issc 452 discussion response

somw questions attached
April 11, 2023
lesson 13 diversity in the news whole class discussion
April 11, 2023

issc 452 discussion response

Hello,

I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.

1. The simplest and most economical way of identifying an individual is through a password. What are the conditions that are required to establish password protection and what are some reasons why passwords might not be the best approach to security?

2. Not all security experts agree that the threat of cyberterrorism is significant. Because no worldwide attack has yet been launched, some doubt that one will ever be launched. What you think? Use the Internet or other outside sources, research the cyberterrorism threat.


Student one:

Hello Class,

This week’s lesson is talking about what motivates hackers. Hackers hack for a lot of reasons: sometimes it’s simply boredom, sometimes its financial gain, or it can be a political statement.

1. The simplest and most economical way of identifying an individual is through a password. What are the conditions that are required to establish password protection and what are some reasons why passwords might not be the best approach to security?
Depending on the system you are establishing a password for, will depict the conditions. More secure websites will make their password requirements much more stringent. But I have used websites before that your last name could have been your password. Passwords are not usually the best approach to security, because they can be easily guessed. Also, most people tend to use the same password for everything, so once you get into one account you have gained access to all accounts. If a password is used as a two factor authentication, I think it can be a strong security point, it just needs another check point after or before it.

2. Not all security experts agree that the threat of cyberterrorism is significant. Because no worldwide attack has yet been launched, some doubt that one will ever be launched. What you think? Use the Internet or other outside sources, research the cyberterrorism threat

Cyberterrorism is defined as, “”premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.” (searchsecurity.com, 2019) I think the threat of cyberterrorism will become very relevant in future years. While some security experts think that it isn’t significant, I do. Data breaches like Target, Equifax, and Yahoo have showed the skill set of cyber criminals today. Cyber criminals are more skilled than they were 10 years ago and even in 5 years their skills have grown at a vast rate. The United States is a target and there isn’t anything that we can do about it. In order to delay the threat, we need to grow our filed of cyber security analysts faster than the cyber criminals do. At this point it’s an arms race to see who is going to be geared up before the other.

References

Curran, P. (2017, May 28). Cyber Terrorism – How Real is the Threat? Retrieved from https://www.checkmarx.com/2016/05/04/cyber-terrorism-real-threat-2/

What is cyberterrorism? – Definition from WhatIs.com. (n.d.). Retrieved

-Brittany

Student two:

1. The simplest and most economical way of identifying an individual is through a password. What are the conditions that are required to establish password protection and what are some reasons why passwords might not be the best approach to security?

There are many conditions that should be met while setting up a password, especially within an organization. Organizations should already have security policies and procedures in place pertaining to passwords so I will speak in reference to that as many of these requirements should be taken into account for personal passwords as well.

Minimum length requirement must be met. Both uppercase and lowercase letters must be used as well as numbers and at least one special character. If changing to a new password, new password must not have been previously used before (our organization gives us a 10 run password rule, it can’t be one of the last 10 used). Passwords must be changed every 90 days. Password must not include the individuals name or part of their name or their username.

While passwords are utilized heavily, they are not ideal for security. Passwords can be easily guessed (especially if the perpetrator knows the individual – for example: I guessed my grandmothers password on the second try based on what her interests are and her family life) and often times they are written down and can be easily found. Many people reuse the same password for multiple platforms and don’t change them, not to mention they’re weak.

2. Not all security experts agree that the threat of cyberterrorism is significant. Because no worldwide attack has yet been launched, some doubt that one will ever be launched. What you think? Use the Internet or other outside sources, research the cyberterrorism threat.

I just wrote a paper for another class that dealt with the Marriott data breach which was found that intelligence Chinese hackers perpetrated. While reading about this I also found that the nearly 500 million individuals whose information was stolen was “all going back to a data lake that can be used for counterintelligence, recruiting new assets, anticorruption campaigns or future targeting of individuals or organizations.” (Sanger, 2018) They’ve hacked health insurers and American security files, industrial secrets and the Office of Personnel Management and put all this data into their massive compilation of data on American citizens.

Chinese hackers are intelligent and ruthless and (I believe) are always looking for another country to blame for something or another. They need to hold the upper hand in technology and intelligence, and every other facet of the world.

“The potential for surprise in the cyber realm will increase in the next year and beyond as billions more digital devices are connected—with relatively little built-in security—and both nation states and malign actors become more emboldened and better equipped in the use of increasingly widespread cyber toolkits.” (Coats, 2018) America’s biggest cyber enemies are Russia, China, Iran, and North Korea and the Worldwide Threat Assessment of the US Intelligence Community states that they may pose for attack within the next year or so. As technology advances and we place more data online, this makes for bigger and extremely valuable targets.

Reference:

Coats, D. (2018). Worldwide Threat Assessment of the US Intelligence Community. Retrieved from: https://www.dni.gov/files/documents/Newsroom/Testimonies/2018-ATA—Unclassified-SSCI.pdf

Sanger, D., Perlroth, N., Thrush, G., Rappeport, A. (2018). Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing. Retrieved from:https://www.nytimes.com/2018/12/11/us/politics/trump-china-trade.html

-Kelley

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.