Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Issue 1 Rodrigo Bijou: Governments Don't Understand Cyber Warfare

Issue 1 Rodrigo Bijou: Governments Don't Understand Cyber Warfare

Computer Science

Issue 1 Rodrigo Bijou: Governments Don't Understand Cyber Warfare. We Need Hackers. 9min https://www.youtube.com/watch?v=_nSHsb5xKPo Conflict has changed with the spread of the Internet. Aggressors are no longer just states, but individuals and private organizations can utilize and weaponize various platforms for their own agendas. Government organizations are too slow to adapt to digital conflict. Governments should step back and allow individuals, organizations, and corporations to step forward and protect the public online. • According to Rodrigo, what has the Internet changed? • Is conflict still restricted to physical borders? Besides countries (states), who is now involved in conflict? • When did cybersecurity become the top threat for the Worldwide Threat Assessment? • What does Rodrigo recommend governments do in order to protect the public? • Why is the government at a disadvantage to non-state actors when it comes to cyberwarfare? Issue 2 Jamie Bartlett: How the Mysterious Dark Net Is Going Mainstream. 14min https://www.youtube.com/watch?v=pzN4WGPC4kc Mainly focused on privacy. The Dark Net, accessed through the Tor browser, has become an increasingly popular way to browse the Internet in a manner that protects the individual’s identity. Their IP address is masked, and sites are censor-free. Not all sites on the Dark Net are illegal. Some sites include whistleblower sites (The New Yorker), political activists, libraries of books (sometimes pirated), etc. The Dark Net has become increasingly innovative in its operation (using cryptocurrencies, thirdparty/wallet transactions, micro-laundering systems, etc.) and even reflects typical market websites, such as Amazon, for illegal markets. 2-3 million daily users of Tor for mundane/legal activities. • • • • • • • • • • • What Internet browser can be used to access the Dark Net? What is so special about this browser? How many sites are estimated to exist on the Dark Net? Is everything on the Dark Net illegal? Where does innovation take place? According to Jamie, why do purchases nearly always arrive from the Dark Net? In an economy of choice, what tends to happen in the marketplace? The site that Jamie interacted with turned over how much money in trade before it was shut down? How did the Dark Net community solve the problem of consumers not receiving their purchases after giving the supplier money? Describe this solution. How has the public and market concern for privacy changed online behavior? How many users browse with Tor on a daily basis? Which mainstream organizations/groups have opened Dark Net sites? Issue 3 Avi Rubin: All your devices can be hacked. 17 min - https://www.youtube.com/watch?v=66-mr600NjU Focuses on the academic security community and what they have accomplished in regard to hacking different devices. The devices that the community tested were implanted medical devices, vehicles, using a phone’s accelerometer to log keystrokes, using reflections to capture smartphone passwords, and capturing emergency response unit’s and security operations unencrypted communication on P25 radios. • When Avi was at a dinner party, what did a woman ask him? • What is the first educational hack Avi covers? • What important milestone did the medical field hit in 2006? Why was this milestone so important? • Were the hackers able to disable the ICD? • What is second topic Avi covers? • What networks did the attackers focus on for automobiles? • What were the attackers able to do once they gained control of the computers in the car? • Avi talks about a piece of software that was used on a bus. What did this software do? • What was some of the information attackers heard when listening to P25 radios? • How did one group of attackers log keystrokes from computers? • What is Avi’s conclusion about these educational attacks?

Option 1

Low Cost Option
Download this past answer in few clicks

16.89 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE