Why are countries and businesses concerned about cyber

Assignment Help Management Information Sys
Reference no: EM131302480

LAST ISSUE -CYBER ESPIONAGE

Businesses and government agencies in many countries experienced a spike in targeted attacks originating outside their borders, many from China and/or Russia. Analysis of the attacks leads security experts to believe that many governments are involved in cyber espionage. Cyber espionage is the use of the Internet to spy on other governments. Not only is the Internet being leveraged for international espionage, but it is also being used for economic espionage. Economic espionage refers to the use of the Internet by nation-states to steal corporate information in an effort to gain economic advantages in multinational deals.
One report describes how Chinese hackers infected the Rolls Royce corporate network with a Trojan horse that sent secret corporate information from the network to a remote server. Shell Oil Company discovered a Chinese cyber spy ring in Houston, Texas, working to steal confidential pricing information from servers at its operation in Africa.

Although it would be easy to jump to the conclusion that the Chinese government is behind all of these attacks, experts are quick to point out that it is difficult to pinpoint the origin of an attack. The Internet makes it possible for hackers to launch attacks from any server in the world. If an attack originates in China and is engineered by a Chinese citizen, it still cannot be determined if that person is working for the government. The Chinese government vehemently denies any part in cyber espionage. Still, most governments hold the Chinese government accountable for not cracking down on hackers if not actually sponsoring them. It is estimated that 30 percent of malicious software is created in China. The next largest distributor of malware is Russia and Eastern Europe.

A report developed by security firm McAfee states that "120 countries are developing ways to use the Internet as a weapon to target financial markets, government computer systems, and utilities." A number of experts are calling this the "cyber cold war."

The Internet of Things may become the Internet of Threats!

Questions:

1. Why are countries and businesses concerned about cyber espionage that originates in China and Russia?

2. What are the dangers if the cyber cold war turns into an actual cyber war?

3. Find a recent article concerning Hacking or Cyber espionage. Recap the article. Then create your own question and answer from the content.

Reference no: EM131302480

Questions Cloud

What are the possible causes of this : You are the director of a visual art organization. An artist you are working with proposes a public art project that involves covering a large city park with a huge suspended canopy made of metal threads. What steps will you take to develop the pr..
Identify the essential characteristics of decision making : Identify the essential characteristics of decision making and indicate the range and types of decisions a manager makes Considering the activities, assignments, etc. What has been most useful?
Evaluate how interest rate risk can be managed : Argue the benefits of utilizing duration for measuring interest rate risk in financial institutions. If needed, feel free to include numerical illustrations for clarifying your discussion.
Determine effect that implementation of the rfc have : Determine the effect that the implementation of the RFC will have on service targets, service charges and service assumptions related to this agreement.
Why are countries and businesses concerned about cyber : Why are countries and businesses concerned about cyber espionage that originates in China and Russia? What are the dangers if the cyber cold war turns into an actual cyber war?Find a recent article concerning Hacking or Cyber espionage.
How important is ordering in v-blast : We may call such a system V-BLAST with no ordering. How does it compare with the V-BLAST (ZF nulling) curve in Figure 9.10? How important is ordering in V-BLAST?
Active business operation for research : It is recommended you visit a relative small but active business operation for this research.  A company with 50 to 100 employees can be better evaluated than a large corporation with many different work centers employing thousands of workers.  Yo..
Explain what stages were most challenging and why : Discuss the influence the decision-making process had on the outcome. Evaluate the effectiveness of the process. What stages were most challenging and why?
Calculation of the total project cost : Calculation of critical path and critical duration for the project - Calculation of the total project cost and suggest ways on how to optimize the cost

Reviews

Write a Review

Management Information Sys Questions & Answers

  Cultural perpsective on legal and ethics

Cultural Perpsective On Legal and Ethics in Manufacturing - How might their perspective be different than North American manufacturers?

  Differences in security strategies used by three industries

Include how each of these laws affects the requirements of companies or colleges and how each manages their security strategy to enforce compliance. Compare the effectiveness of each industry's efforts to ensure privacy issues are addressed and pro..

  Determine manner in which you would implement ip multicast

Determine the manner in which you would implement IP multicast in a campus network. In your response, provide two to three (2-3) reasons why you would choose to implement IP multicast as well as specific examples of Internet, Intranet, and multime..

  Politics of informationby politics we mean here the

politics of informationby politics we mean here the processes by which scarce resources are allocated and distributed.

  Describe the reasons for disney''s adoption of itil

Discuss the type of challenges a large organization such as Disney likely encountered during the ITIL implementation. How can these challenges be overcome?

  Why have personal navigation devices become popular

Why have Personal Navigation Devices become popular? What technologies are required to facilitate the success of PNDs

  The rise of mobile and e-commerce

Given the rise of mobile and e-commerce, discuss how these will be integrated into your business.

  When should you use a more prescriptive or agile approach

After reading chapter three, discuss the main differences between the two versions of the JWDConsulting case study. When should you use a more prescriptive or agile approach? Do you think users ofthe JWD Consulting Intranet site would prefer one r..

  How the virtual teams would collaborate and access

Create an architectural diagram that shows how the virtual teams would collaborate and access common repositories for documents, software, development, and testing facilities

  Differentiate the software concepts of operating system

Differentiate between the software concepts of operating systems, application programs, utility programs, and programming languages

  What areas of technology would you have to focus on

What would your responsibilities be to business intelligence implementation within your organization? What areas of technology would you have to focus on?

  Who is the intended audience of each article

Who is the intended audience of each article? What is the purpose or perspective of each of the articles? What are the common themes in the articles?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd