Reply To: OCU ISSO D Week 05 Lesson 17 Discussion

Kevin Mehok

IST3100 Information Systems Security Officer
Week Five
Assignment # 3
WK5 Cyberattacks story
Kevin Mehok

I think that sourcing an actual story for this discussion will be the most effective approach.
In this era of time, we have been hearing a lot about Russia, and Ukraine. For years, Russia has aggressively and recklessly mounted digital attacks against Ukraine, causing blackouts, attempting to skew elections, stealing data, and releasing destructive malware to rampage across the country—and the world (Newman, 2022). Sadly, Russia carried through with invading Ukraine in February, though, the digital dynamic between the two countries has changed as Russia struggles to support a massive and costly kinetic war and Ukraine mounts resistance on every front it can think of (Newman, 2022). What does this mean? Well, this means that while Russia has continued to pummel Ukrainian institutions and infrastructure with cyberattacks, Ukraine has also been hacking back with surprising success (Newman, 2022). In defense, much like our need to create and implement an action plan, Ukraine has formed a volunteer “IT Army” at the beginning of the war, which has focused on mounting DDoS attacks and disruptive hacks against Russian institutions and services to cause as much chaos as possible (Newman, 2022). Hacktivists from around the world have also turned their attention—and digital firepower—toward the conflict (Newman, 2022). In a valiant effort Ukraine has launched other types of hacks against Russia, including attacks utilizing custom malware, Russia has suffered data breaches and service disruptions at an unprecedented scale (Newman, 2022).

While we discuss over and over the negatives of malware and virus attacks, cyberattacking, yes cyberattacking can also in and of itself be an incredible form of offense, in defense just as it has been for Ukraine.

I would be willing to keep approaches like this in mind as well if my organization were attacked.

God Bless,



Newman, L. (2022)


Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .

Cybersecurity Certifications for Today's INFOSEC Careers

Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.


Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range.  We train students in penetration testing,disaster recovery, incident handling, and network forensics.  Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.  



We've developed training for...

Canada Army Navy Airforce

The Canadian Department of National Defense


The United States Air Force

Defense Logistics Agency

A United States Counterintelligence Agency

Texas Workforce Commission

Texas Workforce Commission

error: Alert: Content is protected !!