A number of web based firms offer what they describe as a free online security
check of your PC or network. Some require download of executable software for
the check. Would you trust such an offer? Why or why not?
Over the years, Ive come to learn the ha
What is cyber warfare?
Throughout the last couple of weeks, we have seen multiple examples of what cyber warfare is cable of
achieving. From bringing down nuclear reactors to standing up against an Islamic terrorist groups
actions. But cyber warfare is no
A cyber-attack can create more damage today than ever before. More banks and credit card companies
are being targeted by hackers and millions of dollars are spent each year to repair the damage and to
fortify the networks. Every major institution in the w
The malware that I am going to discuss this week on the forum is one that has affected
millions of American and people worldwide. XcodeGhost represents the first major
widespread malware incident to be reported under the Apple device family (Killham,
Based upon your week six case study and additionally week seven cases studies,
discuss the various cyber responses.
The group I chose to discuss last week was the hacktivist group Anonymous. Their
attacks targeted multiple groups throughout the last coupl
What are the capabilities and limitations of U.S. human and technical
intelligence collection programs?
The United States Intelligence Community has multiple tools in its arsenal that it uses to
collect intelligence. These tools have great capabilities bu
During the last couple of years, cyber hacking has grown to more than just a pass time
that a scrip kid would do during his spare time in his parents basement. We
continuously hear in the media about new breaches that have affected government