I am attaching two cases.Read them and answer the questions. Each should be single space one page. MLA citation please.Management Information Systems 16e KENNETH C. LAUDON AND JANE P. LAUDON CHAPTER 8 CASE 2 SUMMARY SECURING INFORMATION SYSTEMS Cyberespionage: The Chinese Threat This video examines the economic and national security costs of cyberespionage. Cyberespionage involves the theft of intellectual property, as well as valuable situational and personal information, using surreptitious means on the Internet. While many advanced nations engage in cyberespionage, China has been implicated in many major cyberespionage programs aimed at the United States. L= 21:14. Systems CNBC - Cyber Espionage: The Chinese Threat URL CASE http://www.youtube.com/watch?v=Js52FjOsgPA Cyberespionage is very different from cyberwarfare. The objective in cyberespionage is to, without detection, gain access to computer systems that contain valuable commercial and/or military information; to remain in place for continuous data gathering; and to remove data from the target system. The point is not to destroy enemy systems, but instead to colocate inside them and continuously drain information. This is similar to the goals of the British intelligence agency MI6 during World War II, when they broke the military codes of the Germans quite early in the war. MI6 spent a great deal of effort to insure the Germans never discovered their communications were being closely monitored and intercepted for over four years. In contrast, the objective of cyberwarfare is to destroy and disrupt enemy capabilities. When cyberwarfare continued Chapter 8, Case 2 Cyberespionage: The Chinese Threat 2 succeeds, the very fact of succeeding permits the enemy to become aware of the intrusion and take steps to defend itself. In October 2011, in a report to Congress by the Office of the National Counterintelligence Executive, national security officials concluded that foreign collectors of sensitive economic information are able to operate in cyberspace with relatively little risk of detection by their private sector targets. The proliferation of malicious software, prevalence of cybertool sharing, use of hackers as proxies, and routing of operations through third countries make it difficult to attribute responsibility for computer network intrusions. Cybertools have enhanced the economic espionage threat, and the Intelligence Community (IC) judges the use of such tools is already a larger threat than more traditional espionage methods. The threat comes from adversaries as well as partners. Allegedly, according to American and European media and governments, Chinese actors are the world’s most active and persistent perpetrators of economic espionage. U.S. private sector firms and cybersecurity specialists have reported an onslaught of computer network intrusions that have originated in China, but the intelligence community cannot definitively confirm who is responsible because of the possibility that the attacks originate elsewhere but use compromised Chinese computers to implement the attacks.