Information Defense Technologies

User Generated

Abboznfgre961

Engineering

Description

Answer these questions while listening to the recorded lectures or looking over powerpoint slides. The answer to these questions comes from the recorded lecture that you are already working on "listen to 3 lectures and answer 3 discussion questions"

exam is based on these questions

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go! Let me know if you need any edits. Thanks

Running head: INFORMATION DEFENSE TECHNOLOGIES

Information Defense Technologies
First name last name
Institution

1

INFORMATION DEFENSE TECHNOLOGIES

2

Course concepts
What is information? Information technology?
Information is the synopsis of data. Data is first-hand facts that are processed into information.
Information technology is the deployment of computers to store, recover, transmit, and control
information or data. IT is regularly utilized inside the setting of business tasks rather than individual
or amusement advances.

What do we mean by "defense" in the context of this course?
Defense primarily means the protection of assets, contingency planning, reactionary as in reacting to
something, resistance to attack, actions to resist threats and risks, defense are military are
synonymous, changing from department of war to department of defense…..war sounds aggressive.
It has a bad connotation, not negative connotation, not in a war all the time……but ready to go (a
marketing change) • other aspects – cyber defense, homeland defense.
What is war? Can you give examples from history of famous wars,
identifying the combatants, issues, outcomes, and impacts?
The conflict between two groups/nations/parties/entities over people, resources,
ideology. It may also be defined as a prolonged conflict between two or more
parties that result in the harm of others, potentially harmful, kinetic destruction
and death or lethal force, etc.
US Civil War
• Union vs confederacy (northern vs southern states)
• Slavery.
• Union/slavery abolished/south economically ruined/
Syria
• Combatants – Assad regime and rebels, US and Russia, ISIS
• Issue – kind of a proxy war, the security of the region
• Outcome – ongoing
• Impacts – economy ruined, immigration out

What are the three levels of war?
Strategic level

INFORMATION DEFENSE TECHNOLOGIES

3

Operational level
, and tactical level

Can you give examples from history of actions or missions at each level?
Strategic Level. Concerning military activities, technique builds up a thought or set of ideas for
utilizing the instruments of national force in a synchronized and incorporated manner to accomplish
theatre, federal, as well as worldwide destinations.
Operational Level. The operational level connects the strategic work of powers to national and
military vital destinations.
Tactical Level. Strategies are the business and requested course of action of powers comparable to
one another. Joint convention concentrates this term on arranging and executing fights,
commitment, and exercises at the strategic level to accomplish military destinations doled out to
strategic units or teams.
What is meant by "joint" when used in the context of the U.S. military?
Functions that are normal to joint activities at all levels of war fall into six fundamental gatherings command and control (C2), knowledge, flames, development and move, protection, and
sustainment. The joint capacities strengthen and supplement each other, and incorporation over the
capabilities is fundamental to mission achievement.
What is cyberspace? Cyber power?
Cyberspace is a worldwide space inside the information condition whose particular, and one of a
kind character is encircled by the utilization of gadgets and the electromagnetic range to make,
store, alter, trade, and endeavour data using reliant and interconnected systems utilizing data
correspondence innovations.
Cyber power is the capacity to utilize the cyberspace to make points of interest and impact
occasions in the various operational situations and over the instruments of intensity.
Can you describe different tiers of threat in the cyber context?
Tier Description
I
Practitioners who rely on others to develop the malicious code, delivery mechanisms, and execution
strategy (use known exploits)
II Practitioners with a greater depth of experience, with the ability to create their tools (from
publically known vulnerabilities)
III

INFORMATION DEFENSE TECHNOLOGIES

4

Practitioners who focus on the discovery and use of unknown malicious code, are adept at installing
user and kernel mode rootkits, frequently use data mining tools, target corporate executives and key
users (government and industry) to steal personal and corporate data with the expressed purpose of
selling the information to other criminal elements.
IV Criminal or state actors who are organized, highly technical, proficient, well-funded
professionals working in teams to discover new vulnerabilities and develop exploits
V
State actors who create vulnerabilities through an active program to "influence" commercial
products and services during design, development or manufacturing, or with the ability to impact
outcomes while in the supply chai...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags