HW1 Assignment
Points Possible: 4 Points
Conduct a research using internet and answer following questions. You may summary from the findings, but “copy and paste” is not allowed.
1. Discusses at least five emerging threats to information security.
1. Cyberwarfare – The use of computer technology to disrupt activities in a state or organization, to deliberately attacking of information systems for strategic or military purposes. An example of cyberwarfare, is when in 2007 a foreign nation party managed to infiltrate into high tech and military agencies in the US and downloaded terabytes of information.
2. Identity theft – is when someone using another person personal information for the purpose to access the incomes, properties, money, credit, etc. The victim does not realize that he/she has been
…show more content…
Hackers – A person who uses computers to gain unauthorized access to data. Most hackers use Trojan which is a malware disguised as harmless software. The intent of the hacker is to get people to click on links and phishing scams. When a person who is clueless believe it’s from somebody close to them or coworkers. But, it was hackers trying to get in through emails and stuff and they use many tools.
4. Ransomware – It is a type of malicious software designed to block access to a computer system until a sum of money is paid. You could get ransomware if you click on a bad link or open a malicious email attachment. Its hidden like a plugin or email with clean looking attachment that gets installed without the person knowing about it. United States has been the number 1 country with the most ransomware where many PC machines were affected by this tool.
5. State-sponsored attacks – State actors have objectives that revolves around political, commercial, or military field in the country they are in. They are attempting to get information about their specific targets, or gain their trust and pretend to have a mutual relationship with the third party they want to
Ransomware is a malicious computer program that encrypts your computers contents and requires a key to unlock the encryption. You are instructed to wire bitcoins (anonymous internet
The SONET is a heavily multiplexed structure and with the header it can insert the data between the systems in a typical way. Here it’s give permit to have its own encapsulated data frame to float around its own system SONET/SDH and rate. This interleaving method is giving access to very less concealment for to encapsulate the data. Data is delayed mostly compared with frame rate here. Here SONET using padding method to multiplexing the data to transfer within the frame rate and here the data is clocked in completely disparate than the frame rate to transfer more data to be multiplexed.
15. Explain the importance of situating a society’s cultural and artistic expressions within a historical context.
While both medical care and public health work to improve the lives of many people, there are several distinctions between the two fields. Healthcare providers such as nurses and doctors are responsible for diagnosing and treating illnesses for individual patients. The care ranges from minor injuries to severe and chronic diseases. Meanwhile, public health strives to improve the well-being of a population. Public health advocates for the overall “promotion and prevention” of diseases before it even becomes an issue for healthcare providers. Public health encourages people to adopt healthy lifestyle choices and strives to control the outbreak of diseases. Although public health is often overlooked in the grand scale of medical care, it is undoubtedly the main aspect in ensuring that the overall health of a community is prospering.
1.1 Identify the regulatory requirements, codes of practice and relevant guidance for managing concerns and complaints in own area of work
To begin with, it is essential to understand what cyberwar is. “Cyber” essentially refers to anything electronic or internet-based. A cyber attack is when one entity hacks into the resources of another entity. This resource could be almost anything- an email inbox, a bank account, a stoplight, a factory, a power grid, or even a nuclear device. Cyberwarfare is to cyber attacks as nuclear war is to nuclear missiles; an exchange between two nations in an attempt for one to damage another. Cyber attacks come in two main forms: espionage and sabotage. In an espionage operation, the objective is to gain intelligence on strategic resources. For example, imagine a country hacking into a communication network to survey enemy troop movements or electronically stealing the blueprints for a missile. The other kind, sabotage, is much more direct. In this case, the objective is to either take control over or destroy an asset. This can range from something as basic as shutting down a website to something as massive and destructive as
Ransomware, malicious software or applications that make threats both idle and actual towards users of a particular application or service. This malicious software demands the targeted user and or entity to pay an enormous sum of money in return for the release of their personal documentation and or records back to them. These forms of attacks occur frequently in the United States and across overseas as well. The primary targets of some of the most recent attacks are primarily hospitals and personnel management offices as well as public record entities as well. There have been a total of 53,000 ransomware attacks in March
Identity Theft is the assumption of a person’s identity in order to obtain credit cards from back account and retailers; the crime varies from stealing money from existing bank accounts; renting apartments or storage units; applying for loans or establishing accounts using another’s name (legal dictionary, 2007). Identity theft and identity fraud are terms that are often used
Identity theft is a type of fraud, it is the deliberate use of someone else's identity. Most commonly to gain money or obtain credit and other benefits in the victim’s name. The victim whose identity has been stolen may suffer consequences such as being held responsible for the offender's actions. Identity theft occurs when someone uses someone else’s identifying information (such as their name, credit card number, passport, etc.) without their permission.
Ransomware is a type of malware that limits access to a computer system that it affects. Just as its name goes, it then asks for ransom payment to pay to its creator in order for the limitation to be taken away. Some of these malwares encrypt files on the hard drive while others just lock up the system and display messages persuading the user to pay the ransom (Michael). There are two types of ransomware, one that locks the screen and displays a message that prevents you from accessing the computer, and the other that encrypts files on a systems hard drive and prevents one from opening them (Blue).
Identity theft is when someone, without the consent of the owner, dishonestly uses, or intends to fraudulently use another individual’s personal identity. Personal identifying information can consist of an individual’s name, date of birth, driver’s license number, mother’s maiden name, state identification number, telephone number and other personal information that an individual can be identified with, such as a birth certificate or Social Security number. People who commits this form of fraud is committing a third-degree felony. Proceeding through the system as a victim of identity theft can be an extensive and confusing process. It is important for individuals to keep track of the actions they take and retain a record of their progress, as they contact law enforcement, financial institutions and creditors. If individuals make any decisions regarding their case or decide to talk to investigators without counsel’s advice, they may hurt their opportunity to defend themselves against any identity theft charges.
Identity fraud is stealing someone’s personal information and uses it for the purpose to defraud
Identity theft is when someone steals or takes your personal information using it without your permission and can damage your finances, credit history and reputation. The different forms of identity theft include social security identity theft, financial identity theft, driver’s license identity theft, criminal identity theft, medical identity theft, insurance identity theft, synthetic identity theft, tax identity theft and child identity theft. Social security identity theft is one of the most common because the social security number is one of the most valuable government based identity asset and American can possess. When someone steals it, they can sell it to undocumented workers or use it to steal properties. Using your social security
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network (Wiki).
Also criminals can use computers to communicate and store data. These criminals involved in these illegal activities are called hackers.