{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]

QUESTION

 Cyber Weapons   

Zero-Day exploits and Cyber Weapons

Analyze the significance of the STUXNET malicious code events in Iran, and the significance of the Dragonfly malicious code currently found in the US and Europe (Do not dwell on describing the effects, instead describe the significance).
Analyze the effects of the global market for sale of ZDEs. Can the proliferation of ZDEs and cyberweapons be controlled or managed by a treaty similar to the Nuclear Non-proliferation Treaty? Is it possible to keep a count of cyber weapons the same way we can monitor nations to count their nuclear weapons? Explain your answer.
Describe the characteristics and possible effects on computer equipment and businesses due to a cyberattack using Electromagnetic Pulse (EMP) or Microwave Directed Energy. Compare those characteristics and effects on computers to the traditional effects that are commonly associated with a malicious code cyberattack. Look up the costs for various commercial EMP devices found for sale on the Internet.

 

 

 

Subject Technology Pages 4 Style APA

Answer

Non-proliferation Reign for Cyber Weapons

Cyber weapons are a relatively new addition to the toolbox of contemporary conflict but can destabilize society and international relations. This paper elaborates on the non-proliferation reign for cyber weapons. The areas covered in the paper are the effects of the global market for the sale of ZDEs, Controlling the proliferation of ZDEs and cyber weapons. The essay will also cover the possibility of counting cyber weapons, the characteristics and possible effects on computer equipment and businesses due to a cyberattack using Electromagnetic Pulse (EMP) or Microwave Directed Energy and will compare those characteristics and effects on computers to the legal effects that are commonly associated with a malicious code cyberattack. Look up the costs for various commercial EMP devices found for sale on the Internet.

Significance of the STUXNET Malicious Code Events in Iran, and the Dragonfly Malicious Code Currently Found in the U.S. and Europe

According to Medendorp (2014), STUXNET was designed to attack Iran’s nuclear facilities, thereby preventing mass nuclear weapons from being made. Dragonfly targeted ICS information, possibly for counterfeiting purposes, not to cause downtime, but for intellectual property theft (Medendorp, 2014).

Effects of the Global Market for the Sale of ZDEs and the Control of ZDEs Proliferation

Ranger (2015) argues that many highly qualified hackers worldwide are tirelessly working to discover computer system vulnerabilities that allow new ZDEs to be developed. These hackers are driven because ZDEs can be sold to bidders such as nation-states or extremists for significant sums. As software systems become more complex, the ZDEs hackers discover are increasing in numbers, making them an essential player in current and future generations’ cyber weapons. In the same way that a variety of steps are taken to disrupt cyber weapons proliferation, addressing ZDEs can entail a network of resources, including safety and security standards, technological remedies, and conventional instruments of non-proliferation.

Monitoring Cyber Weapons through Counting

Quantifying the size of the world’s cyber-weapons is a tricky business. Cyber-attacks are one area where most clam up, except for Western governments that are relatively transparent about their armed forces’ size. Intelligence agencies that have been pioneering the use of the Internet for surveillance have the highest-level capacity, such as the NSA and GCHQ (Pressman, 2015).

Characteristics and Effects of Cyberattack on Computer Equipment

The execution of a successful EMP attack on the U.S. could lead to a national electricity grid outage and a shutdown of grid-based critical infrastructure, including, but not limited to, communications, transportation, food and water supply, and sanitation. Without such vital facilities, such a shutdown could last as long as a year. According to Rodgers (2019), a large fraction of America could die of hunger, illness, or the consequences of a general breakdown of civilization.

Compare Effects on Computers to the Traditional Effects Commonly Associated with a Malicious Code Cyberattack

Amin (2017) states that EMP simultaneously threatens all electronic systems, while cyber-attacks threaten only systems that rely on software that can be attacked by cyber weapons, perhaps simultaneously, perhaps not. Nevertheless, both sets of attacks have a relative effect on society and the environment in general and can cause disruption and destruction.

In conclusion, Cyber weapons can have a much more significant effect on infrastructure and physical systems than conventional electronic warfare instruments can have. However, to ensure that everyone can respond more effectively, private companies should exchange knowledge about ineffective and effective data protection strategies with public sector enterprises and vice versa.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

.

References

 

  •  

    Amin, Z. (2017). A practical road map for assessing cyber risk. Journal of Risk Research, 22(1), 32–43. https://doi.org/10.1080/13669877.2017.1351467

    Medendorp, B. (2014, September 15). Belden Research Reveals Dragonfly Malware Likely Targets Pharmaceutical Companies. Business Wire. https://www.businesswire.com/news/home/20140915005170/en/Belden-Research-Reveals-Dragonfly-Malware-Likely-Targets-Pharmaceutical-Companies

    Pressman, J. (2015). The World Needs an Arms-control Treaty for Cybersecurity. BelferCenter for Science and International Affairs. https://www.belfercenter.org/publication/world-needs-arms-control-treaty-cybersecurity

    Ranger, S. (2015, May 6). The impossible task of counting up the world’s cyber armies. ZDNet. https://www.zdnet.com/article/counting-up-the-worlds-cyber-armies/

     

     

     

Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?