Question

In: Computer Science

1. What are the three classes of cyberattacks and their effects, according to Zertag? 2. What...

1. What are the three classes of cyberattacks and their effects, according to Zertag?

2. What metaphor does Zertag use to describe the idea that online, there are “no safe neighborhoods?” What does she mean?

3. What does Zertag mean when she says that the Internet has a “huge attack surface”? How will the “Internet of Things” exacerbate this issue?

4. What are the five differences between cyberwarfare and traditional warfare, according to Zertag?

Solutions

Expert Solution

1.

According to Zertag, the Three classes of cyber-attacks are, Intellectual property theft class, Military ability threaten to attack and Attacks that disrupt the way of life.

  • The Intellectual property theft steals the detail of the trade secrets and proprietary details of a company or an organization. As digital technology is increasing, Intellectual property theft also increasing. The types of Intellectual property theft are Copyright theft, Patent theft, Trademark theft, and Trade secret theft.
  • Military ability threatens attack involves stealing the confidential details related to the military. This attack results in severe consequences in people lives. The malicious hackers steal the data of the military through internet access and know the secrets and plans of the military. This attack degrades, disrupt, or destroy our military’s ability to defend itself.
  • The attack that results in a huge disruption in the way of life and which cause damage to the infrastructure.

2.

The metaphor used to describe the idea that online, there are “no safe neighborhoods” as per Zertag is that if Country is under the cyber-attack, then the military power would be strengthened but this will not be done in cyberspace. There is no safe neighborhoods in the cyberspace to protect the high-level information. 85% of the military strength is owned privately but not owned by the government.

3.

Zertag says that the Internet has a “huge attack surface”. This indicates that the confidential information is hacked by the attacker through the internet. There are no safe neighborhoods in the cyberspace to protect the high-level information. Zertag compares the neighborhoods physically with the cyberspace. The attacks and cybercrimes through the internet are more than the attacks have done physically.

The Internet of things (IoT) can prevent hacking using some measures such as Encryption, providing strong passwords.

  • Encrypting the data and resource information using a strong key by firewall software can protect the data from the cyber-attacks. The encrypted data cannot be understandable to the third party. High level encryption methods can protect the information from cyber thieves.
  • Setting strong passwords to a system makes the hacker difficult to find the password of the system. A combination of letter, numbers, and special characters used to increase the strength of the password.

4.

According to Zertag, the five difference between cyberwarfare and traditional warfare are:

1. The traditional warfare uses physical weapons and advanced conventional tools in the war between the countries. The Cyberwarfare use interconnected digital technology like cyberspace. It makes offensive cyber actions results in strong disapproval and rejection by both sides.

2. The traditional warfare destroys the physical strength and equipment of the military. The Cyberwarfare attacks military by stealing the information through the internet.

3. The Cyberwarfare penetrates another country’s systems to damage or steal the information. The traditional warfare destroys degrades, disrupt, or destroy our military’s ability and strength.

4. The victim of the Cyberwarfare does not know that there are attacked through cybercrime activities. As traditional warfare is physical activity, the victims know about the attack.

5. In the Cyberwarfare, there is no warning before attacking. The malicious cyber crimes attacks through the internet at any time and damages the information. The response time before the counter attack is lengthy. But, in the traditional warfare, there will be a warning before the war begins. The response time before the counter attack is quick.


Related Solutions

1. Identify the three classes of noninfluential and two classes of influential investments in securities. 2....
1. Identify the three classes of noninfluential and two classes of influential investments in securities. 2. Under that conditions should investments be classified as current assets? As long-term assets? 3. for investments in available-for-sale securities, how are unrealized holding gains and losses reported?
What are the three major classes of symptoms of schizophrenia?
What are the three major classes of symptoms of schizophrenia?
1. Consider the endocrine system and hormones. a)What are the three general chemical classes of hormone?...
1. Consider the endocrine system and hormones. a)What are the three general chemical classes of hormone? ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ b)List the THREE physiological functions of the thyroid hormone. ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ c)How are thyroid hormones transported in the bloodstream? Why? Do the hormones enter the target cell directly? Describe the sequence of events when thyroid hormones bind to their receptors.
what would be the effects of an increase in the money supply according to the classical...
what would be the effects of an increase in the money supply according to the classical theory of money and the monetarist theory of money?
What are the 2-dual entry effects of billing client? What are the 2-dual entry effects of...
What are the 2-dual entry effects of billing client? What are the 2-dual entry effects of receiving bill? What are the 2-dual entry effects of unearned revenue?
1. What are the processes of PM according to PMI ? 2. What are the PM...
1. What are the processes of PM according to PMI ? 2. What are the PM Knowledge Groups ? 3. Why PM's roles is so crucial for the success of the project ?
1.For Marx, how many classes are there? What are they called? 2.What did Hobbes describe as...
1.For Marx, how many classes are there? What are they called? 2.What did Hobbes describe as “solitary, poor, nasty, brutish and short”? Why is it this way?
What are the three dominant classes of RNA molecules in cells? Which one of these three...
What are the three dominant classes of RNA molecules in cells? Which one of these three has the longest RNA molecules, and which has the shortest RNA molecules? How are RNA molecules synthesized in cells? Draw the chemical structure of a single elongation event. Explain how the synthesis of RNA molecules is terminated in bacterial cells. What modifications are added to an mRNA in eukaryotes after the mRNA has been transcribed?
According to the FDA, how many regulatory classes of medical devices currently exist, and what are...
According to the FDA, how many regulatory classes of medical devices currently exist, and what are the differences between them?
When doing statistical inference, we check three broad classes of assumptions: (1) randomization, (2) independence, and...
When doing statistical inference, we check three broad classes of assumptions: (1) randomization, (2) independence, and (3) normality of the sampling distribution. What is the consequence of violating these assumptions? (1) biased sample statistics, (2) invalid inference, (3) invalid inference (1) invalid inference, (2) biased sample statistics, (3) invalid inference (1) invalid inference, (2) invalid inference, (3) biased sample statistics (1) biased sample statistics, (2) biased sample statistics, (3) invalid inference (1) biased sample statistics, (2) invalid inference, (3) biased...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT