Cyber Warfare Cyber Attacks Essay

PAGES
3
WORDS
749
Cite
Related Topics:

Cyber warfare, a term defined by Clarke (2010) as an action of a nation-state to effectively penetrate another nation's computer resources or networks for the sole purpose of causing malicious damage or even disruption is a major cause of national and global security concerns (p.6).In this paper, we identify some cyber warfare tools (either Attack, Defense, Exploitation), and write a scenario to execute the tools. We also identify if the tool is for UNIX or Windows hacks, Router Attacks, etc. Also identified is why you would want to use the tool as opposed to another tool which may conduct the same form, via comparison and contrast. Cyber warfare tools

These are the tools that are used in carrying out cyber warfare activities. They may either be attack tools, defense tools as well as exploitation tools.

Exploitation tools

Vulnerability exploitation tools are the tools that are used for gathering information on a given network. These tools are used for assessing the vulnerability points in a give network. They include but not limited the following. Nessus, Metasploit, Core Impact, SQLMap, Social Engineer Toolkit, sqlininja, BeEF, dradis and WebGoa among others (SecTools,2012).In this category, we are going to discuss Nessus.

Nessus is noted...

...

The software features several features like high-speed discovery, asset profiling, configuration auditing, sensitive data discovery, and vulnerability analysis as well as patch management integration of a given system. The product can be used for checking credentials in both Unix and Windows systems (Tenable,2012b).
Merits

This tool is better than Metasploit, Core Impact, SQLMap, Social Engineer Toolkit, sqlininja, BeEF, dradis and WebGoa due to its high level of accuracy, functionality, versatility (Unix and Windows based) as well as its integrated nature.

Attack tools

Attack tools are the cyber warfare tools that are used for the attack of a nation state's computing resources. They include Hydra GTK, MetaSploit, AirSnort, Cain & Abel and Ethereal among others. In this section we are going to discuss MetaSploit.

MetaSploit

This exploitation tool is part of the MetaSpoit project, a widely known collection of security tools that were launched in 2003 by HD Moore (Andress & Winterfeld,2011).This attack tool comes in the form of MetaSploit Framework . The…

Cite this Document:

"Cyber Warfare Cyber Attacks" (2012, July 31) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/cyber-warfare-cyber-attacks-74986

"Cyber Warfare Cyber Attacks" 31 July 2012. Web.16 April. 2024. <
https://www.paperdue.com/essay/cyber-warfare-cyber-attacks-74986>

"Cyber Warfare Cyber Attacks", 31 July 2012, Accessed.16 April. 2024,
https://www.paperdue.com/essay/cyber-warfare-cyber-attacks-74986

Related Documents
2007 Estonia Cyber Attacks
PAGES 10 WORDS 2990

Estonia Cyber Attacks 2007 2007 Estonian Cyber-war This is the information age. In this age, the Internet has smoothened the progress of spectacular increases in global interconnectivity and communication. This form of globalization also yielded benefits for Estonia by improving the standard of living of its people. However, other than benefits, it has also ascended the availability of new weapons of confrontation for groups who have been seeking and opposing certain Estonian

Norse Map I looked at the live cyber attacks on map.norsecorp.com at 9:20 AM on 30 Jan 2016. As the attacks happened, the majority of them originated in China (more than 400 attacks were sent in just a matter of minutes) and the majority of the targets were in the U.S. (about 1000 hits in as much time coming from several countries in the East and in Europe). The U.S.

This piece of information revealed that the malware program had infected resulted in heavy damage for the Iranian nuclear enrichment facilities. The program became the very first of its kind as there had never been any cyber attacks that lead to a computer program resulting in physical damage to mechanical systems on a large scale basis as was the desired attacked of the program. Additionally, the malware program also

Cyber Warfare
PAGES 10 WORDS 2636

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the

Cyber Espionage Over the last several years, cyber espionage has become a major problem that is impacting a variety of organizations. This is because hackers and other groups are actively seeking to exploit vulnerabilities in security networks. Evidence of this can be seen by looking no further than the below tables (which are illustrating the motivations and targets of attacks). Motivations behind Attacks on Computer Networks Percentage Cyber Crime Hactivism Cyber Warfare / Espionage ("Cyber Attack Statistics,"

Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in