Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
Cyber warfare is action of utilizing cyber technology to damage or cause harm to another nation state or country. Cyber warfare targets mostly states and governments that are operating across wide networks and nations around the world. Example could be government installation that is creating projects for nuclear weapons or new technology. The types of cyber weapons go from just Trojan horse to something much stronger and complex such as Trojan horse, SQL injections, DDoS attacks, backdoors, and many more attacks. The weapons and cyber attacks variety in many different platforms and code utilization. Examples is attacker could create stealth scanner with python program instead of net-cat program to avoid being caught. The weapons depend on complexity of programmers knowledge and understanding of making cyberweapon. Defensive measures can variety from major too large for organization such as using firewall, IPS or IDS, Packet sniffer, Whitelist or blacklist In organizations inner layer of network. The future of cyber warfare is going to continue to grow as technology advances and will become much complex than where it’s currently at right now. We have seen major spike in cyber attacks with 2020 and 2021 but it just won’t stop with advancement in technology.
Cyber warfare involves an attack on a nation’s cyber critical infrastructure by an adversary. A cyber attack that is categorized as cyber warfare might target a nation’s electrical grid, fuel supply, financial institutions, agriculture, or military resources. The purpose of cyber warfare is to effect as much damage as possible in an effort to weaken an adversary nation in terms of their resources and in terms of the faith of the populace in their government. The types of weapons and tactics an intruder might use are quite diffuse. Recently, we have seen the deployment of ransomware malicious software that requires the transfer of funds from the victim to the cyber-criminal in order for the victim to regain access to their own cyber infrastructure. We have also seen many highly publicized zero-day exploits, such as the cyber attacks that targeted US government agencies via the Microsoft outlook exchange. Throughout the length of this course, we have often learned that often the best defense is continued education and training provided to employees so that they do not fall victim to a cyber scam that has the potential to widely impact a cyber network. In addition to educating the workforce regarding the dangers of malicious software and all the ways in which it can be deployed, regular scans of networks associated with cyber critical infrastructure can determine any abnormalities that might be indicative of a cyber-attack. In the future, cyber warfare attacks will undoubtedly be more prevalent. Cyber-attacks are inexpensive and hard to attribute to a particular cyber action or nation state, making it the perfect way to conduct an attack while maintaining plausible deniability. The current administration’s focus on cyber security is crucial for safeguarding out networks in the future.