Question

In: Computer Science

differences between cyberterrorists, hacktivists and state-sponsored attackers. Which would you consider to be more dangerous to...

differences between cyberterrorists, hacktivists and state-sponsored attackers. Which would you consider to be more dangerous to a corporate network, and why? Which would be more dangerous to a government network, and why?

Solutions

Expert Solution

Cyber attackers are categorized in keeping with their target, tactics, techniques, malware, and procedures:

1. Cybercriminals are stereotypic attackers, targeting organizations to form cash through extortion or the revelation of compromised knowledge. Ransomware, malware that holds knowledge surety until the owner pays the financial award, is the first threat to organizations in 2016, particularly to mHealth devices and mission-critical assets.

2. Hacktivists are politically-motivated, targeting establishments with opposing affairs of state to their agenda. the foremost common attack with a denial of service technique, overloading a server till it crashes. once it involves tending, hacktivists area unit searching for specific patient knowledge, belongings or they are attempting to embarrass the establishment.

3. Cyberterrorists target systems to disrupt or destroy important services and infrastructure of a particular nation, sector or organization. Attacks on the tending sector area unit designed to border a lesser hacking cluster to cause turmoil or cause panic.

4. Nation-State Actors sponsor different threat teams that launch against foreign governments and organizations. They place confidence in advanced malware tailor-made to their target and sometimes contain rootkits for a persistent presence, secret writing to hinder reverse engineering and codes to mask its presence. The tending sector is targeted by nation-state actors to disrupt service and collect personal knowledge.

5. Script Kiddies are the smallest amount of good cyber attackers. Most of those tools area unit automatic, because the users are not technically-savvy, and that they enter through expedient means that, through vulnerable systems.

HACKTIVISM :
Hacktivism is that the convergence of hacking with policy, wherever “hacking” is employed here to check with operations that exploit computers in ways in which area unit uncommon and sometimes felonious, generally with the assistance of special software package (“hacking tools”). Hacktivism includes electronic direct action, that brings ways of direct action to the Internet. This section explores four forms of operations: virtual sit-ins and blockades, automatic email bombs, web hacks, and pc break-ins, and pc viruses and worms. as a result of hacking incidents area unit typically reported within the media, operations during this class will generate appreciable content for each of the activists and their causes.

Virtual Sit-Ins and Blockades:
A virtual civil disobedience or blockade is that the Internet version of a physical civil disobedience or blockade. The goal in each case is to indicate to the protestors and their cause by disrupting traditional operations and block access to facilities. With a civil disobedience, thousands of activists at the same time visit an internet web site and arrange to generate most traffic against the location that different users cannot reach it. a gaggle job itself Strano Network conducted one in every of the primary such demonstrations as a protest against French government policies on nuclear and social problems. On Dec twenty-one, 1995, they launched a one-hour Net’Strike attack against the net sites operated by varied government agencies.

Email Bombs:
It is one factor to send one or 2 messages to government policymakers, even daily. however, it's quite another to bombard them with thousands of messages promptly, distributed with the help of automatic tools. The impact is to utterly jam a recipient’s incoming email box, creating it not possible for legitimate email to induce through. Thus, Associate in Nursing email bomb is additionally a sort of virtual blockade. though email bombs area unit typically used as a method of revenge or harassment, they need conjointly been wont to protest government policies

Web Hacks and pc Break-Ins:
The media is stuffed with stories of hackers gaining access to internet sites and commutation a number of the content with their own. Frequently, the messages area unit political, as once a gaggle of Portuguese hackers changed the sites of forty Indonesian servers in September 1998 to show the shibboleth “Free East Timor” in giant black letters. in keeping with The big apple Times, the hackers conjointly more links to internet sites describing Indonesian human rights abuses within the former Portuguese colony.89 Then in August 1999, Jose Ramos architect, the Sydney-based Nobelist UN agency represents the East Timor independence movement outside Indonesia, warned that a world network of hackers planned to bring Indonesia to a standstill if Jakarta sabotaged the ballot on the longer term of East Timor. He told the Sydney Morning Herald that over one hundred hackers, largely teenagers in Europe and also the us, had been making ready the setup.

Computer Viruses and Worms Hacktivists have used pc viruses and worms to unfold protest messages and harm target pc systems. each area unit styles of malicious code that infect pcs and propagate over computer networks. The distinction is that a worm is Associate in Nursing autonomous piece of software package that spreads on its own, whereas a plague attaches itself to different files and code segments and spreads through those parts, typically in response to actions taken by users (e.g., gap Associate in Nursing email attachment). The boundary between viruses and worms, however, is bleary and not necessary to the discussion here.

CYBERTERRORISM:
Cyberterrorism is that the intended, politically driven attack against info, pc systems, pc programs, and knowledge that lead to violence against noncombatant targets by subnational teams or cloak-and-dagger agents.
Terrorist teams area unit victimization the web extensively to unfold their message and to speak and coordinate action. However, there are few, if any, electronic network attacks that meet the standards for cyberterrorism. The 1998 email bombing by the web Black Tigers against the Sri Lankan embassies was maybe the nearest factor to cyberterrorism that has occurred to this point, however the harm caused by the flood of email, for instance, pales as compared to the deaths of 240 folks from the physical bombings of the U.S. embassies in Nairobi and Dar metal Salaam in August.

Cyberdefense :
The main impact of cyber threats on foreign and domestic policy relates to defensive against such acts, significantly attacks against important infrastructures. At the international level, many countries, together with the us, are addressing such problems as mutual legal help treaties, surrender, the sharing of intelligence, and also the want for uniform pc crime laws in order that cybercriminals is with success investigated and prosecuted even once their crimes cross international borders, as they thus typically do. This effort isn't targeted on either cyberterrorism or hacktivism, however rather addresses Associate in Nursing array of actions that features all styles of hacking and electronic network attacks, pc and telecommunications fraud, and electronic piracy (software, music, etc.). It conjointly covers state-sponsored cyber warfare operations that use hacking and electronic network attacks as a military weapon.

CONCLUSIONS:

The Internet is clearly dynamic to the landscape of political discourse and support. It offers new and cheap ways for assembling and commercial enterprise info, for human action and coordinative action on a world scale, and for reaching intent on policymakers. It supports each open and personal communication. support teams and people worldwide area unit taking advantage of those options in their tries to influence policy.

Hacktivists could feel a way of authorization as a result of they will management government computers and acquire media attention, however, that doesn't mean they're going to achieve dynamic policy. So far, anecdotal proof suggests that for the bulk of cases, they're going to not.

With relevancy cyberterrorism, that is, the utilization of hacking tools and techniques to communicate grave hurt like loss of life, few conclusions are drawn concerning its potential impact on policy, as a result of there are no reported incidents that meet the standards.combined with hacking threats normally, is influencing policy selections associated with cyber defense at each a national and international level.

Thank U:)


Related Solutions

1: Discuss the similarities and differences between acute and chronic stress. Which is the most dangerous...
1: Discuss the similarities and differences between acute and chronic stress. Which is the most dangerous to health? Why? 2: Discuss the role of chronic stress in the weakening and eventual breakdown of each of the 5 body systems. List each body system and describe the related changes that could occur in that system because of chronic stress. 3: What actions can you take to prevent a stress-induced health problem? Discuss what you can do to develop healthier methods of...
Totalitarian states, which are less vulnerable to dissident terrorism, are more prone to perpetrate state-sponsored and state terrorism. Why?
Historically, democracies are more vulnerable than autocracies to terrorism committed by non-state movements and groups against perceived enemies ("dissident terrorism"). Totalitarian states, which are less vulnerable to dissident terrorism, are more prone to perpetrate state-sponsored and state terrorism. Why? Please substantiate your argument with at least two historical references from the 21st Century.
Examine the differences between state and federal regulations of managed care. Which regulations have more impact...
Examine the differences between state and federal regulations of managed care. Which regulations have more impact on managed care? Explain. Requirements: Submit your essay in a Word document. This assignment must be at least 500 words, with at least four references cited properly in APA format, and a title page (APA format). This assignment must be well- written with proper grammar, spelling, and punctuation. Follow the rubric.
1. Which is more dangerous if you spill it on your hand a 0.025 M HBr...
1. Which is more dangerous if you spill it on your hand a 0.025 M HBr solution (Ka = 1.3 x 106 ) or 0.75 M HClO2 solution (Ka = 1.2 x 10-2 )? Evaluate the H3O+ 2. For each pair below indicate which is stronger and support your answer with an explanation. a. Which is a stronger acid, H2S or PH3? b. Which is a stronger base CO3-2  or C2H5O-  ?
Lottery Winnings: State sponsored lotteries are an extremely popular and highly successful method by which state...
Lottery Winnings: State sponsored lotteries are an extremely popular and highly successful method by which state governments raise the much needed funds for financing public expenses, especially education. Needless to say, they are also a very colorful part of everybody’s hopes of striking it rich. States often team up so that the member lotteries can offer higher jackpots to participants. Mega Millions is one of these games, where 44 lotteries team up to offer prizes of at least $12 million....
Does the proliferation of nuclear weapons mean a more dangerous world or a safer world? Consider...
Does the proliferation of nuclear weapons mean a more dangerous world or a safer world? Consider both arguments and the theoretical approaches they represent.( 200-300 words)
Discuss the difference between equity and debt financing and state which type you would prefer if...
Discuss the difference between equity and debt financing and state which type you would prefer if you were an entrepreneur. Be specific.
Discuss the difference between equity and debt financing and state which type you would prefer if...
Discuss the difference between equity and debt financing and state which type you would prefer if you were an entrepreneur. Be specific.
1. (a.) Consider the following pairs of goods. Which would you expect to have more elastic...
1. (a.) Consider the following pairs of goods. Which would you expect to have more elastic demand? Explain each. (i) Food in general or rice (ii) Liquefied gas over a course of one month or liquefied gas over a course of a year. (iii) Television set or automobile (car). (iv) Water or diamonds.
a) State the differences between the monopolistically competitive market and perfectly competitive market. Which market is...
a) State the differences between the monopolistically competitive market and perfectly competitive market. Which market is better for consumers? Explain your answer with 5 examples from Bangladesh. b) State the nature of current market structure in Bangladesh. Discuss the problems and prospects of market structure in Bangladesh with special reference from WASA, PDB, Agricultural products, commercial banks, and Ready-made garments (RMG).
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT