What was the apparent motivation of the attacker

Assignment Help Management Information Sys
Reference no: EM131247832

Before doing this assignment, be sure you are familiar with the General Instructions for Written Assignments found in the Course Information Module.

Module 1 contains a list of cyberattacks with the title "Cyberattack Reference List".

Your assignment is to pick six attacks from that list which are disruptive cyberattacks, and for each of the six, answer the following four questions:

What company, government, organization (or group of them) was the target of the attack?

Who was the attacker? If it's not know for certain, what is suspected and why?

How did the attacker disrupt the target? (for instance, was it a DDOS attack, did they destroy files, etc.)

What was the apparent motivation of the attacker?

Remember that this list was used for the List assignment in Module 1. You may want to look there to begin to narrow down the list to disruptive cyberattacks. But don't just copy what you see there, it's not all correct.

Do not choose HBGary Federal, Target, or Stuxnet, we've already covered those.

Like most written assignments, this must be submitted as a PDF file.

You will not receive any credit for your answers if you choose an attack that was not a disruptive cyber attack or if you choose either the HBGary Federal, Target or Stuxnet attacks.

Module 1 Cyberattack Reference List

This is NOT required reading, at least not at this time. The list assignment in Module 1 and written assignments in modules 3 and 4 will refer back to this list.

1. AP Twitter Account Hacked

https://www.huffingtonpost.com/2013/04/23/syrian-electronic-army-ap-twitter-hack_n_3140849.html (Links to an external site.)

2. Fake Facebook Account for NATO Commander

(this is mentioned on page 58 in the textbook)

https://www.telegraph.co.uk/technology/9136029/How-spies-used-Facebook-to-steal-Nato-chiefs-details.html (Links to an external site.)

3. Operation Aurora (Google)

There's multiple victims in this attack. Just focus on what was done to Google.

https://www.wired.com/2010/01/google-hack-attack (Links to an external site.)

4. Operation Cupcake

(this is mentioned on page 105 in the textbook)

https://www.washingtonpost.com/blogs/blogpost/post/operation-cupcake-mi6-replaces-al-qaeda-bomb-making-instructions-with-cupcake-recipes/2011/06/03/AGFUP2HH_blog.html (Links to an external site.)

5. Stuxnet

(there's an entire section in the textbook, starting on page 114, about Stuxnet. You can find all you need there, though this additional source is also useful)

https://www.wired.com/2011/07/how-digital-detectives-deciphered-stuxnet/ (Links to an external site.)

6. Saudi Aramco

https://www.nytimes.com/2012/10/24/business/global/cyberattack-on-saudi-oil-firm-disquiets-us.html?_r=1 (Links to an external site.)

7. Sands Casino

https://www.bloomberg.com/news/articles/2014-12-11/nuke-remark-stirred-hack-on-sands-casinos-that-foreshadowed-sony (Links to an external site.)

8. Coca-Cola

https://www.bloomberg.com/news/articles/2012-11-04/coke-hacked-and-doesn-t-tell (Links to an external site.)

9. TV5Monde

Be sure to notice how the attribution of who was responsible for this attack changed from the first article to the second.

First article: https://www.bbc.com/news/world-europe-32229152 (Links to an external site.)

Second article: https://www.bbc.com/news/world-europe-33072034 (Links to an external site.)

10. Leavenworth Hospital

https://krebsonsecurity.com/2013/04/wash-hospital-hit-by-1-03-million-cyberheist/ (Links to an external site.)

11. Operation Buckshot Yankee

(this story is mentioned on page 64 in the textbook)

https://www.nytimes.com/2010/08/26/technology/26cyber.html?_r=1&ref=technology (Links to an external site.)

12. HBGary Federal

(this story is covered on pages 80-81 in the textbook)

The following article is quite long, but it's part of the outside reading for Module 2 anyway, so you don't lose anything by reading it now.

https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/ (Links to an external site.)

13. Bowman Dam

https://www.cnn.com/2016/03/10/politics/iran-us-dam-cyber-attack/index.html (Links to an external site.)

Here's the press release on the indictment, which is also in the outside reading in Module 1 because the main topic of the indictment is the DDOS attacks on US banks:

https://www.justice.gov/opa/pr/seven-iranians-working-islamic-revolutionary-guard-corps-affiliated-entities-charged (Links to an external site.)

14. Estonia

(this story is mentioned starting on page 110 and again on page 122 in the textbook)

https://www.theguardian.com/world/2007/may/17/topstories3.russia (Links to an external site.)

15. Target Stores

(this attack will be in the outside reading in Module 2)

https://www.washingtonpost.com/business/economy/target-says-70-million-customers-were-hit-by-dec-data-breach-more-than-first-reported/2014/01/10/0ada1026-79fe-11e3-8963-b4b654bcc9b2_story.html (Links to an external site.)

16. German Parliament

https://www.bbc.com/news/technology-36284447 (Links to an external site.)

17. Personal Info stolen for ISIS

https://bigstory.ap.org/article/e5d3ca728fd74166a0c67eaf33fcaf5c/guilty-plea-set-islamic-state-hack-us-military-info (Links to an external site.)

18. Georgia (the country, not the state)

(this attack is mentioned on pages 111-112 and 125 in the textbook)

https://www.nytimes.com/2008/08/13/technology/13cyber.html?_r=0 (Links to an external site.)

19. White House

https://www.cnn.com/2015/04/07/politics/how-russians-hacked-the-wh/index.html (Links to an external site.)

20. Hacking Team

https://www.bbc.com/news/technology-33409594 (Links to an external site.)

21. Bangladesh Bank

https://www.wired.com/2016/05/insane-81m-bangladesh-bank-heist-heres-know/ (Links to an external site.)

22. US DoD - Joint Chiefs Network

https://www.cnn.com/2015/08/05/politics/joint-staff-email-hack-vulnerability/ (Links to an external site.)

23. St. Louis Cardinals

https://arstechnica.com/tech-policy/2016/07/baseball-exec-gets-46-months-in-prison-after-guessing-rival-teams-password/ (Links to an external site.)

24. Premera Blue Cross

https://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/ (Links to an external site.)

25. Australian Sewage System

https://www.theregister.co.uk/2001/10/31/hacker_jailed_for_revenge_sewage/ (Links to an external site.)

27. Democratic National Committee

https://www.washingtonpost.com/world/national-security/russian-government-hackers-penetrated-dnc-stole-opposition-research-on-trump/2016/06/14/cf006cb4-316e-11e6-8ff7-7b6c1998b7a0_story.html (Links to an external site.)?

Reference no: EM131247832

Questions Cloud

Explain project management as a discipline : Describe the industries in which project managers are in high demand. Provide evidence to support your response. Describe the general role of a project manager, and explain the primary ways in which it differs across different industries. Compare the..
Was this a beneficial period for women''s rights : What major event(s) from Jackson's Presidential administrations do you believe made the greatest impact on the shape of the country, and why? Your answer should address events such as, but not limited to, the American System, the Corrupt Bargain, ..
Design an iterative and a recursive function : Design an iterative and a recursive function called replicate_iter and replicate_recur respectively which will receive two arguments: times which is the number of times to repeat and data which is the number or string to be repeated.
Should jack suggest a pay policy to lead or match the market : Case - Nutriment's New Hires. Should Jack suggest a pay policy to lead, lag, or match the market? Explain your recommendation
What was the apparent motivation of the attacker : What company, government, organization (or group of them) was the target of the attack? Who was the attacker? If it's not know for certain, what is suspected and why? How did the attacker disrupt the target? (for instance, was it a DDOS attack, did t..
Transactions has on the accounting equation : Indicate the effect each of the following transactions has on the accounting equation (i.e., assets, liabilities, and equity). Enter the number corresponding to your answer in the box provided. Answer choices may be used once, more than once, or not ..
Create a powerpoint presentation : You will create a PowerPoint presentation to address the question below. Your PowerPoint presentation should be between 11-12 slides, and developed as if you are presenting to fellow colleagues within the IT industry.
How they challenge classical liberalism : How they challenge Classical Liberalism? How do they challenge Interventionist Liberalism? Are there ways it could be consistent with Interventionist Liberalism?
How in depth should a literature review be in a paper : How in depth should a literature review be in a paper?  -  Would I have a paragraph that covers each reference, or would it brief one paragraph that briefly covers each reference?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd