Cyberattacks

0.0(0)
studied byStudied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/113

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:36 PM on 1/20/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

114 Terms

1
New cards

GET Request

Usually to request information.

Parameter of request passed to URL.

Good for non-sensitive information.

2
New cards

POST Request

For sending information

Parameter of request is hidden in the request body.

Good for sensitive or large amount of data.

3
New cards

Cross Site Scripting (XSS)

Forcing browser to execute a script in a web page/application

Malicious code being executed

Persistent vs non-persistent

4
New cards

HTTP Problem

Connection-less, lack of a state.

Web-app does know what has been done.

Everything is stored on the browser.

5
New cards

Non-persistent (reflected) XSS

Attacker forces user to click a malicious URL, served back to the server.

Attacking script is supplied by the victim.

6
New cards

Persistent (Stored) XSS

Attacker stores input on vulnerable server.

When user visits website, malicious code is served back

Storage of script in web-application

7
New cards

Reasons for XSS working

  1. Clients trust servers.

  2. Scripting is deeply embedded in web browsers, raising its power.

  3. Lack of input sanitization.

8
New cards

Consequences for XSS

Session hijacking by reading document.cookie

Configuring pages to steal login information

Goal is to get a valid token.

9
New cards

Command Injection

Inject and execute attacker specified commands in a vulnerable application.

10
New cards

Defense against injection

Encode all user input.

Minimize database privileges.

Whitelist input validation on user supplied input

11
New cards

Parameter Encoding

Makes requests more digestible.

Requests are usually encoded.

12
New cards

Phishing

Email with malicious link/instructions

Redirects to genuine-looking site where credentials need to be filled.

13
New cards

SQL Injection

User-supplied input that executes database queries beneficial to attacker.

14
New cards

XSS Defenses

Signature-based filters blocking recognized attacks.

Input sanitization.

Limiting input to a maximum length.

15
New cards

XSS vs. Phishing

XSS is active and executes inside authentic application (personalization)

versus a cloned website or login page.

16
New cards

Broken Access Control

Vulnerabilities: parameter tampering, elevation of privilege, violation of least privilege

Prevention: deny by default, recording ownership, logging failures.

17
New cards

Cryptographic Failures

Vulnerabilities: weak crypto algorithms, unenforced encryption, lack of randomness

Prevention: encrypting all sensitive data, data in transit, authenticated encryption.

18
New cards

Injection

Vulnerabilities: lack of sanitization, hostile data directly used within ORM

Prevention: safe API, SQL controls within queries, server-side input validation.

19
New cards

Insecure Design

Vulnerabilities: broad category, many weaknesses

Prevention: secure development lifecycle, threat modelling, unit and integration tests for critical flows.

20
New cards

Security Misconfiguration

Vulnerabilities: software is out of data, unnecessary features available, error handling reveals stack traces.

Prevention: minimal platform, repeatable hardening process, automated process for effectiveness.

21
New cards

Targeted Attacks

  1. Set up (host for command and control)

  2. Gather intelligence about target (watering hole, exploit selection, phishing)

  3. Choose right exploit (get foot in door)

  4. Choose the right malware

  5. Attack the target

  6. Use it (laterally move)

22
New cards

Watering Hole Attacks

Gather intelligence on target, suitable sites to place dropper for infection.

Dropper contacts CC to download malware.

Malware does exploitation.

23
New cards

Lockheed Martin Cyber Kill Chain

  1. Reconaissance

  2. Weaponization

  3. Delivery

  4. Exploitation

  5. Installation

  6. Command and Control

  7. Act on Objectives

24
New cards

Supervisory Control and Data Acquisition (SCADA)

Sends control commands to remote devices like PLCs.

25
New cards

Problems with SCADA

Isolated, no security in mind, hard to patch

26
New cards

Programmable Logic Controller

Processes commands sent by SCADA

Makes decisions on its control program to produce the required output.

27
New cards

Stuxnet

Phase 1: worm that spread, hides itself while waiting for phase 2.

Phase 2: attacks Siemens and PLC systems, updates PLC programming.

Phase 3: Sabotage, looks for specific factory environment, if found changes speed of centrifuges.

28
New cards

Havex

Spread through multiple vectors, email, watering hole attacks, infection of vendor websites and software.

Main goal: gather information and gain persistent access.

29
New cards

Detecting Havex

Detection when it performs a network stamp.

Detection of communication with C&C (difficult)

30
New cards

Industroyer

Malware specifically designed to attack energy companies.

31
New cards

Ukraine 2015

Stage 1: spearphishing with Blackenergy3 malware to steal credentials and reconfigure network.

Stage 2: Developed malware for distribution management system to open breakers and DDoS customer service.

32
New cards

Old-School Ransomware

Non-targeted attack

Several target, one computer held hostage at a time

Ransom in hundreds of dollars

33
New cards

New School Ransomware

Targeted attack, one target at a time

Whole organization is held hostage

Ransom can be in millions of dollars

34
New cards

Cryptolocker

File-encrypting ransomware, first showing replicable business case, using a double extension with hidden executables.

35
New cards

Petya

Reboots computer, encrypts master file table, hiding unencrypted files, asks for bitcoin as payment.

36
New cards

WannaCry

Worst ransomware in history, attacks used leaked hacking tools from the NSA

37
New cards

NotPetya (Virus)

Designed to win war against Ukraine, spreads using exploits like Eternal Blue and EternalRomance. Encrypts (destroys) everything and demands ransom but is not ransomware.

38
New cards

Shadowbrokers

Group that stole exploits like EternalBlue from NSA.

39
New cards

Garmin Hack

Use of WastedLocker (which makes programs useless until decrypted) to hold out for a $10 million ransom.

40
New cards

Norsk Hydro

Incurred a financial loss of $71 million.

41
New cards

Maastricht Attack

Randomly picked Maastricht then figured out what they could leverage.

42
New cards

Colonial Pipeline

Attack on pipeline system that led to a national emergency being declared.

43
New cards

Equifax Hack

Use of Apache vulnerability to steal personal data of 143 million consumers.

44
New cards

Bruce Schneier on Equifax Hack

  1. Serious data breach that puts millions of Americans at risk.

  2. Equifax was solely at fault.

  3. Thousands of similar data brokers at risk.

  4. Existing regulatory structure is inadequate.

45
New cards

Sophisticated DDoS

Done by professionals for marketing reasons.

46
New cards

Unsophisticated DDoS

Low cost DDoS for hire, booter services, paid by PayPal using a subscriber model.

47
New cards

Living off the land attack

intruders use legitimate software and functions available in system to perform malicious actions on it.

48
New cards

MFA fatigue

keep alerting the user, mistakes will be made

49
New cards

Vishing

Talking to the victim on the phone, trying to scam them

50
New cards

SIM Swapping

Stealing enough information from the target to convince the phone company to reissue the SIM

51
New cards

Advantages of Living Off The Land Attack

No need for specific malware.

Generally difficult to detect.

52
New cards

Disadvantages of Living Off The Land Attack

Speed

Cost

53
New cards

Zero-day exploit

Vulnerability in software or hardware that is not known to the vendor

54
New cards

Dedicated Leak Site

Website where illicitly retrieved data of companies that pay ransom are published.

55
New cards

2020 Breach

Supply chain attack on Microsoft cloud services and on SolarWind’s Orion software.

56
New cards

SolarWinds Attack

Large supply chain incident, use of Orion which has access to log and system performance data.

57
New cards

Advantage of software supply chain attacks

Infiltration of well-protected organizations by leveraging a trusted channel

Fast distribution: infections grow quickly

Targeting of specific regions or sectors

Infiltration of isolated targets

Difficult for victims to identify attacks as trusted processes are misused

May provide attacker with elevated privileges during installation

58
New cards

Supply Chain Attack

Targets a trusted third-party vendor or service provider in an organization’s supply chain.

59
New cards

Possible vectors for a supply chain attack

Software Dependencies - injecting malicious code into software updates or third-party applications.

Hardware Components - compromising physical hardware during manufacturing or distribution.

Third-party services - exploiting vulnerabilities in cloud providers, logistics partners, or outsourced services.

60
New cards

Key Characteristics of Supply Chain Attacks

Exploitation of Trust

Indirect Access

Complexity

Widespread Impact

61
New cards

Cryptojacking

Another party’s computing resources are hijacked to mine cryptocurrency.

62
New cards

NIS2

Builds on NIS1, new sectors, risk management

63
New cards

Software Bill of Materials (SBOM)

List of components in a piece of software.

64
New cards

EU Cyber Resilience and SBOM

Relies on SBOMs to ensure software dependencies meet cybersecurity standards.

Leverages SBOMs

65
New cards

EU Cyber Resilience Act

Mandatory Cybersecurity Requirements

Lifecycle Security Management

Penalties for Non-Compliance

66
New cards

Detecting Attacks

Rejection-based (negative model, blacklisting)

Acceptance-based (pisitive model)

67
New cards

Blacklisting and Signatures Pros

Low false positives

Use as blocking systems

information about what is being detected

no need for reconfiguring when system is being reconfigured

68
New cards

Blacklisting and Signatures Cons

Need to know the attack

No signatures possible for 0-day vulnerabilities

Impossible to have a good set of signatures for non-mainstream systems

Long time to create a signature

Signatures and heuristics are easy to evade

69
New cards

Whitelisting Pros

No need to know the attack to block it

Low false positives if configured correctly

70
New cards

Whitelisting Cons

Easy to circumvent unless very accurate

Expensive to set up and maintain

Reconfiguring of the system means reconfiguring of whitelisting (expensive)

Little information about attack

71
New cards

Quantitative Anomaly Detection

too many “things happening”

does not tell you what is going on

important for situational awareness, false positives

72
New cards

Qualitative Anomaly Detection

Detect when a single information unit is anomalous

Techniques: self-organizing maps, neural networks, n-gram analysis

73
New cards

Anomaly Detection Pros

Inexpensive

May allow you to see a 0-day attack

quantitative: situational awareness, interesting info

qualitative: doesn’t usually work, but is ideal when it does

74
New cards

Anomaly Detection Cons

applicability depends heavily on particular instance of target system

lots of false positives

gives even less information about attack than whitelisting, if they detect one

75
New cards

System-Centric Threat Model Fails

Cost of defense to Alice, attack to Charles

Charles is uncertain about worth of attack

Charles must compete against other attacks

Ignores scale

Ignores that attackers have better things to do

76
New cards

Reasons why attackers leave us alone

Low success rate

Low value

Attacks and attackers may collide often

Attack is expensive

77
New cards

SCADA Security

Encryption does not yield extra security

78
New cards

Encryption Problems

Can negatively affect security

Can complicate troubleshooting

79
New cards

Unfalsiability of Security Claims

Root reason of many of our policy errors

Difficult to exercise good judgement and be scientific in security

80
New cards

Common Rules on Passwords

  1. Length

  2. Composition

  3. Dictionary membership

  4. Don’t write down

  5. Don’t share

  6. Change

    1. Don’t reuse

81
New cards

Attacks on Passwords

Phishing

Keylogging

Brute-force attack

Bulk guessing

Special access attacks

82
New cards

BlackBox Approach

Using machine learning approaches, like neural networks.

83
New cards

WhiteBox Approach

Try to explain the semantics of the target system

84
New cards

Important reason why attacks are difficult to counter

present systems are so hard to monitor

85
New cards

Making secure systems

Making software more supervisable

86
New cards

Prompt Injection

Input prompts manipulation to influence or control behaviour of AI models

Tricking the model

87
New cards

Morris II

Worm designed to target GenAI ecosystems, prompt model to replicate input as output and engage in malicious activities.

88
New cards

As-a-service criminal model

Criminal products provided as a service, one product for whole chain

Fully fledged organization, hierarchical structure with up to 100 members

89
New cards

Conti Coders

Maintained malware code, back-end servers, and admin web panels

90
New cards

Conti Testers/Crypters

Developed proof-of-concept codes to bypass detection and provided feedback to coders

91
New cards

Conti Ransom Operators

Controlled all ransomware operations

92
New cards

Conti HR

Managed new hires and conducted online interviews

93
New cards

Recruiting for Conti

HR Department

Recruitment channels

Training and Onboarding

Roles and Responsibilities

94
New cards

Conti Delivery Mechanisms

Phishing emails

Malware Loaders

Cobalt Strike: lateral movement

95
New cards

Conti Additional Techniques

Double Extortion

Deleting Backups

96
New cards

Click Fraud

Attacker registers with Ad network

uses infection systems to generate clicks on sourced advertisement, 20-30 million USD value

