How should the us government react to the situation

Assignment Help Computer Engineering
Reference no: EM132083450

North Korea Fights Back?

North Korea has been accused by the Federal Bureau of Investigation (FBI) of being the mastermind behind the devastating attack against Sony Pictures Entertainment in December 2014.

However, it is far from certain that this was a state sponsored attack by a foreign government; some evidence points to a group of hactivists behind the attack. If North Korea is being falsely accused, as they have claimed, of being behind the attack they may now be fighting back to even the score.

The web site of the state-run North Korean news agency, which many users may have visited in order to get the Korean's side of the story, contains the file FlashPlayer10.zip served up by JavaScript code.

Not all users who visit the news agency web site are prompted to download this file: the JavaScript code looks first at the user's operating system, language preference, web browser version, and location before determining if the user should be prompted to download the file. This file contains two executable files--"Install Flash Player 10 Activex.exe" and "Install Flash Player 10 Plugin.exe"--that pretend to be part of the Adobe Flash player installation process but instead contain malware.

These files appear to steal passwords from browsers and perhaps perform other malicious actions. The time stamp on these files is actually prior to the Sony attack, but since time stamps can be easily manipulated it's not clear how long these files have been on the North Korean site.

Users who may have visited this site were urged to scan their computers for malware. In addition, Adobe itself later issued a fix for a critical vulnerability in its Flash software for both Windows and Mac OS editions.

Stay secure!

Homework Think Critically North Korea Fights Back:

Most Recent Activity

Submit an essay based on real-world scenario. The essay should be no more than 1-2 double spaced pages, size 12 font. It should have an introduction, a body and a conclusion. The essay could address any of the following questions:

1) Do you think North Korea was acting in what they thought was their best interest?

2) From a security stand point, what are people supposed to do?

3) How should the US government react to the situation?

4) What would be a good foreign policy when dealing with Cyber incidents like this?

5) How are computers supposed to be secure when hackers are coming up with new ways to attack computers every day?

6) What do you think the affect of actions like this are when it comes to computer security?

7) If there is another area you would like to address, feel free, but it should be relevant to the topic.

Requirements: I understand that students may not be the strongest writers, but you only get better with practice. I am not going to be the grammar police when it comes to this assignment but I would like you to write in complete sentences and synthesize your ideas.

I normally grade these assignments on whether or not you complete them as long as it is well written and follows a STRICT no plagiarism policy. You should use APA citation styles and all sources should be cited. If you are not familiar with APA, please google it. You should use at least 2 resources for the paper.

Reference no: EM132083450

Questions Cloud

Describe a way to modify algorithms such as scan : Give three or more examples of circumstances in which it is important that the operating system be unfair in serving 1/O requests.
How would you approach setting up the network : Newton is considering adding a new office and is exploring potential locations in Tacoma, Washington; Rochester, New York; or Fayetteville, North Carolina.
Explain the overlap by giving an example application : Explain the overlap by giving an example application in which the originator's usage period for the shared secret key begins before the recipient's usage.
Provide the journal entry for the october 15 : Provide the journal entry for the October 15 warranty work. If an amount box does not require an entry, leave it blank or enter "0"
How should the us government react to the situation : How are computers supposed to be secure when hackers are coming up with new ways to attack computers every day?
What is the current share price : What is the current share price? (Do not round intermediate calculations and round your final answer to 2 decimal places. (e.g., 32.16))
Which assets should delta corporation have elected : Which assets should Delta Corporation have elected Section 179 expensing for to have maxi- mized its depreciation expense and why
What is the price of the stock : A firm had EPS of $5.10 and paid dividends of $2.04 (think payout rate). The firm has a ROA of 12% and a ROE of 15%.
What is the price of the stock : A company has earnings per share of $3.82 from which it just paid $1.34 in dividends (think payout rate).

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd