Using the information and format you obtained from the URLs provided, write a progress report about the technical report you are writing.
A progress report is an important document given to administrators, supervisors or instructors to update the status of a project. This report will summarize the progress that has been made to date, issues that have been solved, issues that are yet to be solved, items that need to be completed and a time table when various important features of the project will be completed.
Use the resources below for the requirements to correctly complete the assignment.
Handbook of Technical Writing; page 402
https://piktochart.com/blog/progress-report/
https://www.e-education.psu.edu/styleforstudents/c6_p10.html
Outline:
of cyber warfare
.
I
Abstract
Today’s word is digitalized, and everything is online from the governmental office to military office. All the work are web based therefore there are high chance of cyber warfare. Due to digitalized word countries has advanced their military power and start’s spying on other that causes cyberwarfare. Cyberwarfare is attacking on the information using computer technology to disrupt states or country. In this report the methods of the cyber warfare will be discuss further extend that make clearer about what is cyber warfare is?
Acknowledgment
II Keywords
A
Hacking
B
Identity Theft
C Cyberstalking and harassment
D credential stuffing.
E Brute-force attack.
III
Introduction
:
Due to digitalization on every sector from the business to the government work made life easy but cause risk of information stolen that are vital to maintain privacy of the country. Cyber warfare put a question that does governmental works should be out of the digital word, However, the government are spending time and money to make their system more secure and free from cyber warfare.
Hacking, Identity Theft, Cyberstalking and harassment, credential stuffing, Brute-force attack are major method of cyber warfare.
IV Literature Review
V Method:
A Hacking
Braking into the system.
1
SQL Injection
2 Sites Scripting
3 Ophcrack
B Identity Theft:
Use of another person identity
Method used for identity theft.
1 phishing
2 discarded information.
3
Spyware
.
C
Cyberstalking and Harassment
Harassing and threating the person using electronic communication
D Credential stuffing
Attack by using the by using stolen account credentials
E Brute-force attack
VI
Conclusion
:
Cyber warfare is biggest tread to the country government and military that exposes country strategies and further plans. At least if we prevent Hacking, Identity Theft, Cyberstalking and harassment, credential stuffing, Brute-force attack we can move to the next steps towards cyber securities.
VII Referennce
Methods of cyber-warfare
Comment by Daniel Creider: No title page in the paper
See week 5 for the format of the first 2-3 lines of the paper
Author Deepak Bhusal
Department of Computer Science and Information Systems,
A&M-Commerce
Abstract
Abstract Today’s world is digitalized, and everything is online from government offices to military offices. The online platform creates a big opportunity for the public to accomplish administrative work like paying tax, registering a vehicle, filling forms in a minute. As the online platform is responsible for everything from the financial to the transportation network, it is easy to target a specific system rather than using the whole military. Now that almost all the work is web-based therefore there are high chances of cyber warfare. Due to digitalized world, the countries have advanced their military power and have started spying on other nations, which is a root cause of cyberwarfare. Cyberwarfare is attacking the information using computer technology to disrupt states or countries. In this report, the methods of cyber warfare are discussed and further extended that clearly explains what cyber warfare is and how its different methods work in practical life.
Acknowledgement: Comment by Daniel Creider: This is not needed in the paper. If it were included it would be at the end of the document.
The satisfaction that accompanies the successful completion of any task would be incomplete without the mention of the people who made it possible whose proper guidance and encouragement has served as a beacon light and crowned our effects with success. I take an opportunity to thank all the distinguished personalities for their guidance throughout the duration of my dissertation. It is indeed a great pleasure to acknowledge and extend my sincere appreciation to all the individuals and institutions for their support on making my dissertation on the topic “Methods of Cyber Warfare” fruitful and successful. I would like to express my heartfelt gratitude towards my supervisor DR. Daniel Creider who guided me through the entire phase in the completion of my dissertation and whom I believe has devoted many days and nights in guiding me to achieve success in this work. I would like to remember the invaluable support from my colleagues for their constant and selfless help and support. At last, but not the least, I would like to extend my thanks to all those well-wishers, families and friends who helped me a great deal. I have taken utmost care to terminate errors according to my best of visibility, but I shall be obliged if they are pointed out to me. Besides, I shall welcome any constructive suggestions and criticism for the improvement of the study. Comment by Daniel Creider: You are not writing a dissertation! Comment by Daniel Creider: What? Who are you talking about. This is just a paper for this class. Where did you get all this and why is it in the paper?
Keywords: Hacking, Identity Theft, Cyberstalking and harassment, credential stuffing, Brute- force attack.
Introduction
Due to the integration of digitalization in every sector from corporate to government affairs, life is made easier but causes a risk of information mismanagement that is vital to maintaining the privacy of a country or organization. Cyberwarfare puts a question on digitalizing every sector, especially the government sector, and suggests that it should be out of the digital world. However, the governments are spending time and money to make their system more secure and free from cyberwarfare attacks, of any type. Countries across the globe, especially the developed countries are developing cyber weapons to ensure their sovereignty and balance of power in the coming times. The countries including Russia, China, the US, France are already not only developing cyber weapons but also used them in the past. The destruction of Iran’s nuclear program by the US and Israel through Stuxnet is a good example of cyber warfare. North Korea is also active in cyberspace. The recent turbulent relations with the US show how North Korea is challenging its competitor country (cyber warfare, 2021) Comment by Daniel Creider: Does this article have an author?
The old but confusing term called hybrid warfare, whose meaning is changing over time, simply means the effort to disrupt the democratic process. For example, in the run-up election, the entire organization is involved that might be categorized into many divisions. Each group focuses on a specific task, some involve changing the people’s sentiment through social media, some involve evaluation of the competitor websites or their online space and some involve cyber vandalism. The hard part is that this group is not directly involved in the process. There are many organizations that take the contract and get involved in such activities and that is why it is tough to trace out who is doing it. The “patriotic hacker” is mainly state-sponsored, while the hackers, who do at their own without any exception from the state are also one type that is being recognized as such group. Being a vast field of study, still developing around the globe, differently by different nations, cyber warfare may include many methods and techniques, varying from its uses in different contexts and of different levels; therefore, this report attempts to elucidate some of those methods and techniques, used in the world of cyber warfare. Comment by Daniel Creider: Looks like you need an in text citation here. Where did this come from?
Literature review
Organizations have become more focused on cyber security and increasingly aware of the urgency connected with it. In the United Kingdom, cyber security featured prominently in the National Security Strategy and the Strategic Security and Defense Review published in October 2010. Cyber warfare is arguably at the most serious end of the spectrum of security challenges posed by – and within – cyberspace. Just like the tools of conventional warfare, cyber technology can be used to attack the machinery of state, financial institutions, the national energy and transport infrastructure and public morale. However, while some actions may appear aggressive and warlike, they may not necessarily be intended as acts of war. It is important, therefore, to distinguish between warfare and non-warfare in cyberspace. It is the action and its warlike properties that matter as much as the actor. For example, the cyber actions of terrorist groups, spies and organized criminals can be harmful and appear aggressive, but they do not in themselves necessarily constitute acts of cyber warfare. Cyber warfare could be the archetypal illustration of ‘asymmetric warfare’ – a struggle in which one opponent might be weak in conventional terms but is clever and agile, while the other is strong but complacent and inflexible. The most distinctive feature of cyber warfare (and cyber security more generally) is the rapidity with which threats can evolve. The pace of change can be so abrupt as to render the action/reaction cycle of traditional strategy out of date before it has begun. There is a beguiling and dangerous argument that cyber warfare can be preferable as a ‘painless’ or ‘bloodless’ form of conflict that still delivers decisive outcomes. Victory and defeat are far from recognizable in cyberspace. These concepts have little traction in a domain where political, ideological, religious, economic, and military combatants fight for varying reasons, according to different timescales, and applying their own code of conduct to the fight. This results in a discordant and chaotic sphere of conflict in which it is not yet obvious that a common framework of ethics, norms and values can apply. Cyber warfare is often discussed in terms of alarming anecdotes which often seem closer to the world of science fiction than public policy. Moving beyond the anecdotal, cyber warfare must, however, be understood in the context of national strategy. This report identifies the essential characteristics of cyber warfare as a strategic phenomenon by describing the actions of cyber attackers and the reactions of defending governments and by analyzing the ‘ends, ways and means of cyber warfare. As a result, it proposes the following definition: Cyber warfare can be a conflict between states, but it could also involve non-state actors in various ways. In cyber warfare it is extremely difficult to direct precise and proportionate force; the target could be military, industrial, or civilian or it could be a server room that hosts a wide variety of clients, with only one among them the intended target. The most distinctive features of cyber warfare are: Cyber warfare can enable actors to achieve their political and strategic goals without the need for armed conflict. Cyberspace gives disproportionate power to small and otherwise relatively insignificant actors. Operating behind false IP addresses, foreign servers and aliases, attackers can act with almost complete anonymity and relative impunity, at least in the short term. In cyberspace the boundaries are blurred between the military and the civilian, and between the physical and the virtual; and power can be exerted by states or non-state actors, or by proxy Cyber warfare should be constrained and validated by politics, ethics, norms, and values otherwise the debate can be unbalanced in favor of military and technological responses to emerging threats. In the process, many of the challenges associated with cyber warfare will be clarified and resolved. For its part, politics must also acknowledge the challenges of cyber warfare: its complexities must be extended back into the world of politics, questioning deeply embedded assumptions about the primacy of the state, the authority of government and the role of government agencies and the armed forces as providers of national security (Cornish.P, et al.2010) Comment by Daniel Creider: What is the citation? Comment by Daniel Creider: This looks like it was just copied from an article. If it is a direct copy it must be quoted. It needs an in text citation. I would say this is not the style of your writing unless you are an expert in this area!
Methods
Among several methods and techniques involved in the world of cyber warfare, the ones that are discussed here are hacking, identity theft, cyberstalking and harassment, credential stuffing, brute-force attack; and how these methods vary from one another is also discussed.
Hacking
Hacking is a broader term and name given to several of the activities that compromise the breaking of electronic and digital accessories/securities, unlawfully and manipulating them (“What Is Hacking? | What You Need to Know About Hackers”, 2021). Apart from just manipulating digital devices, hacking can sometimes, involve entire networks, and by compromising a whole network, there may be certain motives such as theft, spying, etc. Mostly, hacking is technical in nature, which involves electronic gadgets and digital devices, such as computers, mobiles, etc., and using them, hackers may fulfill their aims and objectives. Hacking may involve certain methods, among which a few are discussed here as under:
Moreover, it has been important to highlight the kinds of the cyber-attacks that has taken place in many activities. As there were many of the committed hackers that have much expertise in the software programmers as well as manipulation (Votipka et al., 2018). They have been concentrated with their actions in exploring the intricacies of the network of computer. Moreover, most of the hackers have been in state-sponsored as well as in the lawful activities whereas some of them were not. Although both kinds of the hackers have been declared as the part of the cyberwarfare. Moreover, most of the legal hackers have been considered as the legal hackers. Although such legal hackers have conducted the cyber space operations that has gone under the legal authority mostly for the legal purposes with none of the adversarial intent.
SQL Injection
Structured Query Language (SQL) is a specific programming language used for managing data present in a database. As the name indicates, SQL injection involves accessing a larger database to retrieve information unlawfully. The mode of operation of SQL injection is that instead of imputing a username, I.D., or password in each field, a hacker may input an SQL statement, which is run on the database and this instantly gives that hacker access to that database (“SQL Injection”, 2021). A recent and most prominent example of an SQL injection attack was observed in 2020, where from the database of Flaticon website, emails, and passwords of almost 8.3 million users of Flaticon and Freepik were stolen (“SQL Injection is Still a Critical Attack Vector”, 2020) and that lead to data breach and multiple monetary gains were made from this theft, by the hackers, leading to a lengthy audit of the company.
Among several methods to prevent from being attacked by any SQL injection, only one method is validated to be used. This method includes validation of inputs and using some prepared statements, the queries are parameterized in earnest (“What is SQL Injection (SQLi) and How to Prevent It”, 2021). It is pertinent to mention here that the input should not be used directly by the application code and, all the input must be sanitized by the developer instead of cleansing only the web-based forms. Along with that, at the production sites, the visibility of the database error should be turned off to remain relatively safe from the SQL injections getting access to it and knowing your flaws. Once an SQL injection is discovered, although nothing much can be done about that, however, firewall based on the web application can be used to sanitize the input (“What is SQL Injection (SQLi) and How to Prevent It”, 2021), only as a temporary solution.
Site Scripting
Site scripting, often known as cross-site scripting, is a method of entering into the database, where a set of malicious codes is injected using a web application via a genuine and trusted website (Kristen, 2021). This is usually done when there are flaws detected in any genuine website and hackers get the advantage of that flaws. It works by tricking a vulnerable website into displaying malicious JavaScript to web users. It helps an attacker to get around a similar policy of origin, which is meant to keep sites apart from one another. Cross-site scripting flaws allow a hacker to impersonate a victim user and perform any activity that the primary user is capable of, as well as to reach out to any of the important data of the user himself. In case the targeted user has any privileged access to the application, the attacker can take complete control of the application’s features and data. After the code enters the user’s browser, anything informative or secretive retained by that browser may get into the hands of those executing that site scripting. The codes being contained in a trusted website have often fewer chances to be detected and secured unless the website itself has used precautionary measures.
There can be multiple forms of a site scripting attack, such as Reflected Cross-Site Scripting, which is done by injecting that malicious coding into the current HTTP request, and is considered the simplest of all; Stored Cross-Site Scripting, where the script, malicious one, comes from the database of the website itself, often an untrusted one; and DOM-based Cross-Site Scripting, where the client-side JavaScript in the application handles data from an untrusted source in an unsafe manner, typically by writing back to the DOM (“Cross-site scripting (XSS) and how to prevent it? | Web Security Academy”, 2021). The intentions of the attacker in this type of hacking can be different, depending on the situation and the scope of the hacking, ranging from accessing user login credentials to injecting malicious trojan wares into the user’s system.
To prevent a system from such type of attacks, there are certain steps that can be taken, such as the incoming input can be filtered out completely for any malware, the data on output can be encoded as well to prevent it from being easily interpreted, appropriate headers can also be used in response, and as a safety measure, Content Security Policy (CSP) can also be utilized to reduce the severe consequences of an imminent attack.
Ophcrack is a famous platform, a tool, used to crack passwords of Windows, Mac, or Linux operating systems. It is one of the very common methods to hack into a system, illegally, for the purpose of stealing information or espionage, other than its day-to-day use of recovering or bypassing passwords of a locked computer system. The mode of operation of using an Ophcrack tool is that it guesses the passwords until a working password is obtained, and that is done on the principle that every password on a computer is saved in the form of respective ‘hashes’, rather than in plain text (SLANGEN, 2009), and this tool is used to decode those hashes against their respective digits or alphabets, thus, recovering the password.
Since Ophcrack is software-based and can be used in day-to-day operations, prevention for it is designed to be rather simple than to be complex, but the downside is that it also can be trespassed easily. The usual method of preventing an Ophcrack software to run is setting up a password on startup itself, on BIOS, as the system will require a password before even booting, preventing any software to run. However, it also has a loophole, that when the battery from the motherboard is pulled out, that password is gone, again. So, to further strengthen the security of the system, there is the option of installing other applications, such as some antivirus software which can be configured to block any such process, accessing I.D and password.
Identity Theft
In the world of cyber warfare, identity theft, today, poses a great danger to even the common citizens of a country. It is done by stealing an individual’s information via their emails, passwords, online banking accounts, etc. stored on a system’s database and later using them for transactions that are deemed illegal. Some of the techniques of identity theft are:
Phishing Comment by Daniel Creider: Sub headings should be in bold
Phishing is an act of stealing identity where an individual’s information, often sensitive, is obtained, by pretending to be from a genuine organization, via a seemingly genuine website or spoofed emails, asking for personal information (“Phishing”, 2021). Due to this, the major threat is that the personal data is on the verge of being compromised and, especially financially, an individual may suffer in the long run, such as when bank account details, etc. are targeted. Reportedly, people tend to suffer more due to phishing identity theft than any other type of cybercrime, especially considering the present age of social media, where a user can be lured into seemingly genuine sites, stealing a person’s identity and information, without any significant notice.
One of the most famous examples of phishing is of a Maryland-based businessman Dave Crouse, who got his information regarding bank accounts and credit cards were stolen via some online platform and could not even notice it (“How Online Identity Fraud Destroyed One Man’s Life”, 2010). According to him, he used online shopping sites and often used his credit cards for the online transaction. However, from February 2009, his account showed negative statements and several transactions. And with the time being, his debit on his bank accounts increased and crossed the limit of 100000 dollars, leaving him in ruins.
Although an individual may strive to protect his identity and information on online platforms, but with the developed tactics, he is still at risk of being looted online. To prevent such an incident from happening, one can apply precautionary measures such as staying updated about the latest techniques of phishing, thinking before responding to any random email or before clicking on any suspicious website, installing anti-phishing extensions and toolbars into the browsers, using firewalls and antispyware protection, and staying up to date about all the online accounts, especially associated with banking (“Phishing”, 2021).
Discarded Information
As the title indicate, this type of identity theft includes a heap of the information left or discarded in electronic drives or over the internet which may become handy to some of the cybercriminals as they perform ‘dumpster dive’ through all that seemingly useless data. This sort of identity theft is even dangerous because an individual willingly disposes off his files, unknowingly his critical information, and in this way never knows of his precious information being misused. There can be several ways to prevent any such activity from harming your identity or information via your discarded information. The first is preventing any such information from being discarded on online platforms. The best way to prevent this is never to save any valuable information on any online platform or the browsers themselves. Whenever the need is over, one can erase all the information saved over those online platforms. To prevent such happening from the discarded electronic drives is never ever to discard any electronic drive in its intact condition. The best way to ensure a proper eradication of such information from that drive is to disintegrate it or putting it on fire till it burns to be of no use at all. This method is also used worldwide by several security agencies to prevent their sensitive information from falling into some wrong hands. So, this implies it to be an effective method.
Spyware
Spyware is a specific kind of malware, which can monitor and control an individual’s use of a computer; the information being entered or accessed or even the keystrokes (“Spyware and Malware”, 2021). It is based on the process of sending users some ads, redirecting them to unwanted websites and from there on, start monitoring their activities over the internet and the browser, leading to stealing of identity. The best way to be safe from spyware is to install antispyware software and stop allowing ‘cookies’ from every website you access (“What is Spyware?”, 2021). Also, the third part, unofficial or free applications, whether on a computer system or mobile phones, should not be used as they always come at a cost; mainly of stealing user’s data from their administrators via online platforms.
Moreover, spyware has been worked through in the computer, iOS, Mac, or an android device. In the warfare the hackers have many ways in doing so. As most of the hackers were getting approved through pirating media, video, and music, downloading the materials through unreliable as well as unknown sources (Harkin et al., 2020). Further, it could also be done through the acceptance of the pop-up advertisement without reading any content, as well as there were other ways which include the acceptance and the opening of the email attachments through the unrecognized senders all these aspects have been highlighted in the spyware. Spyware have incurred with many types which include:
Adware
Adware has been considered as the part of the spyware in which the eyes have remained locating the online activities as well as displays of the ads that it thinks to be interested in as it has been based upon the information (Martinez, 2017). However, such things have been compared in many other forms of the spyware, although adware have also incurred with an impact on the performance of the device that has been annoyed.
Tracking of the cookies
Through the tracking of the cookies there have been similar adware that has tend to do with less intrusive.
Trojans
Whereas, after the landing on the device they have been looking for the sensitive information which include the banks, accounts information as well as it has been send through the third party that would easily use the money through stealing although such things have been comprised through the fraudulent purchase (Shakya et al., 2017). Such things that have been used to gain the control from the computer through installation of the backdoor or the remote access Trojan.
Cyberstalking and Harassment
In general, terms, cyberstalking means the use of online platforms, such as social media or emails, etc., to follow someone’s routine and then followed by harassment, done online, often leading to blackmailing. In the world of cyber warfare, this is mostly done act as it ranges from the lowest level of amusement to the highest official levels. Considering the moral implications of it, and financial also, it is also considered a cybercrime nowadays.