97
New cards

Finance and Banking

Pump and dump, cheap stocks to inflate price and sell

98
New cards

Scareware

Combination of social engineering and malware infection

Convince user they need to buy a product

99
New cards

Exploit-as-a-service

Platforms to deliver malware, dropping malware on machines

100
New cards

Money mules

relay for ban/money transfers, promise of retaining a compensation

receive and re-send expensive goods used to convert stolen credit to merchandise

Explore top notes

Imperialism Rise in Nationalism • During the French and Industrial Revolution, nationalism continued to inspire nations to increase their political and economic power. • Nationalism became the ideal force in the political, economic, and cultural life in the world, becoming the first universal ideology-organizing all people into a nation state. Nationalism Defined • The strong belief that the interest of a particular nation-state is of primary importance. o Nation-State – a state where the vast majority shares the same culture and is conscious of it. It is an ideal in which cultural boundaries match up with political ones. • As an ideology, it is based on the idea that the individual’s loyalty and devotion to the nation-state surpass other individual/group interests. • Exalting one nation’s belief above all others and placing primary emphasis on promotion of its culture and interests, excluding the interests of others. Changing the World through a Nationalistic Vision • The French Revolution significantly changed the political world and how countries govern. • The Industrial Revolution significantly changed the economic world. • The Age of Imperialism (1870-1914) dramatically changed the political, economic, and social world. What is Imperialism? • Imperialism- The policy of extending the rule of authority of an empire or nation over foreign countries, or of acquiring and holding colonies and dependencies. Power and influence are done through diplomacy or military force. Reasons for Imperialism • There are 5 main motives for empires to seek to expand their rule over other countries or territories: 1. Exploratory • Imperial nations wanted to explore territory unknown to them. • The main purpose for this exploration of new lands was for resource acquisition, medical or scientific research. o Charles Darwin • Other reasons: o Cartography (map making) o Adventure 2. Ethnocentric • Europeans acted on the concept of ethnocentrism o Ethnocentrism- the belief that one race or nation is superior to others. • Ethnocentrism developed out of Charles Darwin’s “survival of the fittest” theory. Philosophers used the theory to explain why there were superior races and inferior races. o This became known as Social Darwinism. • Most imperial nations believed that their cultural values or beliefs were superior to other nations or groups. • Believed imperial conquest would bring successful culture to inferior people. 3. Religious • Imperial expansion promoted a religious movement of people setting out to convert new members of conquered territories. • With the belief that Christianity was superior, missionaries believed it was their duty to spread Christianity to the world. • Christian missionaries established churches, and in doing so, they spread Western culture values as well. • Typically, missionaries spread the imperial nation's language through education and religious interactions. 4. Political • Patriotism and Nationalism helped spur our imperial growth, thus creating competition against other supremacies. • It was a matter of national pride, respect, and security. • Furthermore, European rivalry spurred nations for imperial conquest. Since land equaled power, the more land a country could acquire the more prestige they could wield across the globe. • Empires wanted strategic territory to ensure access for their navies and armies around the world. • The empire believed they must expand, thus they needed to be defended. 5. Economic • With the Industrial Revolution taking place during the same time, governments and private companies contributed to find ways to maximize profits. • Imperialized countries provided European factories and markets with natural resources (old and new) to manufacture products. • Trading posts were strategically placed around imperialized countries to maximize and increase profits. o Such places as the Suez Canal in Egypt which was controlled by the British provided strategic choke hold over many European powers. o Imperial powers competed over the best potential locations for resources, markets, and trade. History of Imperialism • Ancient Imperialism 600 BCE-500 CE o Roman Empire, Ancient China, Greek Empire, Persian Empire, Babylonian Empire. • Middle Age Imperialism (Age of Colonialism-1400-1800s) o Great Britain, Spain, Portugal, France, Netherlands (Dutch), Russia. • Age of Imperialism 1870-1914 o Great Britain, Spain, Portugal, France, Germany, Belgium, Italy, Japan, United States, Ottoman Empire, Russia. • Current Imperialism...? o U.S. Military intervention (i.e. Middle East) o Russia’s Invasion of Ukraine. Imperialism Colonialism • Refers to political or economic control, either legally or illegally. • Refers to where one nation assumes control over the other. • Creating an empire, expanding into neighboring regions and expanding the dominance far outside its borders. • Where a country conquers and rules over other regions for exploiting resources from the conquered country for the conqueror's benefit. • Foreign government controls/governs a territory without significant settlement. • Foreign government controls/governs the territory from within the land being colonized. • Little to no new settlement established on fresh territory. • Movement to settle to fresh territory. Age of Colonialism WHEN? • Started around the late 1400s and ended around the late 1700s/early 1800s. WHY? • Primary Reason: European countries, wished to find a direct trade route to Asia (China & India) and the East Indies. o Quicker and relatively more effective than land routes over Asia. • Secondary Reason: Empire expansion (land power) WHO? • Countries involved: Great Britain, France, Spain, the Dutch & Portugal. • Individuals’ knowns as Mercantilists believed that maintaining imperialized territory and colonizing the region could serve as a source of wealth, while personal motives by rulers, explorers, and missionaries could therefore promote their own agenda. o This agenda being “Glory, God and Gold”. Mercantilism • Mercantilism was a popular and main economic system for many European nations during the 16th to 18th centuries. • The main goal was to increase a nation’s wealth by promoting government rule of a nation’s economy for the purpose of enhancing state power at the expense of rival national power. • It was the economic counterpart of political absolutism. Why did mercantilists want colonies? • Mercantilists believed that a country must have an excess of exports over imports. • By colonizing territory, it provided the nation with indispensable wealth of precious raw materials. • Therefore, the claimed territory served as a market and supplier of raw materials for the mother country. Which, in time, provided an excess of exports for the nation and thus created wealth. o Development of Trading Companies to support this economic system. Hudson Bay Company – (1670). Controlled primarily North America. o Dutch East Indie Trading Company (1682) o East Indian Trading Company (1600) o Royal African Trade Company (1672) WHERE? • European nations begun to colonize the America, India and the East Indies to create a direct trade route. • Great Britain was the leading power in India, Australia and North America, South Africa. • Spain colonized central and South America. • French held Louisiana, coastal land of Africa and French Guinea. • The Dutch built an empire in the East Indies. • The Portuguese was able to take control of present-day Brazil and the southern tip of South America and Japan. Age of Colonialism • As countries started to imperialize these regions, eventually the concept of colonization took hold: • This is what makes the Age of Colonialism extremely different! End of Colonialism • By 1800, colonialism became less popular • Why? o Revolutions (Spain, France & American) o The Napoleonic Wars o Struggle for nationalism and democracy. o Exhausted all money and energy to supervise their colonies. Waiting to wake again • Imperialism would stay quiet for close to 50 years before Great Britain and France’s economies revitalized. • The outbreak of the Industrial Revolution only encouraged and revitalized European nations to begin their conquest for new territory and resources. Age of Imperialism THE SCRAMBLE FOR AFRICA 1870-1914 Conditions Prior to Imperialism of Africa  European interest in exploiting Africa was minimal.  Their economic interests & profit in Africa primarily came through coastal trade that took place during the 1500-1700s.  The slave trade became the main source of European profit.  Furthermore, disease, political instability, lack of transportation and unpredictable climate all discouraged Europeans from seeking territory. Slave Trade & the Trans-Atlantic Slave Voyages  Forced labor was not uncommon during the 13-17th Centuries. Africans and Europeans had been trading goods and people across the Mediteranea for centuries.  This all changed from 1526 to 1867, as a new system of slavery was introduced that became highly “commercialized, racialized and inherited”  By 1690, the America and West Indies saw approximately 30,000 African people shipped from Africa. A century later, that number grew to 85,000 people per year.  By 1867, approximately 12.5 million people (about twice the population of Arizona) left Africa in a slave ship. What Changed? 1. End of the Slave Trade- Left a need for trade between Europe and Africa. 2. Innovation in technology- The steam engine and iron hulled boats allowed Europe 3. Discovery of new raw materials- Explorers located vast raw materials and resources and this only spurred imperialism with Europe in the wake of the Industrial Revolution. 4. Politics- Unification of Germany and Italy left little room to expand in Europe. Germany and Italy both needed raw materials to “catch up” with Britain and France so they looked to Africa. The Scramble for Africa  The scramble started in 1870.  Although some coastal land had previously been acquired before 1870, the need for territory quickly accelerated as European countries looked t get deeper into Africa.  Within 20 years, nearly all continents were placed under imperialistic rule. Who was Involved?  Great Britain  France  Germany  Italy  Portugal  Belgium  Spain (kind) Violent Affairs  Violence broke out multiple times when European nations looked to claim the same territory.  Germ Chancellor. Otto van Bismarck. Attempted to avert the possibility of violence against the European powers.  In 1884, Bismarck organized a conference in Berlin for the European nations. The Berlin Conference (1884-85)  The conference looked to set ground rules for future annexation of African territory by European Nations.  Annexation is the forcible acquisition and assertion of legal title over one state’s territory by another state, usually following military occupation of the territory.  From a distant perspective, it looked like it would reduce tensions among European nations and avert war.  At the heart of the meeting, these European countries negotiated their claims to African territory, made it official and then mapped their regions.  Furthermore, the leaders agreed to allow free trade among imperialized territory and some homework for negotiating future European claims in Africa was established. Further Path  After the conference, european powers continued to expand their claims in Africa so that by 1900. 90% of the African territory had been claimed. A Turn towards Colonization?  Upon the imperialization of African territory, European nations and little interest in African land unless it produced economic wealth.  Therefore, European governments put little effort and expertise into these imperialized regions.  In most cases, this emat a form of indirect rule. Thus, governing the natin without sufficient settlement and government from within the mother country. Some Exceptions  There were some exemptions through in Africa as colonization was a necessary for some regions i n Africa.  Some regions where diamonds and gold were present. Government looked to protectorate the regions and establish rule and settlement in the regions.  Protectorates: A state controlled and protected by another state for defense against aggression and other law violations. Would  Some examples include South Africa, Botswana, Zimbabwe and Congo. Conclusion  Although it may appear that the Berlin Conference averted war amid the African Scramble, imperialism eventually brought the world into worldwide conflict.  With the continued desire to create an empire by European nations. World War 1 would break out which can be linked to this quest at imperialism.
Updated 490d ago
note Note
Imperialism Rise in Nationalism • During the French and Industrial Revolution, nationalism continued to inspire nations to increase their political and economic power. • Nationalism became the ideal force in the political, economic, and cultural life in the world, becoming the first universal ideology-organizing all people into a nation state. Nationalism Defined • The strong belief that the interest of a particular nation-state is of primary importance. o Nation-State – a state where the vast majority shares the same culture and is conscious of it. It is an ideal in which cultural boundaries match up with political ones. • As an ideology, it is based on the idea that the individual’s loyalty and devotion to the nation-state surpass other individual/group interests. • Exalting one nation’s belief above all others and placing primary emphasis on promotion of its culture and interests, excluding the interests of others. Changing the World through a Nationalistic Vision • The French Revolution significantly changed the political world and how countries govern. • The Industrial Revolution significantly changed the economic world. • The Age of Imperialism (1870-1914) dramatically changed the political, economic, and social world. What is Imperialism? • Imperialism- The policy of extending the rule of authority of an empire or nation over foreign countries, or of acquiring and holding colonies and dependencies. Power and influence are done through diplomacy or military force. Reasons for Imperialism • There are 5 main motives for empires to seek to expand their rule over other countries or territories: 1. Exploratory • Imperial nations wanted to explore territory unknown to them. • The main purpose for this exploration of new lands was for resource acquisition, medical or scientific research. o Charles Darwin • Other reasons: o Cartography (map making) o Adventure 2. Ethnocentric • Europeans acted on the concept of ethnocentrism o Ethnocentrism- the belief that one race or nation is superior to others. • Ethnocentrism developed out of Charles Darwin’s “survival of the fittest” theory. Philosophers used the theory to explain why there were superior races and inferior races. o This became known as Social Darwinism. • Most imperial nations believed that their cultural values or beliefs were superior to other nations or groups. • Believed imperial conquest would bring successful culture to inferior people. 3. Religious • Imperial expansion promoted a religious movement of people setting out to convert new members of conquered territories. • With the belief that Christianity was superior, missionaries believed it was their duty to spread Christianity to the world. • Christian missionaries established churches, and in doing so, they spread Western culture values as well. • Typically, missionaries spread the imperial nation's language through education and religious interactions. 