Computer Science Homework Help

Computer Science Homework Help. Northern Virginia Community Large Machines in Multinational Industries Responses

 

reply one paragraph with one link on each of the following thread :

1- Sai Sohila Mantena

As the world becomes more dependent upon computer systems, the danger of cyber terrorism will grow. As a result, there must be a much stronger emphasis on computer security. Currently, what do you think is the most vulnerable computer system to cyber terrorism? What could be the results if attacked?
According to the researchers at RSA 2020 there is a growing trend of hackers attacking the critical infrastructure more often. For many years now there have been sittuations where hackers use sophisticated tools or methods that can take control of large machines, systems of a multinational industries. One of the most famous inccidents is stuxnet, the worlds first digital weapon,unlike the other worm or virus that existed before this ,instead of simply hacking computers and stealing sensitive information from them, Stuxnet broke out of the digital realm to cause physicla destruction to the equipment that was controlled by computers. It was created to infect the Iran Nuclear power plant in 2010. Its evident that the cyber terrorism prime focous is on the infrastructure and recent survey about 54 percent of the utility sector were expecting an cyber attack on critical infrastructures.
2-Alex Smith
As the world becomes more dependent upon computer systems, the danger of cyber terrorism will grow. As a result, there must be a much stronger emphasis on computer security. Currently, what do you think is the most vulnerable computer system to cyber terrorism? What could be the results if attacked?

I used to think the most vulnerable computer system to cyber terrorism was something as basic as phising, however throughout this course I’ve learned so much about the major threats presented today. Currently I believe our biggest cyber terrorist attacks are those that affect governments and infrastructure. If any of these institutions were attacked, it could be the complete distruction of governments. Upon my research I discovered that in 2007, there was an experiment called “Aurora Generator Test” conducted by researchers at Idaho National Laboratories (INL). This experiment was performed to demonstrate the results of a simulated cyberattack on a power network. The experiment was shown in a video where a power generator turbine was forced to overheat and shut down dramatically, after receiving malicious commands from a hacker. This experiment proved alarming results of what a possible cyberattack would be like. In the experiment video, it was exposed that other various power generators sharing similar cyber vulnerabilities could potentially be disabled the same way. You can read more about other results of a cyberattack in the article below.

Computer Science Homework Help