CyberSpace

Article 1: https://www.wired.com/2015/02/americas-cyber-espionage-project-isnt-defense-waging-war/

Article 2: https://medium.com/mit-technology-review/cybersecurity-flaws-in-chips-are-still-taking-too-long-to-fix-a9b037e774b7

           Cyberspace security is the technological defence for computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It’s more than preventing identity theft and your Facebook account. Critical systems in banking, national security, and physical infrastructure are also online targets. The typical approach to cyberspace security has been what is called “perimeter defense.” It is done by placing routers and what are called“firewalls” at the entry point of a sub-network to prevent access from outside “attacker” like hackers. 

          “Surprise! America Already Has a Manhattan Project for Developing Cyber Attacks” by Kevin Poulsen attends to the offensive side of cyberpsace in contrast to the defensive we usually hear about. It expresses how the Cyber Manhattan Project was created for purely offensive attacks stating, “This revelation came by way of the Russia-based anti-virus company Kaspersky. At a conference in Cancun this week, Kaspersky researchers detailed the activities of a computer espionage outfit it calls the “Equation Group,” which, we can fairly surmise from previous leaks, is actually the NSA’s Tailored Access Operations unit”.  National Security Agent (NSA) states thepurpose of the cyber project is to prevent any disturbance and attacks against the US. Kaspersky, was infact able to gain access to the NSA’s technology and reverse engineered the technology. Theyre results conluded 6 families of different malwares within the NSA that can “infect victims, retrieve data, and hide activity…update mechanisms, dozens of plug-ins, a self-destruct function, massive code obfuscation, hundreds of fake websites to serve as command-and-control”. With this cyberspace technology, it can not only combat cyber attacks in the future but also as an attack tool.  

          “Cyber Security flaws in chips are still taking too long to fix” by Martin Giles discusses the flaws in older generation microchips within Intel. Once the flaw was found it was exploited and named “Zombieload.” Although it was fixed at the end the time it took to be fixed left it to be exploited for too long.  This is the issue when it comes to protecting personal information of users and making it so that hackers cannot exploit Intel’s hardware. The solution the aticle propose was improving the relations between cybersecurity experts within intel to expedite the process of hotfixes for exploits like Zombieload. This will allow  exploits that come up in the future to be hotfixed in a timely manner.