StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Chinese - American Cyber War - Assignment Example

Summary
This article addresses the breach of security into the American health industry and exposes previous events by the Chinese government and the Chinese hackers in relation to America internet attacks. The events then base a firm foundation for the Chinese implication on the on the anthem attack…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
The Chinese - American Cyber War
Read Text Preview

Extract of sample "The Chinese - American Cyber War"

 The Chinese - American Cyber War Abstract The anthem attack appears to follow a given directive aimed at theft of medical data. This is according to the structure followed by the hackers. The attack is traced back to foreigners seeking essential links into personal lives of key groups in the states. The attack targeted the defense contractors, government workers and holder of key positions in the society. The pattern followed reveal a high level of integrity in the selection of networking points. For instance, the anthem attack breached into target. Corp., Home Depot Inc., and the JPMorgan Chase. These corporations hold the private data on millions of Americans. The attackers targeted crucial information such as security numbers, date of birth, and address location. . A report released by the American Government indicate that, there was no breach of credit card security. Resourceful reason points fingers of blame to the chines hacker. China holds a long standing history pertaining such attacks to the American government. Introduction This article addresses the breach of security into the American health industry. The breach termed as anthem attack, executed a sophisticated attack to the American medical industry. The attack was aimed at gain unauthorized access to the ICT section of the medical sector in the American government.The article exposes previous events by the Chinese government and the Chinese hackers in relation to America internet attacks. The events then base a firm foundation for the Chinese implication on the on the anthem attack. Literature review Cyber wars of china All reasons pointed out, the Chinese hackers had something to do with the attack. China bears a long history of incidents of cyber terrorism. The American event won’t be the first implication of a daring attack from China. During the beginning of the year 2015, Google served a massive attack on it cooperate infrastructure. The IP address of this attack traced back to Chinese hackers. The attack on finance, technology, media, and chemical sectors had a shared IP address location.. This was according to a report by David Drummond, SVP chief officer.The cyber war far from the Chinese seems to be unpredictable. In the recent past, Chinese hackers have been on cyber warfare with the Russian and the Iran. Surprisingly, one largest search engine in China was hacked hours after the Chinese hackers attacked Google. The attack comes as aware fare with a hacking group named cyber army of Iran (Andress, Winterfeld& Rogers, 2011). Like many other attacks from China, the anthem attack had two motives. One purpose pointed out to the commercial industry while the other targeted key aspect of national security. For the past few years, China sponsored hackers collected prescription drugs and health records alongside other important information from the American. The move was directed at destabilizing the American health sector. The competition between the Americans and the Chinese goes behind political supremacy. For instance, America enjoys the privilege of having internet leaders like Google, Yahoo, Apple, and Microsoft. China, On the other hand, is stepping up with global leading cyber armies. As a way to diminish the powers and privileges enjoyed by the American Government, the Chinese hackers are launching massive attacks on American internet sector. These attacks are part of the Beijing campaign that aimed at fortifying a campaign termed as “grand firewall”. The campaign had a motive to strengthen the ability to spy on all web-based communication. Interestingly, the America’s top Internet sector, Google, led on the Beijing blacklist. Google entered the Beijing blacklist following the decline of consensus on the internet search through the China Google site. The Chinese hackers are magnifying the assaults on the e-mail system operated by the Microsoft, Yahoo, and Apple. The target is bringing down the stronghold companies in American. In the year 2014, Chinese hackers launched an attack termed as “man-in-the-middle” aimed at the I-cloud system. The attack aimed at compromising the security system of all I-phones by the apple industry. The attack breached security systems of the I-phone by intercepting passwords and messages. According to a researcher at the Swedish internet security, the attack originated from a backbone network belonging China Telecom as well as China Unicom (Akhgar, Staniforth& Bosco,2014). Just like other western internet titans that ride the china’s economy, the apple company faced the pressure of paying the price. Conspiracy with Korea On December 2014, the American government faced a cyber-attack from the Korean government. The attack saw America attempt to seek assistance from the Chinese governments. On 23 Dec 2014, the Chinese government responded with declaim to the offer. The Chinese government claimed that the evidence was insufficient. At the same time, the Chinese government dismissed the claims of cutting off Pyongyang’s internet. American sort assistance from the china’s technical team exposing the weak points of the American government to Chinese hackers. The period between the Korean attacks to the anthem attacks seems sufficient to point fingers at China. Evidence show that Korea and China have a definite relation to secrecy (Wu, 2007). On December 2014, as the world followed the saga of hacking operation against the American sonny picture, the South Korea’s nuclear plant’s computer system got hacked. None critical data went miss and later on leaked online by the attackers. The IP address of the hackers traced back to China, which diminished the claims to be baseless. The plan was to confuse the whole process of investigation on northern Korea. When confronted, the Chinese government dismissed all the claims against the hackers terming them as baseless. In the event of the anthem hack, the government of China declared no responsibility to the attack. In a report made to the BBC newsroom, the Chinese governments argued that an accusation on the Chinese hackers lacks sufficient evidence. Conclusion In conclusion, the Chinese government and hackers are the first suspect to the anthem attack. The conclusion bases a foundation on the reaction of the Chinese government to the anthem attack and the sharp background conflicts between America and China. From the review, it is clear that China is in an economic war with America. The anthem attacks seem to be an extension of a cheap war between the two governments. References Andress, J., Winterfeld, S., & Rogers, R. (2011). Cyber warfare: Techniques, tactics and tools for security practitioners. Amsterdam: Syngress/Elsevier. Wu, X. (2007). Chinese cyber nationalism: Evolution, characteristics, and implications. Lanham: Lexington Books. Akhgar, B., Staniforth, A., & Bosco, F. (2014). Cyber crime and cyber terrorism investigator's handbook. Waltham, MA: Syngress. Harris, S. (2014). @WAR: The rise of the military-Internet complex. Read More
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us