Final Project Part 1: Paper and Storyboard

Slides:



Advertisements
Similar presentations
CYBER & Product Liability & Professional Indemnity
Advertisements

1 Cyber Risk – What can you do…? Chris Clark Managing Director, Prosperity 24.7.
Computers and WEAPONS. Computers as Weapons or help Weapons.
Chapter 9: Privacy, Crime, and Security
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions May 16, 2015 DRAFT1.
Information Warfare Theory of Information Warfare
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Cybercrime & Breach Impact Questions American Bar Association Criminal Justice Section June 6, 2014.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Information Warfare Playgrounds to Battlegrounds.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
CPT 123 Internet Skills Class Notes Internet Security Session A.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Chapter 9 Enhancing Information/Computer Security.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
“Cyberdéfense” A French view on cyberwarfare S. TAILLAT CREC-ST CYR
Mission: To recruit, organize, train and discipline an all volunteer force in each state to assist state and local agencies for: Civilian Relief Community.
Information Warfare Playgrounds to Battlegrounds.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Defense Policy Making You may not be interested in war, but war is interested in you.
CUBE-A: Cuban Embargo Act Committee #4 Foreign Affairs.
High Availability Environments cs5493/7493. High Availability Requirements Achieving high availability Redundancy of systems Maintenance Backup & Restore.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Cyber Espionage Technical Presentation By: Brianna White.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Information Security and Privacy in HRIS
01Strategic intelligence 02Nuclear deterrent 03Defence of the realm 04Help in times of national emergency 05Support British influence 06Provide expeditionary.
Learn How You Can Fix AVG Uninstalling Problem And Experience Smooth Antivirus Service
Calgary Computer Security Solutions
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Ani Mkrtchyan ISOC Armenia
ICT II Unit 6 Networking.
Disaster and Emergency Management
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
E&O Risk Management: Meeting the Challenge of Change
Ethical, Social, and Political Issues in E-commerce
Cloud computing and government surveillance
Security Issues.
COMING TO THE HIPAA PARTY: TIPS FOR IT SUPERHEROES &
Year 10 ICT ECDL/ICDL IT Security.
Today’s Risk. Today’s Solutions. Cyber security and
Call AVG Antivirus Support | Fix Your PC
[ 6.6 ] National Security.
Matthew Allen Comp 2903 October 28th 2010
Federal Protective Service
IS4680 Security Auditing for Compliance
Understand Risks to IT Security
Preventing Information Technology Crimes
What IS ?.
Strategic threat assessment
The FBI The Federal Bureau of Investigation is the top law enforcement agency. They investigate all federal crimes and crimes where jurisdiction crosses.
People and Government: 2
LO1 - Know about aspects of cyber security
School Searches and You
“Security and self-defense” as a school subject
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Presentation transcript:

Final Project Part 1: Paper and Storyboard Tejashree Patel CYB-100 Professor Moneypenny March 20, 2018

Espionage, Intel Gathering, Cyber Warfare Intelligence Gathering Cyber Warfare Unlawful or unethical gathering of information about a competitor, or a foreign country, with intent to use the information to derail the plans of the country in question. Using resources to lawfully gather information which would help in making appropriate decisions about a certain situation. Here, the objective is to ensure safety of the interested parties Type of war occurring on the internet. It is a form of conflict that escalates to the extent of one party oppressing or hampering effective activities of another party by use of the internet or cyber space.

Military influence on intelligence gathering, espionage, and cyber warfare The military provides the necessary resources in the three activities The more tactical the military is, the higher the chances that it is effective in the three activities The three are part of what is learned in military academies as it aids countries be better equipped in protecting the citizens

Personal Privacy Incident The JP Morgan attacks on networks in the United States led to loss of personal information (Barzel, 2015) Perpetrators have since been arrested and are facing trial Conducting business in the cyber space prevents challenges such as: Data breaches for espionage acts Cyber crime and loss of client information to hackers

Physical Assets of the Cyber Domain Such assets that aid in effective activities within the domain include: a) Furniture and fixes: I have included these because they are needed to place and fix some machines in the cyber domain. b) Computer equipment: this includes serves, notebook computers and mainframe computers. They are all required because they are part of cyber domain. c) Storage media: these includes disks, DATS, magnetic tapes and CDs. They are important components of cyber domain. d) Technical equipment’s: These are also physical assets of cyber domain, and they include air conditioners, used for cooling machines and power supplies, that supply power in the machines. e). Communication equipment: they include fax machines, modems, EPABXs and routers, and these are also components of cyber domain.

Espionage, intelligence gathering, cyber warfare, and physical assets in the modern day The cyber domain is a primary asset in espionage and intelligence gathering The possession of physical assets is one of the primary deterrence against cyber warfare The more endowed a nation-state is, the more secure it is against cyber warfare

References Barzel, N. (2017, May 22). Israeli Media: JPMorgan hack perpetrator to pay $403 million to US authorities. Finance Magnates. Retrieved from www.financemagnates.com/forex/regulation/israeli-scammer-pay-403- million-us-authorities-following-sting-operation/