StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber Attacks and Politics from a technological and security perspectives - Essay Example

Cite this document
Summary
Cyber attack refers to an act of exploitation that is deliberately done by a person to either the computer systems or to the networks of those enterprises that solely depend on the technology use. Those responsible for the Cyber attacks acts uses codes that are maliciously…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Cyber Attacks and Politics from a technological and security perspectives
Read Text Preview

Extract of sample "Cyber Attacks and Politics from a technological and security perspectives"

Download file to see previous pages

The act of cyber attack is commonly known as the computer network attack (CNA). Politics encompasses the manner in which a nation or political entity is being governed. The term is primarily concerned with the controlling and the administration of the internal and the external affairs of that particular entity. In addition, this term is also applicable in other institutions such as religious or academic with regards to how authority and power is exercised within them and the tactics as well as the methods applied in the formulation and application of policies for the organization.

This paper will focus on establishing the cyber attacks acts and politics from either the technological or security point of view. The government of all nations should put in place effective cyber security measures. These should be specifically aimed at detecting and combating all acts of cyber attacks, especially cyber terrorism. This can be done by governments allotting adequate funds to the relevant entities such as the ministry of defense to enable it counter attacks such acts. Cyber security deals with the protection of information and information systems against the significant threats that global computer networks face.

Some of these threats include cyber terrorism, cyber espionage and cyber warfare (Czosseck & Geers, 2009). These threats are mainly targeted towards the political, infrastructure and military assets of the nation or at other time people within it. Cyber security is a highly critical issue that nation’s government should enact appropriate strategies of security to handle (Macaulay, 2009). For instance, the federal government of the United State embarked on allotting more than $ 13 billion each year from the year 2010 to cater for the Cyber security.

The reason why governments should be concerned with the issue of cyber security with regards to terrorism is because terrorists groups use the

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Attacks and Politics from a technological and security Essay”, n.d.)
Cyber Attacks and Politics from a technological and security Essay. Retrieved from https://studentshare.org/history/1607357-cyber-attacks-and-politics-from-a-technological-and-security-perspectives
(Cyber Attacks and Politics from a Technological and Security Essay)
Cyber Attacks and Politics from a Technological and Security Essay. https://studentshare.org/history/1607357-cyber-attacks-and-politics-from-a-technological-and-security-perspectives.
“Cyber Attacks and Politics from a Technological and Security Essay”, n.d. https://studentshare.org/history/1607357-cyber-attacks-and-politics-from-a-technological-and-security-perspectives.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Attacks and Politics from a technological and security perspectives

Hacking: Definition, Types, and Facts

In particular, hacking involves network security… However, hacking is a skill and not a sequence of command or operation as many may tend to think.... However, it must be noted that not all hackers are bad (Kumar, 2012), since the government and some huge companies use hackers to maintain their computer network security in order (Rogers 1994).... It is also not a specified term since it varies from Hacking can be dated back to 1978 in the earlier days of Bell Telephone Companies, where earliest mischief's of application of modern community were experienced....
9 Pages (2250 words) Essay

The Purpose of the International Politics

In a technological perspective, globalization has allowed barriers between states to be broken through technological globalization.... It is thus true that globalization is a threat to international security.... Globalization has also resulted in the trans-nationalization of security threats since individual states lack the capability to handle pollution.... The paper "The Purpose of the International politics" states that globalization has made it possible for militia and organized gangs to access weapons of mass destruction that they use against their opponents....
6 Pages (1500 words) Assignment

Convergence: The Use of Both Technology and Physical Security

Explored in the research are the implications of adopting security convergence within an organization, analysis of trends affecting security and loss prevention, and evaluation of non-traditional approaches to crime prevention from a multi-disciplinary approach.... Physical security refers to security measures customized to restrict unauthorized personnel from accessing resources, facilities… Conversely, information security refers to measures instituted to impede unauthorized access to information regardless of the form data is in; for example, Unlike in the past, corporate assets are now information-based....
9 Pages (2250 words) Research Paper

Airports and Ground Handling

However, in some instances, there have been reported incidences when terrorist have managed to evade the security checks and measures in some of the modern and technologically sophisticated airports and managed to spill terror to the airline passengers and crew.... The airport operators vary significantly in relation to the ownership, management structure, funding and degree of autonomy, thus making the manner with which one airport is managed to be significantly different from the other....
8 Pages (2000 words) Essay

Super-Powered Individuals

The major concern of Homeland security is how to control this type of group given their technological and financial prowess.... hellip; The national security policies are changing due to the increased threats from both local and international threats.... Homeland security is all about safeguarding the security interest of the citizens.... Surveillance and profiling have been a major concern in matters security....
8 Pages (2000 words) Report

Possible Future Laws for Covert Action in Ten Years in Relation to National Security and Public

This essay describes laws for covert action in ten years in relation to national security and public safety.... The CIA holds the sole responsibility of carrying out covert actions under the National security Act of 1947 with the CIA Director being in charge of carrying such roles as well as duties that touches on intelligence that touches on National security that the President or the National security Council may direct....
7 Pages (1750 words) Essay

Significance of Critical Infrastructure

Cyber threats to critical infrastructure continue to increase prompting governments to develop policies that would enhance security.... In the past, before technological advancement became as pronounced as it is today, people had not embraced technology and thus it was not a key factor in economic performance.... However, since the industrial revolution, critical infrastructure began acquiring importance from the economic perspective.... The paper "Significance of Critical Infrastructure" discusses that the main factor that can help in the deterrence of cyber intrusions is education....
5 Pages (1250 words) Essay

Security Design for the Smith-Brooks Corporation

The analysis will then be used to address security issues from a stakeholder requirements specification and protection needs perspective.... "security Design for the Smith-Brooks Corporation" paper addresses how modern technologies can be equipped to develop more effective security systems.... nbsp;… Configuration, specification, or provision of dedicated modem lines and other network access ports to provide security system support without authorization from the security manager would be necessary (Ayoub, 2012)....
12 Pages (3000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us