Cyber Security: Threat Assessment and Response Strategies Analysis

Verified

Added on  2023/06/03

|5
|733
|138
Discussion Board Post
AI Summary
This assignment comprises a series of discussion responses focusing on cyber security threats and defense strategies. The first discussion response addresses critical system infrastructure and network security in the United States, emphasizing the impact of cyber terrorism and networking threats, particularly unauthorized intrusions. The second response examines viruses and worms as primary threats, defining these malicious programs and their potential to disrupt network systems. The third discussion delves into the origin and detection of hacking within organizations, highlighting methods used by hackers and strategies for identifying malicious activity. Finally, the fourth response analyzes theories for detecting hackers, focusing on choice theory and how hackers' overconfidence can lead to their detection. Each response references relevant literature to support its claims and provide a comprehensive overview of the discussed topics.
Document Page
Running head: CYBER SECURITY
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY
Response to the Discussion 1
The article throws light on the critical system infrastructure and the network system of the
United States. The discussion mainly put its focus on the information of the cyber terrorism
and networking threats occurring in the United States. I agree with the writer’s statement,
that the focus of the information breach has done most damage in the Unites states (Patil et
al.,2017). Many intrusions remain undetected unless there is some potential sign of intrusion
seen or the attacks. The paper discusses the onset of these problems since April 1998, for data
breach. The paper clearly gives prime examples through research that the military
organisation, NASA and the information defence are also affected by these networking
threats.
Reference
Patil, S., Jangra, A., Bhale, M., Raina, A. and Kulkarni, P., 2017, September. Ethical hacking:
The need for cyber security. In 2017 IEEE International Conference on Power, Control,
Signals and Instrumentation Engineering (ICPCSI)(pp. 1602-1606). IEEE.
Respond to Discussion 2
The discussion 2 shares the prime threats that the country fears are virus and worms. As per
the writer, I find this paper satisfactory enough to discuss the potential threats that have been
faced in United States. The writer primarily discuss the importance of the overall definition
of the virus and worm through referencing books and journals to help the reader have the
clear understanding about the subject(Narra, et al., 2016). The writer also throw lights over
Document Page
2CYBER SECURITY
the subject of malicious programs to show the content of the malicious programs that could
hamper the network system by creating the cyber-attacks. The strength of this discussion is
providing the information and example about the malicious program that can hamper the
network system.
Reference
Narra, U., Di Troia, F., Corrado, V.A., Austin, T.H. and Stamp, M., 2016. Clustering versus
SVM for malware detection. Journal of Computer Virology and Hacking Techniques, 12(4),
pp.213-224.
Response to Discussion 3
I am satisfied by the content of the discussion of the organization; the discussion focuses on
the matter on the origin and detection of hacking within the organization(Taylor, Fritschand
Liederbach, 2014). The origin of the hacking as described by the writer are through various
theories. Once of the best way to detect hacking is to notice the files with slangs, which is
mostly used in as hacking files. The writer also mentioned the three ways, processes, or ideas
that hackers used to attack the computer and information system. The writer added a detailed
explanation focusing on the strength and weakness that a hacker at the same time. The writer
has well explained the points with prime example and explanation.
Reference
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism.
Prentice Hall Press.
Document Page
3CYBER SECURITY
Response to discussion 4
I find the content shared in the discussion relatable. The discussion mainly discusses the
theories that can detect the hacker. The paper mainly put the choice theory in focus to show
the most effective organisation (Jajodia,2015). I feel that the content the way the student
explain that how hackers ignore the risk and weigh benefits more than the potential risk. This
mistake led to law enforcement detection. The precise explanation and well-written answer
help in bringing better understanding the justification validate the points of the choice theory.
The content also discuss the process of the way of the hacker’s working and how
overconfidence of hacker can lead his way behind bars.
Reference
Jajodia, S., Shakarian, P., Subrahmanian, V.S., Swarup, V. and Wang, C. eds., 2015. Cyber
warfare: building the scientific foundation (Vol. 56). Springer.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBER SECURITY
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]