Final Project Part 1: Paper and Storyboard Tejashree Patel CYB-100 Professor Moneypenny March 20, 2018
Espionage, Intel Gathering, Cyber Warfare Intelligence Gathering Cyber Warfare Unlawful or unethical gathering of information about a competitor, or a foreign country, with intent to use the information to derail the plans of the country in question. Using resources to lawfully gather information which would help in making appropriate decisions about a certain situation. Here, the objective is to ensure safety of the interested parties Type of war occurring on the internet. It is a form of conflict that escalates to the extent of one party oppressing or hampering effective activities of another party by use of the internet or cyber space.
Military influence on intelligence gathering, espionage, and cyber warfare The military provides the necessary resources in the three activities The more tactical the military is, the higher the chances that it is effective in the three activities The three are part of what is learned in military academies as it aids countries be better equipped in protecting the citizens
Personal Privacy Incident The JP Morgan attacks on networks in the United States led to loss of personal information (Barzel, 2015) Perpetrators have since been arrested and are facing trial Conducting business in the cyber space prevents challenges such as: Data breaches for espionage acts Cyber crime and loss of client information to hackers
Physical Assets of the Cyber Domain Such assets that aid in effective activities within the domain include: a) Furniture and fixes: I have included these because they are needed to place and fix some machines in the cyber domain. b) Computer equipment: this includes serves, notebook computers and mainframe computers. They are all required because they are part of cyber domain. c) Storage media: these includes disks, DATS, magnetic tapes and CDs. They are important components of cyber domain. d) Technical equipment’s: These are also physical assets of cyber domain, and they include air conditioners, used for cooling machines and power supplies, that supply power in the machines. e). Communication equipment: they include fax machines, modems, EPABXs and routers, and these are also components of cyber domain.
Espionage, intelligence gathering, cyber warfare, and physical assets in the modern day The cyber domain is a primary asset in espionage and intelligence gathering The possession of physical assets is one of the primary deterrence against cyber warfare The more endowed a nation-state is, the more secure it is against cyber warfare
References Barzel, N. (2017, May 22). Israeli Media: JPMorgan hack perpetrator to pay $403 million to US authorities. Finance Magnates. Retrieved from www.financemagnates.com/forex/regulation/israeli-scammer-pay-403- million-us-authorities-following-sting-operation/