There is no such thing as perfect software. There is no fool-proof security measure to fully protect security systems. Hackers are always trying to find holes in security measures. They exploit these holes to get important data from or to cause damage the victim they are attacking.When people think of hacking, they usually think of theft of personal information or taking down websites. When in reality, it has a much greater impact in the world.
Retrieved from http://www.nasatka.com/ |
A big part of the Ukrainian-Russian situation is cyber-warfare. Ukraine is currently fighting Russian hackers that are targeting important Ukrainian infrastructures. Darren Hayes, a computer security and forensics expert, claims that the damage done by the hackers is severe. Ukraine’s Security and Defense Council was recently taken down by a denial-of-service attack which immobilized their networks leaving parts of the country defenseless.
Retrieved from http://theworldoutline.com/2013/02/ us-cyber-defences-bolstered/ |
Cyber-crime has significantly changed over the years. I feel that it is hard to feel safe in a world that is becoming more and more digital. It feels like there are always new reports of people or companies getting hacked. With all this new cyber-crime, we depend on cyber-security
experts to devise new ways to combat these hackers.
References
Kachkan, A., Marinovic, K., Zivkovik, A.,
Frye, B., & Caloianu, I. (2014). Around the Bloc: Ukraine Clashes Claim
Their First Lives, Kremlin Accused of Backing Cyber Attacks. Transitions
Online, (01/28).
Bender, J. (2014, Mar 10). EXPERT: The Ukraine-Russia
Cyberwar Is 'More Serious And Damaging' Than The Annexation Of Crimea. Retrieved from http://www.businessinsider.com/ukraine-russia-cyberwar-extremely-serious-2014-3#ixzz2vfoojEUA
From your blog post I learned about the cyber warfare currently being fought between the Ukrainian and Russian hackers. However, I wished there were more information on other instances of cyber warfare or other possible avenues for countries to attack each other’s infrastructure through hacking. Also remember to cite your sources at the end of your blog especially if you directly mention that you information that you gathered from another person. For example, you should include where you obtained the information you gathered from Darren Hayes at the end of your blog via a reference section or a hyperlink to the page you got it from.
ReplyDeleteI enjoyed learning about a few different types of exploits, and how there is no 'fool proof' measure to protect our systems. This blogpost is especially relevant as it concerns Ukraine and Russia. I had no idea the Ukraine was under cyber attack from Russia. It is something to note. Would like more describing what types of cyber attacks Russia is using on Ukraine.
ReplyDeleteI have revised some of the things you guys talked about.
ReplyDeleteThis is an interesting read about cyber security, more specifically the Russian run hacking that went on with Ukraine. I would have liked to see more of an explanation about the hacking. For example, how was the system hacked, what was their motive, and if the faulty area of code has been fixed.
ReplyDelete