StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Attack by the SAP - Case Study Example

Cite this document
Summary
The paper "Attack by the SAP" discusses that it is essential to state that the SAP military can conduct a successful reconnaissance of about 250 nautical miles and that our unique geography will work against their success in making inroads in our soil…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Attack by the SAP
Read Text Preview

Extract of sample "Attack by the SAP"

Considering the geographical maps as shown in the diagram below of the position of the SAP and FRY, we have privileged information that the naval military of the SAP is majorly docked at the port of Banes and Haba (Heuer, & Pherson, 2011). These ports are directly opposite to two of our ports, that is Mia and Eyer. Given that there are conflicting reports on the kind of impending attack the SAP are planning, reports of diversionary attack have also reached us. The report indicates that they are planning to attack the port of Eyer and Mia simultaneously. We are therefore expected to consider undertaking a naval reconnaissance in our territorial areas in a bid to understand how and when to place military control for any attack.

Following the information on the attacks at the ports, we have to consider monitoring the ports so that any mishap from our adversaries does not materialize. The need to tighten security around the hot spots indicated by the reports should be swiftly put into place to curtail any advancement from the SAP. Following the analysis of the situation of the SAP, we are confident that the situation can be put under control given that we have all the necessary information to do so. The intention to attack us through their ports of Haba and Banes shows all indications to be true given that through our survey, we have noticed increased activities in the ports a clear show that they are preparing for attacks (IBM, 2013).

Concerning the intelligence reports that have reached us, we should thus spare no effort to ensure that we cushion ourselves from the impending attacks from our opponents. Despite general sage who is the supreme commander in the SAP military calling for peace from the neighboring nations, it can only be interpreted as a public relations exercise aimed at programming people’s minds that they are for peace while the intention is to attack us in the strongest possible way. We are supposed to treat those as public gimmicks and continue minding our security details in case of their attacks. This is the position we should hold until and unless otherwise.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Non Case Study Example | Topics and Well Written Essays - 500 words”, n.d.)
Non Case Study Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/military/1617851-non
(Non Case Study Example | Topics and Well Written Essays - 500 Words)
Non Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/military/1617851-non.
“Non Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/military/1617851-non.
  • Cited: 0 times

CHECK THESE SAMPLES OF Attack by the SAP

Attacking Cryptography Computer Security

Operating Systems store information about commonly used programs and through the network, programs such as KeePass can read encrypted files, posing a serious attack to cryptography as a data protection technique.... This study investigates and presents cryptographic attack trees which illustrate the methods Charlie can use to read Alice's data files in the data transfer channel.... The attack trees demonstrate a clear and reliable procedure for studying the access keys considering the information on the patterns of memory access....
6 Pages (1500 words) Report

Sensor Network Secure Routing Protocols

In this study, a new attack that causes a denial of service when exposed to all the previous on-demand network protocols is presented; it is referred to a rushing attack.... Ad hoc network protocols like AODV and DSR with all security protocols imposed on them can't discover routes that are longer than 2 hops when subjected to this attack.... This is a serious attack because it can be propagated by even relatively very weak attackers....
18 Pages (4500 words) Coursework

Forensics Based On Evidence Gathered With Peep Attacks

Firewalls cannot readily be configured to react to a Botnet attack by using information obtained from previous attacks.... The Peep attack is a variant application of a Botnet.... This paper proposes a forensic procedure to analyze the attack behavior and explains how to carry out a computer crime investigation.... We also discuss the well-known Botnets engaged in the execution of a Peep attack.... Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme....
15 Pages (3750 words) Essay

Wireless Network Active Attacks

Denial of Service:A denial-of-service attack is an effort to make computer resources unavailable to its intended users.... One general way of attack involves saturating the target machine with external communications requests, such that it cannot react to legitimate traffic, or responds so slowly as to be rendered effectively unavailable.... There are also other types of attack that may include a denial of service as a module, but the denial of service may be a part of a larger attack....
2 Pages (500 words) Essay

MITM (Man in the middle) attack

The definition of MITM is that it is a type of attack where the intruder or attacker intrudes into the conversation or communication between the endpoints on a given network to include or inject MAN IN THE MIDDLE attack by Presented Man in the Middle Attack Man in the middle attack abbreviated as MITM is the attack involving the intrusion of the attackers into the existing connection with an aim of intercepting the exchanged data and injecting false information.... Man in the middle attack abbreviated as MITM is the attack involving the intrusion of the attackers into the existing connection with an aim of intercepting the exchanged data and injecting false information....
2 Pages (500 words) Essay

Evolution of Web Security

The type of web attack launched by hackers depends on many factors.... Most factors are unique to the web attack as will be discussed in this essay.... This paper ''Web Security'' tells us that technological evolution has grown fast and vast.... Its impact on the organizational and individual's daily operations is intense....
12 Pages (3000 words) Essay

Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers

The objective of this paper "Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers" is to demonstrate why private companies and governments can mitigate a cyber-attack by destructively counter-striking against attackers.... .... ... ... The mitigative counter-strikes should entail liability rules for protecting third parties in case the process of hacking back harms a different party rather than the targeted attacker....
10 Pages (2500 words) Literature review

Network Attack and Defense

Therefore, this writer of this paper 'Network attack and Defense' decided to discuss network attack and defence mechanisms.... Knowledge gained in understanding both TCP and UDP is essential in designing data transfer channels and implementing security features to prevent a man-in-the-middle attack.... attack on Local Networks ...
10 Pages (2500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us