Monday, February 17, 2020

Sec 305 Week 4 assignment Essay Example | Topics and Well Written Essays - 750 words

Sec 305 Week 4 assignment - Essay Example Intrusion to these satellites would lead to a failure of the information system to convey real time data and also data integrity. Chinese started invading the United States and government in 2003. A successful attack was in 2007 where two United States government satellites and the Pentagons computer network were hacked by the Chinese military hackers. This was after a series of invasions which had Titan rain as the code name. The motive was to completely shut down Pentagon server computer which was had more than 1500 computers connected to it and to steal systems that are sensitive. Some of these were, technologies used in surveillance and avionics for aircrafts (Barnes and Julian 2008). The attack is believed to have been through an email scum where a PDF document that appeared to have very important information. The hacker set up an email account that would be gotten rid of later. The account was then set up and made to have a screen name appear as that one of the target. The vict im probably saw the message and thought that it came from one of his colleagues and opened it. This launched the attached PDF and led to an automatic installation of malicious software in the machine. When the virus had completely configured itself the hacker had full control of the machine. With the hacker’s manipulation, the virus searched for files in the system. It then archived them and sent them back to the hacker through File Transfer Protocol or Hyper Text Transfer Protocol. The virus had sent approximately 24,000 files back to the Chinese hackers. When the pentagon realized that they had been hacked it was too late but it managed to use its sophisticated technology which indicated that the attacks came from the Chinese government. It later took its computers offline for about three weeks to carry out thorough investigations and intensify their firewalls security (Barnes and Julian 2008). Evidently, a comparison of the US F-22 jet fighter and the Chengdu J-20 fighter has proved the success of Chinas intrusions. Though it had been a bit harder for the Chinese engineers to make an exact replica of the engine, they managed to produce a cockpit that looks exactly like that of the F-22 jet. The satellite attack was conducted through Svalbard ground station located in Spitsbergen, Norway. It is believed that they used it because it depends on the internet to transfer files and accessing of data. It targeted two satellites, one used to provide information on terrain observation and the other used for earth climate observation. Terra AM-1, a satellite used by national Aeronautics and Space Administration, was completely under the hackers control but lucky enough they never took advantage of it (Barnes and Julian 2008). They only left Chinese military inscriptions which passed information on disabling an enemy’s ground based telecommunication facilities. The Landsat-7 was the second satellite intruded. Experts said it experienced more than twelve minutes of interference. Such an attack posed potential threats such as denial, degradation or manipulation of the transmission by the satellite The intrusion was a wakeup call for the United States. It made them aware of the Chinese abandonment of the traditional warfare that involved attacks using arsenal via land, water and air to cyber space. This has made it more aware of Chinas

Monday, February 3, 2020

Create an appropriate Essay Example | Topics and Well Written Essays - 750 words

Create an appropriate - Essay Example The term evidence refers to the act of proving that ones thinking or reasoning is not only correct but also sensible. It involves showing. therefore, in the context of one claiming to be knowing something, he or she should be able to provide adequate evidence about it what he or she claims to be knowing or else the claim that he or she has will only be looked upon has an statement with lack of fact in it or an opinion since that will only be considered as telling those involve what we think about (Ruggiero 1998). There are different kinds of evidence which include personal experience, which exist on our minds; the formal observation which involves detached observation whereby the observer does not participate but keeps a distance from the study and participant observation whereby the observer is directly involved and research review which is done one the already undertaken research by reviewers who summarize everything and compare their findings. There is great relationship between e vidence and opinion. An opinion is just but a mere statement from any persons point of view and therefore, in any case, for an opinion to be accepted and looked upon has correct, practical and worth being adopted, an evidence has to be provide to support that statement. Hence, a statement without evidence is an opinion but a statement with evidence is not an opinion. For example , if a father tells his son that he was a top achiever in academics during his time has a student, the child wont be satisfied with his fathers statement unless his father show him is academics reports showing his excellence (Ruggiero 1998). In this case, the father is giving a statement which remains to be an opinion in which the child may either agree with it or not but in the case of the providing evidence, which will be the report of his academic achievements, the child with the will automatically accept and acknowledge the fact and will he will definitely work hard to be like his father. Therefore, evid ence and opinion are closely related in terms of establishing the reality, acceptability and the truth. Opinion is therefore of greater value in terms of laying a platform for the provision of the evidence and finally at justifying that one knows (Ruggiero 1998). With regard to knowing, evidence plays a very critical and important role towards justify the fact a person knows some. One is said to know only after providing evidence which could be through the act of explaining what he or she says that he or she knows, through demonstrating, through replicating an acting and so on and all this are what are equated to the term evidence. For instance, when one claims to be knowing the spelling of the word embarrass he as to support his statement by giving an evidence which is the correct spelling of that very word without failure. Evidence provision is at times problematic due to the fact that opinions are not based on anything substantial and there are also different types of evidence wi n which in the case of presentation the receiver may not be aware of all of them which may cause a dispute. Therefore, in the presentation of the evidence, the presenter is required to be well