Why are countries and businesses concerned about cyber

Assignment Help Management Information Sys
Reference no: EM131302480

LAST ISSUE -CYBER ESPIONAGE

Businesses and government agencies in many countries experienced a spike in targeted attacks originating outside their borders, many from China and/or Russia. Analysis of the attacks leads security experts to believe that many governments are involved in cyber espionage. Cyber espionage is the use of the Internet to spy on other governments. Not only is the Internet being leveraged for international espionage, but it is also being used for economic espionage. Economic espionage refers to the use of the Internet by nation-states to steal corporate information in an effort to gain economic advantages in multinational deals.
One report describes how Chinese hackers infected the Rolls Royce corporate network with a Trojan horse that sent secret corporate information from the network to a remote server. Shell Oil Company discovered a Chinese cyber spy ring in Houston, Texas, working to steal confidential pricing information from servers at its operation in Africa.

Although it would be easy to jump to the conclusion that the Chinese government is behind all of these attacks, experts are quick to point out that it is difficult to pinpoint the origin of an attack. The Internet makes it possible for hackers to launch attacks from any server in the world. If an attack originates in China and is engineered by a Chinese citizen, it still cannot be determined if that person is working for the government. The Chinese government vehemently denies any part in cyber espionage. Still, most governments hold the Chinese government accountable for not cracking down on hackers if not actually sponsoring them. It is estimated that 30 percent of malicious software is created in China. The next largest distributor of malware is Russia and Eastern Europe.

A report developed by security firm McAfee states that "120 countries are developing ways to use the Internet as a weapon to target financial markets, government computer systems, and utilities." A number of experts are calling this the "cyber cold war."

The Internet of Things may become the Internet of Threats!

Questions:

1. Why are countries and businesses concerned about cyber espionage that originates in China and Russia?

2. What are the dangers if the cyber cold war turns into an actual cyber war?

3. Find a recent article concerning Hacking or Cyber espionage. Recap the article. Then create your own question and answer from the content.

Reference no: EM131302480

Questions Cloud

What are the possible causes of this : You are the director of a visual art organization. An artist you are working with proposes a public art project that involves covering a large city park with a huge suspended canopy made of metal threads. What steps will you take to develop the pr..
Identify the essential characteristics of decision making : Identify the essential characteristics of decision making and indicate the range and types of decisions a manager makes Considering the activities, assignments, etc. What has been most useful?
Evaluate how interest rate risk can be managed : Argue the benefits of utilizing duration for measuring interest rate risk in financial institutions. If needed, feel free to include numerical illustrations for clarifying your discussion.
Determine effect that implementation of the rfc have : Determine the effect that the implementation of the RFC will have on service targets, service charges and service assumptions related to this agreement.
Why are countries and businesses concerned about cyber : Why are countries and businesses concerned about cyber espionage that originates in China and Russia? What are the dangers if the cyber cold war turns into an actual cyber war?Find a recent article concerning Hacking or Cyber espionage.
How important is ordering in v-blast : We may call such a system V-BLAST with no ordering. How does it compare with the V-BLAST (ZF nulling) curve in Figure 9.10? How important is ordering in V-BLAST?
Active business operation for research : It is recommended you visit a relative small but active business operation for this research.  A company with 50 to 100 employees can be better evaluated than a large corporation with many different work centers employing thousands of workers.  Yo..
Explain what stages were most challenging and why : Discuss the influence the decision-making process had on the outcome. Evaluate the effectiveness of the process. What stages were most challenging and why?
Calculation of the total project cost : Calculation of critical path and critical duration for the project - Calculation of the total project cost and suggest ways on how to optimize the cost

Reviews

Write a Review

Management Information Sys Questions & Answers

  Are there any days in violation of the confidence limit

Develop an appropriate control chart for the days. -  Are there any days in violation of the confidence limits?

  What method would work best for a retail organization

What are important considerations for an organization dispose of old computer equipment? What method would work best for a retail organization?

  Supply chain risk mitigationwhat factors risks can

supply chain risk mitigationwhat factors risks can potentially disrupt a supply chain and how?what factors are the

  What achievements you accomplished in this module

Reflect on all the material covered (e.g. readings, learning activities, etc.) throughout this module. Explain your thoughts on which learning experiences influenced your perspectives on IT and why. Additionally, explain what achievements you acco..

  Prepare a position statement

Prepare a position statement - How can you market this position, online, to help increase sales?

  What step has organization taken in securing their knowledge

What personal knowledge management tools does this organization utilize? What steps has this organization taken in securing their information and knowledge?

  Discuss tools that could be used to remotely monitor a

discuss tools that could be used to remotely monitor a computer with or without the computer owners awareness. you can

  Service operations queues

How are people waiting in queues in service operations similar to buffering inventories in manufacturing and in what ways are they different

  How selected components can add value to the organization

Discuss the EA component(s) presented as part of the case study: integration of IT good and services, the governance of IT good and services, securing the enterprise, IT strategy, ITIL, BYOB. For example your case study may include a discussion o..

  What are some strengths of computer systems

Strengths of computer systems and What are some strengths of computer systems and technology use, including hardware and software?

  Feature that is provided by google doc

Analyze Google Docs and discuss some of the feature that is provided by Google Doc

  What is business process management

Write a one-page (250-word) paper explaining how organizations use business process management (BPM). Be sure to use at least one specific example from the CSU Online Library, and address the following in your paper: What is business process manageme..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd