logo

Russian hackers tracked the email system

The assignment is an exam covering the topics of cyber war, cyber threats, and the impact of state and non-state actors. The student is required to answer two questions in essay format, using their own analytical thought process and citing external sources in APA format.

5 Pages1264 Words19 Views
   

Added on  2022-08-29

Russian hackers tracked the email system

The assignment is an exam covering the topics of cyber war, cyber threats, and the impact of state and non-state actors. The student is required to answer two questions in essay format, using their own analytical thought process and citing external sources in APA format.

   Added on 2022-08-29

ShareRelated Documents
Running head: Cyber Security
Cyber Security
Name of the Student
Name of the University
Author Note
Russian hackers tracked the email system_1
Cyber Security1
Define state and non-state actors and discuss the types of cyber threats they pose to our
nation:
Many actors are responsible for various threats for our nation, and this report can provide
detail information about non-state and state actors. Within last few years, there is a huge
number of hackers who are involved in the government system, and that can be very
dangerous threats to our nation (Luiijf, 2012). Recently few Russian hackers tracked the
email system and stole around 22 million databases from the government databases. Every
nation is feeling insecure right now after this incident.
Another example is the hack against the Chiefs. This hack is one of the refined attacks ever
happened. But we cannot compare it with the abilities of Russian hackers. They used a
method called “spear phishing” to hack against the White House and State Department and
systems.
One state can perform many cyber operations against another state, including its CII.
State actors are the primary government’s organization or agencies of different nations, and a
group of individuals or organization are called non-state actors. They are funded by the
governments. They can be financial institutions, NGOs, or armed forces (Luiijf, 2012). They
used to attack for personal gain. On the other hand, a nation-state is interested in geopolitics
and discouraging other states. Most of the non-state actors are motivated by their ideology
and financial gains only. Most of the time, the Defense Department does not provide
sufficient information about these issues. But it is clear an organization like ISIS has the vast
capabilities that big nations like China or Russia have. ISIS is the non-state actor and it is
funded by the government. International security firms approved that the group’s Pentagon
network interference was unnecessary. But their every attempts can create many concerns
regarding the possible damage coming from non-state attackers.
Russian hackers tracked the email system_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Technology Security
|13
|2712
|67

Cyber terrorism and Cyber warfare
|15
|4802
|116

Risk Assessment of the 2018 Football World Cup for the National Football Team
|19
|5425
|142

Cyber Security Attacks and Techniques
|14
|1105
|277

ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28

Effect of Cyber Warfare on the US
|6
|1415
|478