Wednesday, April 17, 2019
Cyber Attacks and Security Research Paper Example | Topics and Well Written Essays - 1000 words
Cyber Attacks and Security - Research Paper ExampleThis type of cyber glide slope constitutes the insertion of a computer virus into the end users computer, which will ensure that the information employ and stored by the user is monitored. This privacy violation is usually perpetrated with the use of spyware, which is usually undetectable by the end-user of the computer. The spyware is downloaded into the users system without express knowledge or authorization, and is later used to gather information about the user. thus far though this type of attempt is not usually malicious, it is used to gather information about the user information that is then transmitted to the perpetrator. The principal(prenominal) aim of this cyber attack is two-fold monitoring the general movements and procedures of the intended victim, and copy and transmitting information about the user to the perpetrator. The main benefit derived is usually financial, since the information can be used to access fina ncial data and storage, or can be used by a rival organization to gather product or financial information about another competitor. The spot constituent of cyber attack is usually malicious and intended to cause harm to the targeted victim (Lipson, 2002). For example, the perpetrator of this cyber attack can sue a virus that disable the usability of a computer in a profit or the network in its entirety. In this case, a computer virus is introduced via an existing network, and contrary to the startle example, is used to resolve the working of the computer. This can be done through continued spamming of the user, or by causing a crash or denial of service to the user. The usual result of this type of cyber attack is the denial of service to the user, possible loss of time and earnings, and the disruption of normal working procedures by the touch person. The third and worst form of cyber attacks is when it is used by conventional terrorists to achieve their means, for example, whe n the Internet is used to disrupt the functioning of a countrys systems (BNAC, 2007). This is usually done through the disruption of the provision of overt services, for example, the use of cyber crime to disrupt the functioning of a power grid. This means that online terrorists use the Internet to resign the infrastructure of a country by stopping or disrupting the provision of normal services. In this case, a country can be severely weakened if terrorists use a series of attacks to disrupt detect parts of the economy, for example, disabling electricity provision, water provision, and the coordination of health systems (Cashell, Jackson, Jickling, and Webel, 2004). Even though these kinds of attacks are rare, countries have taken a number of steps to ensure that they never happen, since it leads to a possibility of completely weakening fix systems. In the recent past, there has been an increased call for the government to respond to cyber attacks targeting the country with con ventional weapons. The main reasoning behind these calls is that cyber terrorism qualifies to be called terrorism, and since the government is obligated to prevent terrorism, conventional weapons should be used (GFI, 2011). However, a more reasonable reaction to cyber attacks is based on preventing the future occurrence of the attacks. Many organizations would reckon it hard to recover from a cyber attack aimed at crippling operations therefore, it is advisable that these firms avoid the attacks. It is limpid that, since cyber attacks are mainly
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.