Verified Document

Assessing The Damage Of Cyber Attacks Using Norse Map Essay

¶ … Norse Map I looked at the live cyber attacks on map.norsecorp.com at 9:20 AM on 30 Jan 2016. As the attacks happened, the majority of them originated in China (more than 400 attacks were sent in just a matter of minutes) and the majority of the targets were in the U.S. (about 1000 hits in as much time coming from several countries in the East and in Europe). The U.S. was also the second largest attacker, with roughly 200 attacks on other countries in as many minutes. Every so often a massive strike would occur in which several dozen attacks would be launched simultaneously by China and the Norse map would convey this with dazzling graphics, lighting up the screen. The most impressive sight, however, was that these attacks are virtually non-stop. They are being launched every single second, often multiple times per second.

The attack organizations include Chinanet, Riskiq, Microsoft, Beijing China, Comcast, and the University of Berkeley among others. The target organizations include targets in Palo Alto, Washington, D.C., and San Francisco but the specific institutions are unnamed on the site.

What I find interesting about these attacks is their overwhelming number and that it appears that virtually every country is attempting them. From a global perspective, the entire world seems to be set up for cyber warfare and the site certainly indicates that this war is already...

Parts of this document are hidden

View Full Document
svg-one

Indeed, this appears to be a massive, global world war using cyber technology. Whether any of it is effective or damaging is the question I would like answered. I assume that Norse is set up to help protect against such assaults, but considering the amount of time and energy that is apparently put into these attacks, surely there must be some overall strategy.
What then is the aim of these attackers (on both sides of the Atlantic)? Are they seeking merely to annoy one another, to disrupt services, to show that they can do this, to seriously destroy cyber infrastructure? Is this just normal, par for the course activity given the day and age in which we live? Is this activity not really as big a deal as one might think, knowing next to nothing about the nature of cyber security and cyber warfare?

What surprises me most is that clearly there is a lot of organization going on in these endeavors and not a lot of secrecy. If I can get on the site and see what an organization is doing by launching a cyber assault on the U.S. or Canada or an institution in Europe (and vice versa) it makes me think that there is not a whole lot of shame felt by these attackers. They obviously do not care that anyone can see what they are up to. There is no hoopla in the media about this. It is as though this were just standard operating procedure, and so perhaps it is. Perhaps this should be no…

Cite this Document:
Copy Bibliography Citation

Related Documents

Attacks on Pearl Harbor and the World
Words: 8509 Length: 27 Document Type: Term Paper

Attacks on Pearl Harbor and the World Trade Center had similar historical events surrounding each attack. Franklin Delano Roosevelt and George W. Bush used similar policies to combat further attacks and unite the nation The paper highlights the entwined American reactions to the September 11 attacks and the Pearl Harbor attacks. The paper illustrates the similarities in which the over-prevailing backgrounds of each event created reactions to the devastating measures that

Attack on Pearl Harbor Lessons
Words: 973 Length: 3 Document Type: Essay

Yamamoto noted that "the war would continue for several years, our supplies would be exhausted, our ships and arms would be damaged and ultimately we would not be able to escape defeat." (Akira, 1990, pp.133-134). Masaru (1990) added that another difficulty between the two nations was America's attitude during the U.S.-Japanese negotiations on the eve of the outbreak of war. In particular, Masaru points to the hard line position of

Attack of the Butterflies Mark
Words: 1763 Length: 5 Document Type: Essay

The trick is not to focus on any of this, but to focus on preparation and then on the real thing. Do you think you're afraid to talk in front of other people? Guess what? The average person says 15,000 words per day. Unless you're in solitary confinement, those words are spoken to other people, sometimes two, three or more at the same time. You speak to family, friends, fellow

Attack in 2001 Was in
Words: 3433 Length: 10 Document Type: Term Paper

Such an attitude is part cultural clash and part resp0onse to external events, but it fosters a way of thinking that only leads to more conflict over time. U.S. support for Israel is often cited as the key element in explaining Islamic hatred of America, but that is only one element. The way the U.S. fails to understand Islam is another element that creates tension. Also, actions such as those

Attack of 911 Has Posed a Serious
Words: 4017 Length: 10 Document Type: Term Paper

attack of 911 has posed a serious threat to the aviation industry. For the first the world could realize that airplanes are not only the mode of transportation but can also be utilized as potential bombs. Many passengers are apprehensive of air travel. This led Governments, Policy Makers, aviation industries and regulatory authorities to think a while about aviation security. The aviation security is being revolutionized since then to

Attack Causality in Internet-Connected Cellular Networks, Internet...
Words: 796 Length: 2 Document Type: Essay

Attack Causality in Internet-Connected Cellular Networks," internet infrastructure security researchers Patrick Traynor, Patrick McDaniel and Thomas La Porta address the convergence of telecommunication and internet networks, and "how the architecture of cellular networks makes these systems susceptible to denial of service attacks" (2007). Rather than attribute the threat posed by denial of service attacks to the oft cited cause of limited bandwidth capability, the authors contend that telecommunication and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now