INTL 440 Cyber Warfare Analysis paper and questions

Anonymous
timer Asked: Feb 26th, 2019
account_balance_wallet $20

Question Description

This assignment consists of two questions (below) to test your knowledge and assimilation of the course objectives. You are to pick ONE and answer it in 4-6- page essay. Grading will be based on the rubric. Make sure you follow AMU’s writing policies and the Chicago writing style guide (cover page, page numbering, double space, headings/subheadings, etc). The use of required texts and readings from this course is mandatory, but you may supplement with additional academic (credible) sources. YOU MUST CITE YOUR SOURCES AND INCLUDE A BIBLIOGRAPHY.


Essay Question #1: Select one of the studies presented in Case Studies I (Week 6 Lesson) or Case Studies II (Week 7 Lesson) or another case of your choosing with instructor approval. Write an analysis paper providing more details of the attack, to include the following:

a.Victim, attacker, and probable motivation for the attack.

b.Nature and sophistication of the attack.

c.What was the desired outcome of the attack?

d.How successful was it?

e.How effective were the attackers in covering their tracks?

f.How did the victim respond?

OR

Essay Question #2: Discuss the future of cyber warfare. Include the following as part of your discussion:

a.How future wars will be fought.

b.How ethical is cyber warfare?

c.How the United States is preparing defensively to counter cyber-attacks?

d.What is next?

Tutor Answer

MercyK254
School: Purdue University

Attached.

Cyber Warfare
Author

Instructor
Course
Date

Surname 1
According to the Australian Cybercrime Online Reporting Network, a cybercrime is
defined as any crime that is directed at computers or other digital devices, where the computer or
other devices play a critical role in the execution of the plan either by it being the targeted victim
or the tool. The common types of cybercrime include phishing, hacking, grooming, inciting
terrorism and spreading hate, identity theft, and distributing child pornography.
Following the adoption of computers, digital data storage systems and other internet
related technologies by governments and other organizations in the recent pasts, they have found
themselves vulnerable to cyber-attacks which could bring their operations to a standstill. As a
result, a new war has erupted over the years as governments try to protect their different
organizations and citizens from cyber attacks.
How Future Wars will be Fought
For many years, warfare has been accomplished within effortlessly defined future periods
of time. For example, the development of weapons of mass destruction could be easily predicted
and clearly defined. Additionally, the geographical boundaries could be clearly drawn depending
on the parties that were being involved in the war. War could easily be defined as being fought in
the air, in the sea, or on the ground. However, the new era of the internet of things has
completely disorganized the domain of war by introducing an entirely new arena. Unlike
traditional warfare which involved weapons, cyber warfare is fought on keyboards.
The future of cyber warfare could evolve into different forms. The first one is
weaponized ransomware. This is the fastest growing type of cyber warfare and will become even
more popular in the future. It works by hackers infecting an organizatio...

flag Report DMCA
Review

Anonymous
Goes above and beyond expectations !

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors