In: Operations Management
Please read case and answer the question thank you.
In recent years, cyberwar has left the realm of science fiction and has become the cold, hard reality of the modernage. Every statistic having to do with the increase in frequency and size of cyberattacks is on the rise. In 2015,hackers targeted eBay, Home Depot, JPMorgan Chase, Anthem Health, and even the White House, exposingpersonal information belonging to thousands of customers of these companies. But unlike past examples ofwarfare, the online battlefield doesn’t just belong to the strongest nations,although the U.S., China, and Russia are all actively engaged in both offensiveand defensive cyberwar efforts.The battlefield of the Internet has reduced differences between the strongest and weakest nations to a significant degree, and even one of the poorestcountries on earth, North Korea, was alleged to have executed a successful attack on Sony’s U.S. division, stealing, releasing, and destroying terabytes of private data. The reason behind the attack was the pending release of the movie The Interview, a comedy starring James Franco and Seth Rogen which depicts the assassination of Korean leader Kim Jong-un. An anonymous group calling themselves the “Guardians of Peace” orchestrated the attack, wreakinghavoc on Sony’s entire organization and insisting that The Interview be canceled. Sony eventually canceled the New York City premiere of the film andother major theater chains balked at screening the film.Although the film was eventually released across a very low number of theatersand featured major revisions to the plot, the attackers were largely successful intheir goals.Between bot networks, DDoS attacks, Trojans, phishing, ransomware, data theft, identity theft, credit card fraud, and spyware, there’s no shortage of waysfor cybercriminals to make an impact online. However, as cybersecurity expert Amy Zertag explains in this video, the difference between these types ofattacks, which can be extremely annoying to the victims and have major implications for e-commerce, and the next wave of cyberattacks, which havethe potential to damage or destroy important components of nationalinfrastructure, issignificant. Restoring a stolen identity is annoying, as anybody who’s had to do itunderstands. Canceling or interfering with a movie release has dire implications forcreative expression. But attacks to systems such as self-driving car guidance systems, airplanes, or municipal power and water supplies, all of which are increasingly becoming computerized and automated, could have much more serious consequences.The Stuxnet worm, which destroyed thousands of Iranian nuclear centrifugesin an effort by the U.S. and Israel to cripple Iran’s nuclear program, was an example of this type of attack in action. While it was successful in this regard,it was also a proof of concept of this type of attack, and similar attacks havebeen made against industrial control modules,computer systems, and networks. The world is moving towards the Internet ofThings, where everyday objects such as TVs, thermostats, appliances, cars, and other equipment gain the ability to connect to the Internet and shareinformation. The potential applications of these technologies to improve our livesare limitless, but the Internet of Things also creates a whole new area of attack forpotential cybercriminals.
1. What are the three classes of cyberattacks and their effects, according to Zertag?
2. What metaphor does Zertag use to describe the idea that online, there are “no safe neighborhoods?” What doesshe mean?
3. What does Zertag mean when she says that the Internet has a “huge attack surface”? How will the “Internet ofThings” exacerbate this issue?
4. What are the five differences between cyberwarfare and traditional warfare, according to Zertag?
1. What are the three classes of cyberattacks and their effects, according to Zertag?
1. Massive theft of intellectual property from American corporation that could degrade our economic competitiveness for generations
2. Massive disruption of life
3. Degrade, disrupt, or destroy our military’s ability to defend itself or attack
2. What metaphor does Zertag use to describe the idea that online, there are “no safe neighborhoods?” What does she mean?
We would strengthen our military if our country was under attack, but you can’t do that in cyberspace. 85% is not owned by the government, but privately owned.
3. What does Zertag mean when she says that the Internet has a “huge attack surface”? How will the “Internet of Things” exacerbate this issue?
The internet of things exacerbate this issue because we live in such a technical world where cars drive themselves, apps tell you when to buy milk, or power themselves off when power is low. We are so much more vulnerable now than before. There is one defect for every 2500 lines of code. There is a weak or missing link and that link allows the “bad” guys in. The attack space in cyber space is huge.
4. What are the five differences between cyberwarfare and traditional warfare, according to Zertag?
1. Most powerful=most vulnerable
2. The government cannot go it alone
3. Attack surface is huge
4. Victims often don’t know they’re victims
5. Warning and decision
****Please please please LIKE THIS ANSWER, so that I can get a small benefit, Please****