Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Can someone help me to answer this question, is very important, thank you
- This topic has 1 reply, 1 voice, and was last updated 1 year, 1 month ago by .
Ransomware has become quite ubiquitous over the last three or four years, and it has been used widely by a number of nefarious individuals. Popular ransomware attacks include WinLock, Gpcode Trojan, and Reveton. Suppose that someone was able to design a new app designed to infiltrate another person’s computer hard drive in just the way that ransomware does and to hold that hard drive hostage until such time as its owner was able to pay-off a ‘ransom’. Would that app be considered a form of cyberattack? Is there anything morally wrong with cyberattacks, or should we accept that this is just another legitimate form of ensuring that one is treated fairly and respectfully on the open-market?
You must be logged in to reply to this topic.