Description
Watch at least 45 minutes of the following (1 hour and 20 minute) video on Cyber Warfare:
https://www.youtube.com/watch?v=0EnTLju9_cE&t=107s
The three learning objectives of Module 8 are:
1. Describe the relationships and differences between hackers and viruses.
2. Describe the relationship between information security policies and information security plans.
3. Provide an example of each of the three primary information security areas: 1. authentication and authorization 2. prevention and resistance and 3. detection and response
Identify a scene or event in the documentary that you believe exemplifies ONE of these three learning objectives and provide a brief explanation for your choice.
Explanation & Answer
Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work. Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work Good luck in your study and if you need any further help in your assignments, please let me know Can you please confirm if you have received the work? Once again, thanks for allowing me to help you R
Running Head: INFORMATION SECURITY AND CYBER WARFARE
Information Security and Cyberwarfare
Name:
Institutional Affiliation:
Date:
1
INFORMATION SECURITY AND CYBER WARFARE
2
Information Security and Cyberwarfare
There exist factors that are common between hackers and viruses. Also, certain
factors help in differentiating between hackers and viruses. In this case, a hacker stands out as
a person who intends to gain access to a given information system without the authorization,
authentication, and knowledge of the owner to access a given resource for personal uses
(Dubois, 2013). A virus stands out as a...