4. Political • Patriotism and Nationalism helped spur our imperial growth, thus creating competition against other supremacies. • It was a matter of national pride, respect, and security. • Furthermore, European rivalry spurred nations for imperial conquest. Since land equaled power, the more land a country could acquire the more prestige they could wield across the globe. • Empires wanted strategic territory to ensure access for their navies and armies around the world. • The empire believed they must expand, thus they needed to be defended. 5. Economic • With the Industrial Revolution taking place during the same time, governments and private companies contributed to find ways to maximize profits. • Imperialized countries provided European factories and markets with natural resources (old and new) to manufacture products. • Trading posts were strategically placed around imperialized countries to maximize and increase profits. o Such places as the Suez Canal in Egypt which was controlled by the British provided strategic choke hold over many European powers. o Imperial powers competed over the best potential locations for resources, markets, and trade. History of Imperialism • Ancient Imperialism 600 BCE-500 CE o Roman Empire, Ancient China, Greek Empire, Persian Empire, Babylonian Empire. • Middle Age Imperialism (Age of Colonialism-1400-1800s) o Great Britain, Spain, Portugal, France, Netherlands (Dutch), Russia. • Age of Imperialism 1870-1914 o Great Britain, Spain, Portugal, France, Germany, Belgium, Italy, Japan, United States, Ottoman Empire, Russia. • Current Imperialism...? o U.S. Military intervention (i.e. Middle East) o Russia’s Invasion of Ukraine. Imperialism Colonialism • Refers to political or economic control, either legally or illegally. • Refers to where one nation assumes control over the other. • Creating an empire, expanding into neighboring regions and expanding the dominance far outside its borders. • Where a country conquers and rules over other regions for exploiting resources from the conquered country for the conqueror's benefit. • Foreign government controls/governs a territory without significant settlement. • Foreign government controls/governs the territory from within the land being colonized. • Little to no new settlement established on fresh territory. • Movement to settle to fresh territory. Age of Colonialism WHEN? • Started around the late 1400s and ended around the late 1700s/early 1800s. WHY? • Primary Reason: European countries, wished to find a direct trade route to Asia (China & India) and the East Indies. o Quicker and relatively more effective than land routes over Asia. • Secondary Reason: Empire expansion (land power) WHO? • Countries involved: Great Britain, France, Spain, the Dutch & Portugal. • Individuals’ knowns as Mercantilists believed that maintaining imperialized territory and colonizing the region could serve as a source of wealth, while personal motives by rulers, explorers, and missionaries could therefore promote their own agenda. o This agenda being “Glory, God and Gold”. Mercantilism • Mercantilism was a popular and main economic system for many European nations during the 16th to 18th centuries. • The main goal was to increase a nation’s wealth by promoting government rule of a nation’s economy for the purpose of enhancing state power at the expense of rival national power. • It was the economic counterpart of political absolutism. Why did mercantilists want colonies? • Mercantilists believed that a country must have an excess of exports over imports. • By colonizing territory, it provided the nation with indispensable wealth of precious raw materials. • Therefore, the claimed territory served as a market and supplier of raw materials for the mother country. Which, in time, provided an excess of exports for the nation and thus created wealth. o Development of Trading Companies to support this economic system. Hudson Bay Company – (1670). Controlled primarily North America. o Dutch East Indie Trading Company (1682) o East Indian Trading Company (1600) o Royal African Trade Company (1672) WHERE? • European nations begun to colonize the America, India and the East Indies to create a direct trade route. • Great Britain was the leading power in India, Australia and North America, South Africa. • Spain colonized central and South America. • French held Louisiana, coastal land of Africa and French Guinea. • The Dutch built an empire in the East Indies. • The Portuguese was able to take control of present-day Brazil and the southern tip of South America and Japan. Age of Colonialism • As countries started to imperialize these regions, eventually the concept of colonization took hold: • This is what makes the Age of Colonialism extremely different! End of Colonialism • By 1800, colonialism became less popular • Why? o Revolutions (Spain, France & American) o The Napoleonic Wars o Struggle for nationalism and democracy. o Exhausted all money and energy to supervise their colonies. Waiting to wake again • Imperialism would stay quiet for close to 50 years before Great Britain and France’s economies revitalized. • The outbreak of the Industrial Revolution only encouraged and revitalized European nations to begin their conquest for new territory and resources. Age of Imperialism THE SCRAMBLE FOR AFRICA 1870-1914 Conditions Prior to Imperialism of Africa  European interest in exploiting Africa was minimal.  