Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

North Korea Fights Back?

North Korea has been accused by the Federal Bureau of Investigation (FBI) of being the mastermind behind the devastating attack against Sony Pictures Entertainment in December 2014.

However, it is far from certain that this was a state sponsored attack by a foreign government; some evidence points to a group of hactivists behind the attack. If North Korea is being falsely accused, as they have claimed, of being behind the attack they may now be fighting back to even the score.

The web site of the state-run North Korean news agency, which many users may have visited in order to get the Korean's side of the story, contains the file FlashPlayer10.zip served up by JavaScript code.

Not all users who visit the news agency web site are prompted to download this file: the JavaScript code looks first at the user's operating system, language preference, web browser version, and location before determining if the user should be prompted to download the file. This file contains two executable files--"Install Flash Player 10 Activex.exe" and "Install Flash Player 10 Plugin.exe"--that pretend to be part of the Adobe Flash player installation process but instead contain malware.

These files appear to steal passwords from browsers and perhaps perform other malicious actions. The time stamp on these files is actually prior to the Sony attack, but since time stamps can be easily manipulated it's not clear how long these files have been on the North Korean site.

Users who may have visited this site were urged to scan their computers for malware. In addition, Adobe itself later issued a fix for a critical vulnerability in its Flash software for both Windows and Mac OS editions.

Stay secure!

Homework Think Critically North Korea Fights Back:

Most Recent Activity

Submit an essay based on real-world scenario. The essay should be no more than 1-2 double spaced pages, size 12 font. It should have an introduction, a body and a conclusion. The essay could address any of the following questions:

1) Do you think North Korea was acting in what they thought was their best interest?

2) From a security stand point, what are people supposed to do?

3) How should the US government react to the situation?

4) What would be a good foreign policy when dealing with Cyber incidents like this?

5) How are computers supposed to be secure when hackers are coming up with new ways to attack computers every day?

6) What do you think the affect of actions like this are when it comes to computer security?

7) If there is another area you would like to address, feel free, but it should be relevant to the topic.

Requirements: I understand that students may not be the strongest writers, but you only get better with practice. I am not going to be the grammar police when it comes to this assignment but I would like you to write in complete sentences and synthesize your ideas.

I normally grade these assignments on whether or not you complete them as long as it is well written and follows a STRICT no plagiarism policy. You should use APA citation styles and all sources should be cited. If you are not familiar with APA, please google it. You should use at least 2 resources for the paper.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93070923

Have any Question?


Related Questions in Computer Engineering

It has been a bad day for the stock market and you have

It has been a bad day for the stock market and you have heard that only 30% of all stocks gained value. Suppose you have a portfolio of 10 securities and assume a binomial distribution for the number of your stocks that ...

Remembering the pythagorean theorem - the square of the

Remembering the Pythagorean Theorem - The square of the hypotenuse is equal to the sum of the squares of the other two sides Your assignment is to design a Fortran 95 program with three solutions for the quadratic equati ...

Referring to the slides from text book chapter 5 there are

Referring to the slides from text book, Chapter 5, there are two versions of Fibonacci number calculators: BinaryFib(n) and LinearFibonacci(n). The first algorithm has exponential time complexity, while the second one is ...

Question 1conduct research to determine three types of

Question: 1. Conduct research to determine three types of computer crime. Please provide a detailed description for all crimes, and share an example of where an organization was impacted by each of the types. 2. Elaborat ...

Assignmenta in the slides and textbook one of the examples

Assignment (a) In the slides and textbook, one of the examples features a class for counting up. An interface which defines this functionality is given below: public interface IncrementCounter { //Increments the counter ...

Ambrose has indifference curves with the equation x2 k -

Ambrose has indifference curves with the equation x2 = k - 4(x^0.5) ... Where the larger "k" is, the higher the indifference curve. If good 1 is drawn on the horizontal axis, and good 2 on the vertical... What is the SLO ...

Question 1 page referencesthat respond to the following

Question: 1 page / references That respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use exam ...

How do you calculate the annual interest rate of 12

How do you calculate the annual interest rate of 12% compounded monthly. I know how to do for annually but not monthly. You are offered the opportunity to put some money away for retirement. You will receive 10 annual pa ...

Question suppose you are stranded on a desert island on

Question : Suppose you are stranded on a desert island on which queues are plentiful, but you need a stack. How can you implement a stack using two queues? What is the big-Oh running time of the stack operations?

Question what is an information system what are the

Question: What is an information system? What are the business benefits of information management? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA format.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As