CIS 410: Chapter 12 Terrorism and Information Warfare 100% Correct!
cyber terrorism a premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents, public as possible cyber espionage goal is to gather information Estonian attack mass Dos Attack, executed because people did not support the government's removal of a Russian WWII memorial CENTCOM attack was infected in spyware, a solider pick up a USB drive in the middle east and when he opened it from his computer, the spyware spread throughout the central command in the US military The Chinese Eagle Union thousands of Chinese hackers whose stated goal is to infiltrate western computer systems. China's Advanced Persistent Threat the security firm Mandiant tracked several APTs over a period of 7 years all originating in China, was able to maintain to a victim's network for an average of 365 days and stealing information India and Pakistan Indian article published said, "the cyber wing of the intelligence bureau has warned that government websites could be hacked by the Pakistan cyber army in this ongoing proxy war against India" Russian Hackers hackers in Russia were spying on computers used in NATO and the EU, the spying was accomplished by exploiting bugs in Microsoft Windows Stuxnet weaponized malware, first spread using USB drives, was first designed to target centrifuge controllers involved in Iran's uranium enrichment weapons of cyber warfare malware is the primary weapon, spyware, trojan horse, logic bomb flame virus targeting windows operating systems. specifically designed for espionage, spyware that can monitor network traffic and take screenshots of the infected system, sends a signal directing it to delete all traces of itself StopG Malware online forum designed to facilitate attacks against key network targets within Georiga FinFisher spyware designed for law enforcement agencies with a warrant, to collect evidence on suspects BlackEnergy manipulates water and power systems, causing blackouts and water supply disruptions traced to the Russian group, SandWorm NSA ANT Catalog catalog that NSA makes available to agencies within the US government that have clearance, catalog of malware and spyware that has been developed by the NSA Economic Attacks destroying economically valuable data, ex. stealing credit cards, transferring money from accounts, and committing fraud footprinting process of gathering information-- some from public sources, others by scanning target system or network SCADA Supervisory Control and Data Acquisitions, ex. power generators, civil defense alarms, and water treatment plants, penetration testers were about to take over a power generator and potentially overload it. lives can be lost due to SCADA systems information warfare any attempt to manipulate information in pursuit of military or political goal Information Control Examples: radio free europe, vietnam war's graphic images being broadcasted, and public perception: "some collateral damage" vs. "innocent victims were killed" Disinformation related to propoganda TOR the onion router, uses encryption to conceal the origin and even final destination of the traffic passing through it, military technology being adapted to civilian purposes
Escuela, estudio y materia
- Institución
- CIS 410
- Grado
- CIS 410
Información del documento
- Subido en
- 27 de octubre de 2022
- Número de páginas
- 2
- Escrito en
- 2022/2023
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
cis 410 chapter 12 terrorism and information warfare 100 correct