In: Computer Science
1. What are the three classes of cyberattacks and their effects, according to Zertag?
2. What metaphor does Zertag use to describe the idea that online, there are “no safe neighborhoods?” What does she mean?
3. What does Zertag mean when she says that the Internet has a “huge attack surface”? How will the “Internet of Things” exacerbate this issue?
4. What are the five differences between cyberwarfare and traditional warfare, according to Zertag?
1.
According to Zertag, the Three classes of cyber-attacks are, Intellectual property theft class, Military ability threaten to attack and Attacks that disrupt the way of life.
2.
The metaphor used to describe the idea that online, there are “no safe neighborhoods” as per Zertag is that if Country is under the cyber-attack, then the military power would be strengthened but this will not be done in cyberspace. There is no safe neighborhoods in the cyberspace to protect the high-level information. 85% of the military strength is owned privately but not owned by the government.
3.
Zertag says that the Internet has a “huge attack surface”. This indicates that the confidential information is hacked by the attacker through the internet. There are no safe neighborhoods in the cyberspace to protect the high-level information. Zertag compares the neighborhoods physically with the cyberspace. The attacks and cybercrimes through the internet are more than the attacks have done physically.
The Internet of things (IoT) can prevent hacking using some measures such as Encryption, providing strong passwords.
4.
According to Zertag, the five difference between cyberwarfare and traditional warfare are:
1. The traditional warfare uses physical weapons and advanced conventional tools in the war between the countries. The Cyberwarfare use interconnected digital technology like cyberspace. It makes offensive cyber actions results in strong disapproval and rejection by both sides.
2. The traditional warfare destroys the physical strength and equipment of the military. The Cyberwarfare attacks military by stealing the information through the internet.
3. The Cyberwarfare penetrates another country’s systems to damage or steal the information. The traditional warfare destroys degrades, disrupt, or destroy our military’s ability and strength.
4. The victim of the Cyberwarfare does not know that there are attacked through cybercrime activities. As traditional warfare is physical activity, the victims know about the attack.
5. In the Cyberwarfare, there is no warning before attacking. The malicious cyber crimes attacks through the internet at any time and damages the information. The response time before the counter attack is lengthy. But, in the traditional warfare, there will be a warning before the war begins. The response time before the counter attack is quick.