Saturday, June 8, 2019
Cyber Attacks and Security Research Paper Example | Topics and Well Written Essays - 1000 words
Cyber Attacks and Security - Research Paper ExampleThis type of cyber firing constitutes the insertion of a computer computer virus into the end users computer, which will ensure that the information used and stored by the user is monitored. This privacy violation is usually perpetrated with the use of spyware, which is usually undetectable by the end-user of the computer. The spyware is downloaded into the users system without express knowledge or authorization, and is later used to gather information about the user. Even though this type of attack is non usually malicious, it is used to gather information about the user information that is then transmitted to the perpetrator. The main aim of this cyber attack is two-fold monitoring the general movements and procedures of the think victim, and copying and transmitting information about the user to the perpetrator. The main benefit derived is usually financial, since the information can be used to access financial selective info rmation and storage, or can be used by a rival organization to gather product or financial information about some other competitor. The second constituent of cyber attack is usually malicious and intended to cause harm to the targeted victim (Lipson, 2002). For example, the perpetrator of this cyber attack can sue a virus that disable the usability of a computer in a network or the network in its entirety. In this case, a computer virus is introduced via an existing network, and stubborn to the first example, is used to disrupt the working of the computer. This can be done through continued spamming of the user, or by causing a crash or denial of service to the user. The usual result of this type of cyber attack is the denial of service to the user, possible loss of time and earnings, and the disruption of normal working procedures by the affected person. The third and worst form of cyber attacks is when it is used by conventional terrorists to achieve their means, for example, wh en the meshing is used to disrupt the functioning of a countrys systems (BNAC, 2007). This is usually done through the disruption of the provision of public services, for example, the use of cyber crime to disrupt the functioning of a power grid. This means that online terrorists use the Internet to weaken the infrastructure of a country by stopping or disrupting the provision of normal services. In this case, a country can be earnestly weakened if terrorists use a series of attacks to disrupt key parts of the economy, for example, disabling electricity provision, water provision, and the coordination of health systems (Cashell, Jackson, Jickling, and Webel, 2004). Even though these kinds of attacks are rare, countries develop taken a number of steps to ensure that they never happen, since it leads to a possibility of completely weakening state systems. In the recent past, there has been an change magnitude call for the government to respond to cyber attacks targeting the countr y with conventional weapons. The main reasoning behind these calls is that cyber terrorism qualifies to be called terrorism, and since the government is obligated to prevent terrorism, conventional weapons should be used (GFI, 2011). However, a more reasonable reaction to cyber attacks is based on preventing the future occurrence of the attacks. Many organizations would find it hard to recover from a cyber attack aimed at crippling operations therefore, it is advisable that these firms avoid the attacks. It is evident that, since cyber attacks are mainly
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.