

Cyber Terrorism is different from Cyber Warfare. Cyber Warfare can be inconvenient from having to clean up a website from vandalism or suffering from downtime because of a denial of service attack. With Cyber Terrorism, violence can result from an attack. So, as technology advances, there are more and more ways that this new technology can be taken advantage of.

China, Russia, Iran, al Qaeda, domestic right-wing hate groups, and numerous other terrorist or nation-state entities all have access to the Internet and have the tools to perpetrate a variety of cyber-attacks against the United States and/or its allies. By the very nature of these technological attacks, our critical infrastructure is most vulnerable.

There is a great deal of confusion as to what the threats against U.S. information systems really are. There is a tremendous range of domestic and international terror groups, unfriendly nations, and criminals attempting to or successfully subverting U.S. critical and economic infrastructure.

INFORMATION WARFARE is the gathering or use of information to gain an advantage over another party. It is not limited to those things that can be done with computers.
Information warfare consists of six components:
Psychological operations
electronic warfare
military deception
physical destruction
security measures
information attacks
CYBERTERRORISM cannot be concretely defined and has spurred significantly debate over exactly what it means. It is not defined by the group perpetrating it. It is specifically a premeditated, politically, or ideologically motivated attack or threat of attack against information, computer systems, computer programs, and data that can result in violence against civilian targets.

Cyber Warfare and Cyber Terrorism have both similarities and differences. They are similar in that both involve using computer systems against other computer systems, although with Cyber Terrorism the physical system can also be targeted. They are both different because in Cyber Terrorism, violence can occur, such as people be can be hurt or killed.

REASONS FOR ATTACK

There are many reasons why these attacks occur. Probably one of the main reasons is to state a goal or objective that disagrees with a view of another community. For example, an anti- abortion group defacing an abortion clinic’s website, or performing a denial of service against a website so that people cannot access it and receive information from it. These would be acts of Cyber Warfare. Mostly with Cyber Warfare though, some of the defacement and denial of service attacks will come from people who just do that sort of thing for fun because they think they can.


 

smilesmilePLACE THIS ORDER OR A SIMILAR ORDER WITH CHEAP NURSING TUTORS TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper






The post Conduct some research of your own to find and select one act of cyber terrorism or cyberwarfare. In one to two pages, summarize the case. Who was the target of the act? appeared first on Cheap Nursing Tutors.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Buy Custom Nursing Papers