WEEK4 E-PORTFOLIO 1Security and Payment Systems Student’s NameInstitutional AffiliationCoursesInstructorDate of Submission
WEEK4 E-PORTFOLIO 2Hacking and Cyber WarfareAccording to one BBC article published in 2017, it is as a result of a cyber attack that ledto a harmful programme attack computers in almost one hundred and fifty nations some of whichincluded the U.K, Russia, Spain, China, and the US. The WannaCry, as it is called, caused a lotof chaos in several organizations. However, the same was limited or contained by one individualknown as Marcus. The individual was then dubbed as an "accidental hero." Such came to be afterhe had his domain registered for the purpose of tracking the virus spread leading to ended up ofthe spread. Regarding definitions, hacking refers to the process whereby an individual forcefullygains access to a computer system. The break in involves finding ways of undermining thesecurity of a system and then gaining access. The same can be equated to breaking into a housethat has been locked (Pizzi 2014). Since you don’t have the keys to the locks, you will try to usealternative methods to gain access. Most hacking crimes are usually done against organizationsto gain access into the computer systems of the same organizations to cause havoc. On thecontrary, cyber warfare is all about battling through the use of computer programs. The battlemainly involves computer and networks. The operations performed in such cases are alwaysdefensive as well as offensive. On the same, the offenses are always related to cyber-attackingthreats, sabotage, and espionage. As much as the name war, in relation to cyber warfare iscontroversial, countries have been involved in such processes for a long period of time (Pizzi2014). Cyber war becoming devastating
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Effect of Cyber Warfare on the USlg...
|6
|1415
|478
Information Technology Securitylg...
|13
|2712
|67
Cyber terrorism and Cyber warfarelg...
|15
|4802
|116
Big Data Privacy: Balancing Personalization and Privacylg...
|19
|4957
|121
Case Study on Qatar National bank attack Assignment PDFlg...