Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 . In what cyberattack that we read about this quarter did the attacke

ID: 3724552 • Letter: Q

Question

Question 1 . In what cyberattack that we read about this quarter did the attackers use multiple zero-day exploits?

Question 2. Name and briefly describe the first element of deterrence.

Question 3. Name and briefly describe the second element of deterrence.

Question 4. Name and briefly describe the third element of deterrence.

Question 5. For each of the following three activities, name the element of deterrence that the activity represents:

A. Having backup non-networked communications systems

B. Using a network firewall

C. Hackback

Question 6. A Rubber Ducky looks like a typical thumb drive, but when plugged into a computer it acts as what other type of common device?

Question 7. Place the following terms in chronological order:

A. Collect, Exfil and Exploit

B. Establish Persistence

C. Initial Exploitation

D. Install Tools

E. Move Laterally

F. Reconnaissance

Question 8. The cyberattack against Target stores is best described as an attack against which

one of the three elements of the CIA triad?

Question 9. A DDOS attack is best described as an attack against which one of the three elements of the CIA triad?

Question 10.

Why is the failure to provide of an organization to adequately protect data sometimes referred to as a negative externality?

Question 11. We learned of a cyberattack where a country attacked a private company in order

to punish the company for something it did that offended the country. What was the country, and what was the company?

Question 12. Describe an example of social engineering used in a specific cyberattack we learned

about this quarter.

Question 13 (4 points) What four countries are considered by the DoD to be the most

significant threats to the United States in cyberspace?

Question 14 (4 points). Would the attack on the Office of Personnel Management be considered

a targeted or an opportunistic attack? Why? (no credit for an answer without an explanation of

your answer)

Question 15 (6 points) . Describe the difference between a cyber espionage attack and a

disruptive cyberattack. Provide an example of one attack of each type that we learned about this

quarter.

Explanation / Answer

1)Answer:

Stuxnet and they used 4 zero day exploits

2)Answer:

Defense and it is the first step in defense protecting against the vast majority of aggressors and tricking others from attacking at all.

3)Answer:

Retaliation is when there is a willingness and capability to retaliate against any but not necessarily all attacks from any source under any circumstances.

4)Answer:

Attribution is the ability to cause an attack to a specific source to ensure legitimacy at home and abroad.

5)Answer:

A. Having backup non-networked communications systems – Attribution

B. Using a network firewall - Defense

C. Hack back - Retaliation

6)Answer:

Key logger or keystroke injection tool.

7)Answer:

economical property

8)Answer:

Confidentiality

9)Answer:

Availability

10)Answer:

Per the reading in the book, where it talks about a firm benefiting from production, but the public doesn’t get anything because of the toxic Pollution.

11)Answer:

The name of the Country was North Korea and the company that was attacked was Sony

12)Answer:

This is basically trying to con someone into giving up their information .ratherit is bank account, or log in credentials. The tactic is called phishing and what someone would do is create a fake website let’s say of the bank you bank at. It looks just like your bank, but when you enter your information, it is going straight to the attacker and you don’t even know until like a few days later when your bank account is drained and you have no idea how.

13)Answer:

North Korea, Iran, China and Russia

14)Answer:

I would have to say this was a target because the attackers I believe had intent on getting information including classified, personal in order to barge or gain the upper hand in negotiations of some sort depending on the ending objective.

15)Answer:

The difference in layman’s terms between Cyber espionage attack and disruptive attack is that in an espionage attack it is more calculated and strategic when getting information rather from a server, computer or anything to gain an upper hand on the enemy or foe. A disruptive attack has to do with attacking on large scales to do deliberate acts of disruption of networks by placing viruses ofmany sorts

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote