Verified Document

Cyber Warfare Cyber Attacks Essay

Related Topics:

Cyber warfare, a term defined by Clarke (2010) as an action of a nation-state to effectively penetrate another nation's computer resources or networks for the sole purpose of causing malicious damage or even disruption is a major cause of national and global security concerns (p.6).In this paper, we identify some cyber warfare tools (either Attack, Defense, Exploitation), and write a scenario to execute the tools. We also identify if the tool is for UNIX or Windows hacks, Router Attacks, etc. Also identified is why you would want to use the tool as opposed to another tool which may conduct the same form, via comparison and contrast. Cyber warfare tools

These are the tools that are used in carrying out cyber warfare activities. They may either be attack tools, defense tools as well as exploitation tools.

Exploitation tools

Vulnerability exploitation tools are the tools that are used for gathering information on a given network. These tools are used for assessing the vulnerability points in a give network. They include but not limited the following. Nessus, Metasploit, Core Impact, SQLMap, Social Engineer Toolkit, sqlininja, BeEF, dradis and WebGoa among others (SecTools,2012).In this category, we are going to discuss Nessus.

Nessus is noted...

The software features several features like high-speed discovery, asset profiling, configuration auditing, sensitive data discovery, and vulnerability analysis as well as patch management integration of a given system. The product can be used for checking credentials in both Unix and Windows systems (Tenable,2012b).
Merits

This tool is better than Metasploit, Core Impact, SQLMap, Social Engineer Toolkit, sqlininja, BeEF, dradis and WebGoa due to its high level of accuracy, functionality, versatility (Unix and Windows based) as well as its integrated nature.

Attack tools

Attack tools are the cyber warfare tools that are used for the attack of a nation state's computing resources. They include Hydra GTK, MetaSploit, AirSnort, Cain & Abel and Ethereal among others. In this section we are going to discuss MetaSploit.

MetaSploit

This exploitation tool is part of the MetaSpoit project, a widely known collection of security tools that were launched in 2003 by HD Moore (Andress & Winterfeld,2011).This attack tool comes in the form of MetaSploit Framework . The…

Sources used in this document:
References

Andress, J., Winterfeld, S (2011). Cyber Warfare, Techniques, Tactics and Tools for Security Practitioners. 1st Ed. Elsevier

Clarke, R A. (2010).Cyber War, Harper Collins.

SecTool (2012). SecTools.Org: Top 125 Network Security Tools. Available online at http://sectools.org/tag/sploits/

Tenable (2012a).Tenable Network Security. Available online at http://www.tenable.com/products/nessus
Tenable (2012b).Nessus 5.0:Installation and Configuration Guide. Available online at http://static.tenable.com/documentation/nessus_5.0_installation_guide.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

2007 Estonia Cyber Attacks
Words: 2990 Length: 10 Document Type: Term Paper

Estonia Cyber Attacks 2007 2007 Estonian Cyber-war This is the information age. In this age, the Internet has smoothened the progress of spectacular increases in global interconnectivity and communication. This form of globalization also yielded benefits for Estonia by improving the standard of living of its people. However, other than benefits, it has also ascended the availability of new weapons of confrontation for groups who have been seeking and opposing certain Estonian

Assessing the Damage of Cyber Attacks Using Norse Map
Words: 652 Length: 2 Document Type: Essay

Norse Map I looked at the live cyber attacks on map.norsecorp.com at 9:20 AM on 30 Jan 2016. As the attacks happened, the majority of them originated in China (more than 400 attacks were sent in just a matter of minutes) and the majority of the targets were in the U.S. (about 1000 hits in as much time coming from several countries in the East and in Europe). The U.S.

Cyber Warfare Over the Ages
Words: 2213 Length: 7 Document Type: Essay

This piece of information revealed that the malware program had infected resulted in heavy damage for the Iranian nuclear enrichment facilities. The program became the very first of its kind as there had never been any cyber attacks that lead to a computer program resulting in physical damage to mechanical systems on a large scale basis as was the desired attacked of the program. Additionally, the malware program also

Cyber Warfare
Words: 2636 Length: 10 Document Type: Term Paper

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the

Cyber Espionage As an Emerging Threat
Words: 2349 Length: 8 Document Type: Term Paper

Cyber Espionage Over the last several years, cyber espionage has become a major problem that is impacting a variety of organizations. This is because hackers and other groups are actively seeking to exploit vulnerabilities in security networks. Evidence of this can be seen by looking no further than the below tables (which are illustrating the motivations and targets of attacks). Motivations behind Attacks on Computer Networks Percentage Cyber Crime Hactivism Cyber Warfare / Espionage ("Cyber Attack Statistics,"

Cyber Threats: Executive Summary It Is Important
Words: 1475 Length: 4 Document Type: Essay

Cyber Threats: Executive Summary It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now