logo

Cyber Conflict, Cyber Espionage and Cyber Terrorism

   

Added on  2022-09-05

12 Pages2432 Words21 Views
Political Science
 | 
 | 
 | 
Cyber conflict, Cyber espionage and cyber
terrorism
Running head: IT write Up 0
Student’s Name
Address
Cyber Conflict, Cyber Espionage and Cyber Terrorism_1

IT write up 1
Contents
Introduction......................................................................................................................................1
Overview of Cyber Attack...............................................................................................................2
Chronology of the attack.................................................................................................................2
Technical means..............................................................................................................................3
Threat Actor.....................................................................................................................................3
Motivation........................................................................................................................................4
Targets.............................................................................................................................................5
Victim’s respond..............................................................................................................................5
Suggestion........................................................................................................................................6
Conclusion.......................................................................................................................................7
References........................................................................................................................................8
Cyber Conflict, Cyber Espionage and Cyber Terrorism_2

IT write up 2
Introduction
In today’s time, technology has spread its roots in almost every other area of life and every
second person does rely on the same. This developed technology serves several benefits to users
and proves an essential element in their lives. Nevertheless, some times, people suffer from
highly significant issues such as data loss, financial loss or cyberbullying out of their use of
technology such as different software and devices. These issues come out of incidents of cyber-
attacks or cyber terrorism where cybercriminals attack computers or networks of users using a
different type of advance and strong technique. The objective of this report is to develop an
understanding of one such incident of cyber conflict that has affected several people and their
operations. The case study selected hereby for the discussion is popularly known as “Wannacry
2017”. To understand this incident appropriately, many of the related aspects shall be discussed
such as a chronology of the event, threat actors, noncyber aspects, motives, targets, and others.
Overview of Cyber Attack
Before moving towards the discussion of other aspects, first, a basic understanding of the issue
needs to be developed. This is to state that the Wannacry 2017 was a ransomware attack that
happened worldwide. The attack is worth to study due to its huge impacts over 200000
companies across 150 countries, where millions of billions of loss have occurred out of it. The
most affected countries were Taiwan, Russia, India, and Ukraine. To discuss what happened this
is to state that under this cyber-attack, this is to state that ransomware worm (WannaCry) rapidly
spread across several computer networks in May 2017. It encrypted files available on the hard
drive of PCs after infecting their windows system. Due to such encryption, users became
Cyber Conflict, Cyber Espionage and Cyber Terrorism_3

IT write up 3
impossible to access their original files and thereafter the decryption of the files demanded
ransom payments in bitcoin. Several factors make this attack more significant. For instance, it
struck several high profiles and important systems including systems of national security
agencies of the US and national health services of Britain.
Chronology of the attack
The attack has followed a timeline under that it affected many organizations one after another.
May 12: Morning
Here to state that the first reporting of the attack under this series has made in Europe by 3:24 am
eastern time on 12th May 2017. Spain based Telecommunication Company, telephonica was
among the first major organization influenced by it, but the report has first made by the health
care sector of England where malware blocked access to records of patients.
May 12: Afternoon
Further, in the afternoon on the same day, the attack spread to several entities across the globe
including some major organizations such as MegaFon, FedEx and Renault. Here Microsoft
issued the statement calling the situation painful.
May 13
An update of malware expected to be released, which was increasing its spread. Microsoft
brought an additional security update for the consumers to protect their windows platforms.
Monday: May 15: Morning
Cyber Conflict, Cyber Espionage and Cyber Terrorism_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Overview of Cyber Security
|8
|1545
|60

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Ransomware Malware: A Walkthrough and Real World Example
|5
|1180
|59

Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

CJ 4472 - The Rampage of the Ransomware | WannaCry
|7
|921
|10

First Cyber Attack Report 2022
|8
|1508
|33