StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Sec 305 Week 4 assignment - Essay Example

Cite this document
Summary
Sec 305 Week 4 assignments Name: Professor: Institution: Course: Date: Abstract Information systems are composed of hardware, controlled by different software via a communication infrastructure to avail useful information to the users. The information system helps the users to be able to coordinate and make decisions in an organization…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Sec 305 Week 4 assignment
Read Text Preview

Extract of sample "Sec 305 Week 4 assignment"

Download file to see previous pages

Intrusion to these satellites would lead to a failure of the information system to convey real time data and also data integrity. Chinese started invading the United States and government in 2003. A successful attack was in 2007 where two United States government satellites and the Pentagons computer network were hacked by the Chinese military hackers. This was after a series of invasions which had Titan rain as the code name. The motive was to completely shut down Pentagon server computer which was had more than 1500 computers connected to it and to steal systems that are sensitive.

Some of these were, technologies used in surveillance and avionics for aircrafts (Barnes and Julian 2008). The attack is believed to have been through an email scum where a PDF document that appeared to have very important information. The hacker set up an email account that would be gotten rid of later. The account was then set up and made to have a screen name appear as that one of the target. The victim probably saw the message and thought that it came from one of his colleagues and opened it.

This launched the attached PDF and led to an automatic installation of malicious software in the machine. When the virus had completely configured itself the hacker had full control of the machine. With the hacker’s manipulation, the virus searched for files in the system. It then archived them and sent them back to the hacker through File Transfer Protocol or Hyper Text Transfer Protocol. The virus had sent approximately 24,000 files back to the Chinese hackers. When the pentagon realized that they had been hacked it was too late but it managed to use its sophisticated technology which indicated that the attacks came from the Chinese government.

It later took its computers offline for about three weeks to carry out thorough investigations and intensify their firewalls security (Barnes and Julian 2008). Evidently, a comparison of the US F-22 jet fighter and the Chengdu J-20 fighter has proved the success of Chinas intrusions. Though it had been a bit harder for the Chinese engineers to make an exact replica of the engine, they managed to produce a cockpit that looks exactly like that of the F-22 jet. The satellite attack was conducted through Svalbard ground station located in Spitsbergen, Norway.

It is believed that they used it because it depends on the internet to transfer files and accessing of data. It targeted two satellites, one used to provide information on terrain observation and the other used for earth climate observation. Terra AM-1, a satellite used by national Aeronautics and Space Administration, was completely under the hackers control but lucky enough they never took advantage of it (Barnes and Julian 2008). They only left Chinese military inscriptions which passed information on disabling an enemy’s ground based telecommunication facilities.

The Landsat-7 was the second satellite intruded. Experts said it experienced more than twelve minutes of interference. Such an attack posed potential threats such as denial, degradation or manipulation of the transmission by the satellite The intrusion was a wakeup call for the United States. It made them aware of the Chinese abandonment of the traditional warfare that involved attacks using arsenal via land, water and air to cyber space. This has made it more aware of Chinas

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Sec 305 Week 4 assignment Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Sec 305 Week 4 assignment Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1475868-sec
(Sec 305 Week 4 Assignment Essay Example | Topics and Well Written Essays - 750 Words)
Sec 305 Week 4 Assignment Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1475868-sec.
“Sec 305 Week 4 Assignment Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1475868-sec.
  • Cited: 0 times

CHECK THESE SAMPLES OF Sec 305 Week 4 assignment

Week 7 Hand-In Assignment

I would like to remind you about the importance of making your personal contributions original, i.... .... NO direct copy & paste unless you use citation marks (quotes, “ “) and then discuss the citations in your own words.... It is also important to remember to reference your… Answer: A database management which helps to isolate the softwares or programs from the data used by the program is known as data independence....
3 Pages (750 words) Assignment

Pharmaceutical Companies and Supply of Essential Drugs to Least Developed Countries

However, in certain sectors a different approach needs to be used.... Reference is made, for example, to the pharmaceutical industry where the effectiveness of a business is related to its potential to… The specific issue is explored in this paper.... Reference is made to a popular firm of the global pharmaceutical industry, GlaxoSmithCline, and its performance in promoting CSR in South Africa....
12 Pages (3000 words) Assignment

Strategic Change Management

Change is the managing process of moving from one state to a preferred state which groups, organisations and individuals undertake in retort to dynamic external and internal elements that impact… In 1956, Fortune magazine published its first list of “U.... .... .... s top 500 companies”....
25 Pages (6250 words) Assignment

Personal & Professional Development

Thus, I will assess my skills especially those outlined in my logbook.... Generally, self-assessment entails a high degree of self-awareness as well as having the aptitude to monitor my… This exploratory report assesses own attributes, competences and skills acquired in the course of my master's degree, as they will be important for success in my life in future....
12 Pages (3000 words) Assignment

Discussion of The Mystery to the Solution in Relation to the Urban Setting

Edgar Allan Poe is widely recognised as the father of the detective story genre(Scaggs, 2005).... His pioneering detective stories include “The Murders in the Rue Morgue”, “The Mystery of Marie Rogêt” and “The Purloined Letter”.... … However, the detective story genre has been the subject of much criticism since its inception in the mid-nineteenth century....
10 Pages (2500 words) Assignment

Mental Health Week in Australia

This assignment "Mental Health Week in Australia" is about a mental health promotion activity designed for the mental health week.... For the reader to follow this assignment better some terminologies need to be understood with clarity.... nbsp;Mental Health week in Australia is a week-long program in the period between October 5, 2008, to October 11, 2008....
18 Pages (4500 words) Assignment

Microelectronic: The Thomson Model, The Thomson Model, and Semiconductors

"Microelectronic: The Thomson Model, The Thomson Model, and Semiconductors" paper examines the Thomson Model, that otherwise known as the plum pudding model or the blueberry muffin model is a discovery from the experiments carried out by a British physicist, John Joseph Thomson in 1904.... hellip; The majority of the holes are excited to move down to the valence band....
16 Pages (4000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us