Question: Please read case and answer the question thank you. In recent years, cyberwar has left the realm of science fiction and has become the cold,
Please read case and answer the question thank you.
In recent years, cyberwar has left the realm of science fiction and has become the cold, hard reality of the modernage. Every statistic having to do with the increase in frequency and size of cyberattacks is on the rise. In 2015,hackers targeted eBay, Home Depot, JPMorgan Chase, Anthem Health, and even the White House, exposingpersonal information belonging to thousands of customers of these companies. But unlike past examples ofwarfare, the online battlefield doesnt just belong to the strongest nations,although the U.S., China, and Russia are all actively engaged in both offensiveand defensive cyberwar efforts.The battlefield of the Internet has reduced differences between the strongest and weakest nations to a significant degree, and even one of the poorestcountries on earth, North Korea, was alleged to have executed a successful attack on Sonys U.S. division, stealing, releasing, and destroying terabytes of private data. The reason behind the attack was the pending release of the movie The Interview, a comedy starring James Franco and Seth Rogen which depicts the assassination of Korean leader Kim Jong-un. An anonymous group calling themselves the Guardians of Peace orchestrated the attack, wreakinghavoc on Sonys entire organization and insisting that The Interview be canceled. Sony eventually canceled the New York City premiere of the film andother major theater chains balked at screening the film.Although the film was eventually released across a very low number of theatersand featured major revisions to the plot, the attackers were largely successful intheir goals.Between bot networks, DDoS attacks, Trojans, phishing, ransomware, data theft, identity theft, credit card fraud, and spyware, theres no shortage of waysfor cybercriminals to make an impact online. However, as cybersecurity expert Amy Zertag explains in this video, the difference between these types ofattacks, which can be extremely annoying to the victims and have major implications for e-commerce, and the next wave of cyberattacks, which havethe potential to damage or destroy important components of nationalinfrastructure, issignificant. Restoring a stolen identity is annoying, as anybody whos had to do itunderstands. Canceling or interfering with a movie release has dire implications forcreative expression. But attacks to systems such as self-driving car guidance systems, airplanes, or municipal power and water supplies, all of which are increasingly becoming computerized and automated, could have much more serious consequences.The Stuxnet worm, which destroyed thousands of Iranian nuclear centrifugesin an effort by the U.S. and Israel to cripple Irans nuclear program, was an example of this type of attack in action. While it was successful in this regard,it was also a proof of concept of this type of attack, and similar attacks havebeen made against industrial control modules,computer systems, and networks. The world is moving towards the Internet ofThings, where everyday objects such as TVs, thermostats, appliances, cars, and other equipment gain the ability to connect to the Internet and shareinformation. The potential applications of these technologies to improve our livesare limitless, but the Internet of Things also creates a whole new area of attack forpotential cybercriminals.
1. What are the three classes of cyberattacks and their effects, according to Zertag?
2. What metaphor does Zertag use to describe the idea that online, there are no safe neighborhoods? What doesshe mean?
3. What does Zertag mean when she says that the Internet has a huge attack surface? How will the Internet ofThings exacerbate this issue?
4. What are the five differences between cyberwarfare and traditional warfare, according to Zertag?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
