Presentation is loading. Please wait.

Presentation is loading. Please wait.

Final Project Part 1: Paper and Storyboard

Similar presentations


Presentation on theme: "Final Project Part 1: Paper and Storyboard"— Presentation transcript:

1 Final Project Part 1: Paper and Storyboard
Tejashree Patel CYB-100 Professor Moneypenny March 20, 2018

2 Espionage, Intel Gathering, Cyber Warfare
Intelligence Gathering Cyber Warfare Unlawful or unethical gathering of information about a competitor, or a foreign country, with intent to use the information to derail the plans of the country in question. Using resources to lawfully gather information which would help in making appropriate decisions about a certain situation. Here, the objective is to ensure safety of the interested parties Type of war occurring on the internet. It is a form of conflict that escalates to the extent of one party oppressing or hampering effective activities of another party by use of the internet or cyber space.

3 Military influence on intelligence gathering, espionage, and cyber warfare
The military provides the necessary resources in the three activities The more tactical the military is, the higher the chances that it is effective in the three activities The three are part of what is learned in military academies as it aids countries be better equipped in protecting the citizens

4 Personal Privacy Incident
The JP Morgan attacks on networks in the United States led to loss of personal information (Barzel, 2015) Perpetrators have since been arrested and are facing trial Conducting business in the cyber space prevents challenges such as: Data breaches for espionage acts Cyber crime and loss of client information to hackers

5 Physical Assets of the Cyber Domain
Such assets that aid in effective activities within the domain include: a) Furniture and fixes: I have included these because they are needed to place and fix some machines in the cyber domain. b) Computer equipment: this includes serves, notebook computers and mainframe computers. They are all required because they are part of cyber domain. c) Storage media: these includes disks, DATS, magnetic tapes and CDs. They are important components of cyber domain. d) Technical equipment’s: These are also physical assets of cyber domain, and they include air conditioners, used for cooling machines and power supplies, that supply power in the machines. e). Communication equipment: they include fax machines, modems, EPABXs and routers, and these are also components of cyber domain.

6 Espionage, intelligence gathering, cyber warfare, and physical assets in the modern day
The cyber domain is a primary asset in espionage and intelligence gathering The possession of physical assets is one of the primary deterrence against cyber warfare The more endowed a nation-state is, the more secure it is against cyber warfare

7 References Barzel, N. (2017, May 22). Israeli Media: JPMorgan hack perpetrator to pay $403 million to US authorities. Finance Magnates. Retrieved from million-us-authorities-following-sting-operation/


Download ppt "Final Project Part 1: Paper and Storyboard"

Similar presentations


Ads by Google