Examples from the revolutions in Ukraine Georgia the Arab Uprising and the

Examples from the revolutions in ukraine georgia the

This preview shows page 4 - 6 out of 9 pages.

Examples from the revolutions in Ukraine, Georgia, the Arab Uprising and the ouster of Ukrainian President Viktor Yanukovych have reaffirmed this doctrine. Foreign influence through misinformation is considered a cybersecurity threat and the Russian cyberspace is monitored and censored. However Russia considers this as a cyberweapon against foreign countries. Russia’s coopting with criminal hackers allow the country to condone cyber hacking activities as long as it is not against former Soviet states or Russia itself (Ispi, 2018). 3. USA . The Americans view cyber threats as a security concern. The current presidential administration changed federal cybersecurity guidelines from the role of cyber defense to cyber offence. Recent federal and state laws have been updated to further define cybercrime and the related penalties to reflect current cyberspace state. For example, California introduced the California Consumer Privacy Act (CPAA) in 2018 which took effect January 2020 to enhance privacy rights and consumer protection for residents ( Grothaus, 2019) . 4. International Criminal syndicates . The Dark Web offers criminals tools like Botnets to conduct cyber crimes in scale that exceeds the domestic arena. Now, cybercriminals can operate internationally using Botnets like Dridex ( Dridex Banking Trojan Evolves into Bitcoin Ransomware Distributor, 2016) , Emotet ( Emotet Malware – An Introduction to the Banking Trojan, n.d .) and Trickbot to cause Distributed Denial or Service (DDoS), steal bank account and credit card information, or conduct espionage in commercial settings, and hold computing resources hostage for ransom.
Image of page 4
GLOBAL CYBERSECURITY ENVIRONMENT REPORT 5 Botnet Evaluation International criminal syndicates like the Russian Mafia and terrorist groups are known to employ botnets to conduct cybercrimes across international borders. Named by combining the words “robot” and “network,” a botnet is a network of computers infected with malicious software and remotely commanded and controlled by cybercriminals we call botmasters. Once infected, a computer joins a network of other infected computers awaiting orders from the threat actor in control—a kind of bot army always ready for the next nefarious mission the cybercriminal commander decides to launch. Botnets are very hard to detect, often evading anti- virus and other security tools altogether because the malware by which they’re facilitated grabs hold of the infected PC on a level deeper than the user and other applications (McMillen, 2016).
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 9 pages?

  • Spring '18
  • Federal Bureau of Investigation, Denial-of-service attack, E-mail spam, Computer crime

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors