Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Hackers Target the U.S. Presidential Election: What Happened? (20 marks] In September 2015, Special Agent Adrian Hawkins of the U.S. Federal Bureau of Investigation (FBI)

Hackers Target the U.S. Presidential Election: What Happened? (20 marks] In September 2015, Special Agent Adrian Hawkins of the U.S. Federal Bureau of Investigation (FBI) phoned the Democratic National Committee (DNC) with troubling news about its computer network: At least one DNC computer system had been penetrated by hackers linked to the Russian government. Yared Tamene, the DNC tech-support contractor who fielded the calls, conducted a cursory search of the DNC computer system logs to look for signs of hacking. He stated that he did not look too hard, even after Special Agent Hawkins called back and left messages repeatedly over the next several weeks, because he thought the call might be a prank call from an imposter. The DNC hack was the first sign of a Russian-led cyberwarfare campaign to disrupt the 2016 presidential election. DNC chairwoman Debbie Wasserman Schultz was forced to resign, and a torrent of confidential documents from the DNC and the Clinton campaign were released by WikiLeaks to the press during the campaign. In a stunning upset, Donald Trump won the presidential election, and his victory may have been facilitated by revelations in the leaked documents. Several Russian hacker groups associated with Russian intelligence were identified as the source of the cyberattacks. The Russian hackers had moved freely through the DNC network for nearly 7 months before top DNC officials were alerted to the attack and hired cybersecurity firm CrowdStrike to beef up their system protection. The DNC computer system was replaced, and all laptops were turned in and their hard drives wiped clean to get rid of infected information. In the meantime, the hackers gained access to systems of the Clinton campaign. The hackers did not have to use any sophisticated tools to gain access and were able to deploy phishing emails to trick legitimate system users into revealing passwords for accessing the system. Clinton campaign aide Charles Delavan clicked on an email sent to the personal account of campaign chairman John Podesta thinking it was legitimate and opened another door for the Russians. Whenever someone clicked on a phishing message, the Russians would enter the network, "exfiltrate" documents of interest, and stockpile them for intelligence purposes. By the summer of 2016, Democrats' private emails and confidential documents were posted on WikiLeaks and other websites day after day and reported by the media. The DNC thought it was well protected against cyberattacks but only had a fraction of the security budget that a corporation its size would have. It had a standard email spam- filtering service for blocking phishing attacks and malware created to resemble legitimate email, but it did not have the most advanced systems in place to track suspicious traffic. Hacking during the 2016 presidential election went beyond the DNC and the Clinton campaign. Russian hackers tried to infiltrate at least 21 states' election systems and to delete or alter voter data in Illinois. (Officials don't believe the attackers changed any result.) On July 13, 2018 a federal grand jury indicted 12 Russian intelligence officers as part of special counsel Robert Mueller's investigation into alleged Russian meddling during the 2016 presidential campaign. The officers were charged with engaging in a sustained effort to hack networks of the Democratic Congressional Campaign Committee, the Democratic National Committee, and Hillary Clinton's campaign. There is mounting evidence that Russian hackers are continuing to target U.S. state election systems, looking for opportunities to influence primaries, the 2018 midterm Congressional elections, and eventually the 2020 presidential campaign. Russian hackers have also been actively trying to influence elections in Europe as well. Ouestions A. What security vulnerabilities were exploited by the hackers? [6 marks] B. What management, organizational, and technological factors contributed to these security weaknesses? [8 marks] C. What was the business impact of these problems? [6 marks] electio Section C: 2 questions, answer I [20 marks] Briefly discuss 4 business values of Customer Relationship Management Systems (RMS) [10 marks) lb. Collaboration and teamwork are more important today than ever for a variety of reasons. State and explain 4 of these reasons. [10 marks] 2a. Explain 4 components of IT infrastructure [10 marks] 2b. Discuss 4 current trends in computer hardware platforms? [10 marks]

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Exploring The Hospitality Industry

Authors: John R Walker

2nd Edition

013243766X, 9780132437660

More Books

Students also viewed these General Management questions