Their economic interests & profit in Africa primarily came through coastal trade that took place during the 1500-1700s.  The slave trade became the main source of European profit.  Furthermore, disease, political instability, lack of transportation and unpredictable climate all discouraged Europeans from seeking territory. Slave Trade & the Trans-Atlantic Slave Voyages  Forced labor was not uncommon during the 13-17th Centuries. Africans and Europeans had been trading goods and people across the Mediteranea for centuries.  This all changed from 1526 to 1867, as a new system of slavery was introduced that became highly “commercialized, racialized and inherited”  By 1690, the America and West Indies saw approximately 30,000 African people shipped from Africa. A century later, that number grew to 85,000 people per year.  By 1867, approximately 12.5 million people (about twice the population of Arizona) left Africa in a slave ship. What Changed? 1. End of the Slave Trade- Left a need for trade between Europe and Africa. 2. Innovation in technology- The steam engine and iron hulled boats allowed Europe 3. Discovery of new raw materials- Explorers located vast raw materials and resources and this only spurred imperialism with Europe in the wake of the Industrial Revolution. 4. Politics- Unification of Germany and Italy left little room to expand in Europe. Germany and Italy both needed raw materials to “catch up” with Britain and France so they looked to Africa. The Scramble for Africa  The scramble started in 1870.  Although some coastal land had previously been acquired before 1870, the need for territory quickly accelerated as European countries looked t get deeper into Africa.  Within 20 years, nearly all continents were placed under imperialistic rule. Who was Involved?  Great Britain  France  Germany  Italy  Portugal  Belgium  Spain (kind) Violent Affairs  Violence broke out multiple times when European nations looked to claim the same territory.  Germ Chancellor. Otto van Bismarck. Attempted to avert the possibility of violence against the European powers.  In 1884, Bismarck organized a conference in Berlin for the European nations. The Berlin Conference (1884-85)  The conference looked to set ground rules for future annexation of African territory by European Nations.  Annexation is the forcible acquisition and assertion of legal title over one state’s territory by another state, usually following military occupation of the territory.  From a distant perspective, it looked like it would reduce tensions among European nations and avert war.  At the heart of the meeting, these European countries negotiated their claims to African territory, made it official and then mapped their regions.  Furthermore, the leaders agreed to allow free trade among imperialized territory and some homework for negotiating future European claims in Africa was established. Further Path  After the conference, european powers continued to expand their claims in Africa so that by 1900. 90% of the African territory had been claimed. A Turn towards Colonization?  Upon the imperialization of African territory, European nations and little interest in African land unless it produced economic wealth.  Therefore, European governments put little effort and expertise into these imperialized regions.  In most cases, this emat a form of indirect rule. Thus, governing the natin without sufficient settlement and government from within the mother country. Some Exceptions  There were some exemptions through in Africa as colonization was a necessary for some regions i n Africa.  Some regions where diamonds and gold were present. Government looked to protectorate the regions and establish rule and settlement in the regions.  Protectorates: A state controlled and protected by another state for defense against aggression and other law violations. Would  Some examples include South Africa, Botswana, Zimbabwe and Congo. Conclusion  Although it may appear that the Berlin Conference averted war amid the African Scramble, imperialism eventually brought the world into worldwide conflict.  With the continued desire to create an empire by European nations. World War 1 would break out which can be linked to this quest at imperialism.
Updated 490d ago
note Note

Explore top flashcards

Unit 5: Genetics
Updated 375d ago
flashcards Flashcards (29)
La familia
Updated 784d ago
flashcards Flashcards (38)
CMS III Final: EM
Updated 255d ago
flashcards Flashcards (212)
2b: Cell structure
Updated 1171d ago
flashcards Flashcards (30)
deelsteppen
Updated 1065d ago
flashcards Flashcards (87)
PSYC 14
Updated 148d ago
flashcards Flashcards (64)
Unit 5: Genetics
Updated 375d ago
flashcards Flashcards (29)
La familia
Updated 784d ago
flashcards Flashcards (38)
CMS III Final: EM
Updated 255d ago
flashcards Flashcards (212)
2b: Cell structure
Updated 1171d ago
flashcards Flashcards (30)
deelsteppen
Updated 1065d ago
flashcards Flashcards (87)
PSYC 14
Updated 148d ago
flashcards Flashcards (64)