Moreover, it has been realized that the society has been incorporated with the technological power, fast speed of the lightning of internet that has seemed out the immeasurable pages related with the information, also exploring the unknown as well as doing the communication with the virtual, as it has been happening across the globe. However, internet has been come up with the opened windows for the previously unknown named as criminal for the opportunities that has been considered not only as the challenge, but it has also been considered with all the physical boundaries, limitations as well as borders to be detected, punished as well as it has been diminished that what has appeared for mounting the problem related with the global proportion. However, internet has now become one of the literal fertile that has breaded the ground through entirely new as well as unique type of the criminal that has been offended although it has been declared as the cyber stalker as well (Stevens et al., 2020).The study has presented with the glimpse of the deviant behaviors as well as the tactics that has been associated along with the cyber stalking crimes and the legislative interventions all of those have been measured and they have been created specifically for the curtail through emerging of the global crimes.
Credential Stuffing Software Comment by Daniel Creider: Subheading indentation is inconsistent.
In the world of cyber warfare, credential stuffing is the name given to an automatic and systematic process, initiated by some groups, in which a huge number of stolen and spilled information, often consisting of username and passwords, are automatically entered into several websites until an account is matched and the hacker gains access to it, manipulating the information for his gains, financially or in other ways as well. Through Credential stuffing the automated injection has been breached with the username to comes up with the fraudulently gain of the access with the user accounts. Moreover, this has been declared as one of the subsets with the force attack category. Moreover, large numbers of the spilled credentials have been considered automatically that has been entered into the websites until they have been considered as the potential in matching with the existent account along with the attacker. Moreover, through credential stuffing it has been considered as one of the new forms of the hack that has been accomplished through the automated web injection. However, credential stuffing has been related with the breaching of the databases within the accomplish account that has been take over. Moreover, many of the credential stuffing has been also related with the emerging threats as well. Further, it has also been considered that credentials have been declared as the dangerous mode for both consumers as well as enterprises for the ripples that has been affected for the breaches. There were many anatomies of attacks which include the attackers that have been acquired through the spilled which include the usernames and the passwords from the website as well as the password that has been dump site. Moreover, the attacker has also been using an account that has checked the test for the stolen credentials that would go against for many websites which include social media websites or the online marketplaces. Although successful logins in which around 0.2% of the total login has been attempted that has allowed the attacker in taking over the account that has matched the stolen credentials. Moreover, the attacker has also drained the stolen accounts for the stored value which include the credit numbers, as well other personally identified information although all these parts have been incurred. Thereby, the attacker may also have incurred with the account information that has gone forward with other of the inferior’s purpose for example to send the spam or create further transaction. Further, it has been informed that none of the company has been willing to expose their data but apart from that many of the credential stuffs have been prevented by the attacks in means of asking the help for the programmers as well as the members. Moreover, the work in the partnership has been done as it has also been ensured in which the hackers have not get the toehold from the servers of the company. Moreover, most of the employers or the users as well as other have been served with the passwords that must incorporate like the
Crafting of the unique passwords
Through crafting of the unique passwords which means that reusing the information even once that elaborates the exposing of the servers to the risk. Although it has been quite difficult to remember the dozen of the unique characters in the passwords, in that case password manager has been there I am helping the user to create as well as store the data that has made the way easy for the users.
Change of the Password
Through the change of the password like as the cycle through the password which has incurred frequently as well as in changing the name of that password means the user have no right to shift one letter or either the number for example certain amend has the right of the entirety for the login.
Turning on with two factors for authentication
Getting the notification from the phone or any other devices that have been connected has to be attempted for getting log in. Through this small step that has kept the hackers away apart from that which might create the plenty of people that have been tried for the use in the details.
Moreover, through the enterprise level companies would be able to educate in which the users have been allocated with the good passwords practices as this has been considered as one of the main chiefs as well as it has been developed with the guidelines that has explained that what they could have to do with the help of in protecting the data. Moreover, the watch attempts have also been considered in keeping the eyes close for the attempts. Further, they must create the custom solutions as well through which it has been captured with another login hurdles that have been faced through defeat bots. Comment by Daniel Creider: Only one blank line after a paragraph
Brute Force Attack
Unlike credential stuffing, brute force attack is a rather manual process where the hackers use login information based on guesses and multiple possible combinations of passwords and usernames to gain access into private accounts. Although it is relatively an obsolete method, it is still used to gather personal data, financial gains, or for malicious activities over the internet.
Conclusion
Cyberwarfare is one of the biggest threats to the government and military of countries across the globe, which exposes their strategies and future. At least if the government and other stakeholders prevent hacking, identity theft, cyberstalking and harassment, credential stuffing, and brute-force attack, they can move to the next steps towards cyber securities. Moreover, through cyberwarfare certain things has been counted as high which include malware, injection attacks, denial of services, phishing attacks as well as prominent cyber-attacks although these have been declared as the main attacks that has been declared as the most dangerous in the daily life routines. As they have been growing with the latest interventions and implementing as well.
ReferenceReferences Comment by Daniel Creider: Heading belongs at the top of the page
All references must have a URL which is a hyperlink
“Cyberwarfare”
, Wikipedia, 8 April 2021, retrieved 11 April 2021 https://en.wikipedia.org/wiki/Cyberwarfare
Cross-site scripting (XSS) and how to prevent it? | Web Security Academy. Portswigger.net. (2021). Retrieved 5 April 2021, from
https://portswigger.net/web-security/cross-site-scripting
.
Cornish.P, Livingstone. D, Clemente.D and Claire.Y (2010). The Royal Institute of International Affairs. r1110_cyberwarfare
Harkin, D., Molnar, A. and Vowles, E., 2020. The commodification of mobile phone surveillance: An analysis of the consumer spyware industry. Crime, media, culture, 16(1), pp.33-60.
How Online Identity Fraud Destroyed One Man’s Life. Private WiFi. (2010). Retrieved 5 April 2021, from
https://blog.privatewifi.com/how-identity-fraud-destroyed-one-man%E2%80%99s-life/
.
Kristen, S. (2021). Cross Site Scripting (XSS) Software Attack | OWASP Foundation. Owasp.org. Retrieved 4 April 2021, from
https://owasp.org/www-community/attacks/xss/
.
Martinez, C.V., 2017. Adware. Gaceta Instituto de Ingeniería, UNAM, 1(117), pp.20-20.
Phishing | Phishing and Identity Theft. Phishing.org. (2021). Retrieved 4 April 2021, from
https://www.phishing.org/phishing-and-identity-theft#:~:text=Phishing%20refers%20to%20the%20act,for%20various%20types%20of%20information
.
Shakya, B., He, T., Salmani, H., Forte, D., Bhunia, S. and Tehranipoor, M., 2017. Benchmarking of hardware trojans and maliciously affected circuits. Journal of Hardware and Systems Security, 1(1), pp.85-102.
SLANGEN, S. (2009). Ophcrack – A Password Hack Tool to Crack Almost Any Windows Password. MUO. Retrieved 4 April 2021, from
https://www.makeuseof.com/tag/hack-windows-passwords-with-ophcrack/
.
Spyware and Malware. Federal Trade Commission. (2021). Retrieved 4 April 2021, from
https://www.ftc.gov/news-events/media-resources/identity-theft-and-data-security/spyware-and-malware
.
SQL Injection is Still a Critical Attack Vector | Cyware Hacker News. Cyware Labs. (2020). Retrieved 4 April 2021, from
https://cyware.com/news/sql-injection-is-still-a-critical-attack-vector-e535dcc3
.
SQL Injection. W3schools.com. (2021). Retrieved 4 April 2021, from
https://www.w3schools.com/sql/sql_injection.asp
.
Stevens, F., Nurse, J.R. and Arief, B., 2020. Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review. Cyber psychology, Behavior, and Social Networking.
Votipka, D., Stevens, R., Redmiles, E., Hu, J. and Mazurek, M., 2018, May. Hackers vs. testers: A comparison of software vulnerability discovery processes. In 2018 IEEE Symposium on Security and Privacy (SP) (pp. 374-391). IEEE.
What Is Hacking? | What You Need To Know About Hackers. Malwarebytes. (2021). Retrieved 4 April 2021, from
https://www.malwarebytes.com/hacker/
.
What is Spyware?. www.kaspersky.com. (2021). Retrieved 5 April 2021, from
https://www.kaspersky.com/resource-center/threats/spyware
.
What is SQL Injection (SQLi) and How to Prevent It. https://www.acunetix.com/. (2021). Retrieved 5 April 2021, from
https://www.acunetix.com/websitesecurity/sql-injection/#:~:text=The%20only%20sure%20way%20to,inputs%20such%20as%20login%20forms
.
.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.