CONDUCT SOME RESEARCH OF YOUR OWN TO FIND AND SELECT ONE ACT OF CYBER TERRORISM OR CYBERWARFARE. IN ONE TO TWO PAGES, SUMMARIZE THE CASE. WHO WAS THE TARGET OF THE ACT?

CONDUCT SOME RESEARCH OF YOUR OWN TO FIND AND SELECT ONE ACT OF CYBER TERRORISM OR CYBERWARFARE. IN ONE TO TWO PAGES, SUMMARIZE THE CASE. WHO WAS THE TARGET OF THE ACT? DO WE KNOW WHO COMMITTED THE ACT? WERE THEY CAPTURED? IF YES, HOW WERE THEY CAPTURED? IS THERE ANY INDICATION OF WHY THE ACT WAS COMMITTED?

Conduct some research of your own to find and select one act of cyber terrorism or cyberwarfare. In one to two pages, summarize the case. Who was the target of the act? Do we know who committed the act? Were they captured? If yes, how were they captured? Is there any indication of why the act was committed?

This week we will focus on the issues of Cyber Warfare and Cyber Terrorism and how they are a growing threat in today’s world. Let’s start off by defining these terms. Cyber Warfare is using computers over the Internet to conduct acts of warfare against other websites or groups on the Internet. This could include defacing websites, distributing denial of service attacks, distributing propaganda, or gathering classified data over the Internet.

Cyber Terrorism is different from Cyber Warfare. Cyber Warfare can be inconvenient from having to clean up a website from vandalism or suffering from downtime because of a denial of service attack. With Cyber Terrorism, violence can result from an attack. So, as technology advances, there are more and more ways that this new technology can be taken advantage of.

China, Russia, Iran, al Qaeda, domestic right-wing hate groups, and numerous other terrorist or nation-state entities all have access to the Internet and have the tools to perpetrate a variety of cyber-attacks against the United States and/or its allies. By the very nature of these technological attacks, our critical infrastructure is most vulnerable.

There is a great deal of confusion as to what the threats against U.S. information systems really are. There is a tremendous range of domestic and international terror groups, unfriendly nations, and criminals attempting to or successfully subverting U.S. critical and economic infrastructure.

INFORMATION WARFARE is the gathering or use of information to gain an advantage over another party. It is not limited to those things that can be done with computers.
Information warfare consists of six components:
Psychological operations
electronic warfare
military deception
physical destruction
security measures
information attacks
CYBERTERRORISM cannot be concretely defined and has spurred significantly debate over exactly what it means. It is not defined by the group perpetrating it. It is specifically a premeditated, politically, or ideologically motivated attack or threat of attack against information, computer systems, computer programs, and data that can result in violence against civilian targets.

Cyber Warfare and Cyber Terrorism have both similarities and differences. They are similar in that both involve using computer systems against other computer systems, although with Cyber Terrorism the physical system can also be targeted. They are both different because in Cyber Terrorism, violence can occur, such as people be can be hurt or killed.


 

. TODAY AND GET AN AMAZING DISCOUNT

get-your-custom-paper

The post CONDUCT SOME RESEARCH OF YOUR OWN TO FIND AND SELECT ONE ACT OF CYBER TERRORISM OR CYBERWARFARE. IN ONE TO TWO PAGES, SUMMARIZE THE CASE. WHO WAS THE TARGET OF THE ACT? appeared first on Term Paper Tutors.

The post CONDUCT SOME RESEARCH OF YOUR OWN TO FIND AND SELECT ONE ACT OF CYBER TERRORISM OR CYBERWARFARE. IN ONE TO TWO PAGES, SUMMARIZE THE CASE. WHO WAS THE TARGET OF THE ACT? first appeared on Term Paper Tutors.

 

"Is this question part of your assignment? We Can Help!"

Essay Writing Service