Cyber Attacks and Politics from a technological and security perspectives - Essay Example

Comments (0) Cite this document
Cyber attack refers to an act of exploitation that is deliberately done by a person to either the computer systems or to the networks of those enterprises that solely depend on the technology use. Those responsible for the Cyber attacks acts uses codes that are maliciously…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Cyber Attacks and Politics from a technological and security perspectives
Read TextPreview

Extract of sample "Cyber Attacks and Politics from a technological and security perspectives"

Download file to see previous pages The act of cyber attack is commonly known as the computer network attack (CNA).
Politics encompasses the manner in which a nation or political entity is being governed. The term is primarily concerned with the controlling and the administration of the internal and the external affairs of that particular entity. In addition, this term is also applicable in other institutions such as religious or academic with regards to how authority and power is exercised within them and the tactics as well as the methods applied in the formulation and application of policies for the organization. This paper will focus on establishing the cyber attacks acts and politics from either the technological or security point of view.
The government of all nations should put in place effective cyber security measures. These should be specifically aimed at detecting and combating all acts of cyber attacks, especially cyber terrorism. This can be done by governments allotting adequate funds to the relevant entities such as the ministry of defense to enable it counter attacks such acts.
Cyber security deals with the protection of information and information systems against the significant threats that global computer networks face. Some of these threats include cyber terrorism, cyber espionage and cyber warfare (Czosseck & Geers, 2009). These threats are mainly targeted towards the political, infrastructure and military assets of the nation or at other time people within it. Cyber security is a highly critical issue that nation’s government should enact appropriate strategies of security to handle (Macaulay, 2009). For instance, the federal government of the United State embarked on allotting more than $ 13 billion each year from the year 2010 to cater for the Cyber security.
The reason why governments should be concerned with the issue of cyber security with regards to terrorism is because terrorists groups use the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyber Attacks and Politics from a technological and security Essay”, n.d.)
Cyber Attacks and Politics from a technological and security Essay. Retrieved from
(Cyber Attacks and Politics from a Technological and Security Essay)
Cyber Attacks and Politics from a Technological and Security Essay.
“Cyber Attacks and Politics from a Technological and Security Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Attacks and Politics from a technological and security perspectives

Cyber Security

...? Cyber security 02-02 Cyber security According to, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by...
10 Pages(2500 words)Coursework

Cyber/digital attacks

...without having to enter the credentials in order to authenticate him/her. This can be through a different IP address that routes the attacker via other links until he get access to the same system. References Middleton, B. (2005). Cybercrime investigator's field guide. Auerbach Publications. Ransome, J., & Rittinghouse, J. (2009). VoIP security. Digital Press. Rosenberg, R. S. (2006). The social impact of computers. Emerald Group Publishing. Salomon, D. (2007). Data privacy and security. Springer. Trevor, J. (2011). Cyber Attack: Improving Prevention and Prosecution" Hearing Before the Subcommittee on Technology, Terrorism. General...
12 Pages(3000 words)Research Paper

Cases of cyber attacks

...? Cases of Cyber Attacks Cases of Cyber Attacks The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another. Instead of bullets and guns, critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power. In this paper, a comparison of three cases of cyber terrorism would be discussed to enable people understand the nature, power and threat caused by cyber attacks. Likewise, the governments’ initiatives to response to...
4 Pages(1000 words)Case Study

Cyber Attacks and Security

...?Cyber Attacks In the current age of advanced technology and the advance of the Internet, security issues have continued to emerge to organizations. Terrorism has evolved from the conventional form to include terrorism that is perpetuated over the Internet. One example of this nuisance is the use of cyber-attacks, which refers to the intentional compromise of a computer system through the Internet or the intentional tracking of a user on the net (Lewis, 2011). This means that cyber-attack has two broad definitions, the first definition being the unauthorized gathering of information about a user. This...
4 Pages(1000 words)Research Paper

Cyber -Attacks on America

.... The threat from hackers has been keeping at par with the advancement in technology. Hackers in America launch politically instigated attacks on email servers or web pages accessible publicly (Lee, 2013). These attacks could fail to alter networks or operating systems but damage services and deny the public access to the websites that have information. This category of attackers makes up 22% of the risk of cyber-attacks (PWC, 2013). Furthermore, America faces a great risk of cyber-attacks from virus writers. Virus writers have been noted to pose greater threat than hackers do (Lee,...
10 Pages(2500 words)Essay

Cyber attacks

...Cyber Attacks Cyber attacks have become a potential menace to internal security of United s in today’s era of globalization. Today, USA is heavily dependent on “Information Infrastructure”, this includes information systems, networks, and communication systems. Since information infrastructure is increasingly critical to daily affairs, it has become a growing target for disruption and destruction by terrorsist movements and adversaries of USA. Various literatures have documented the issue of security threat through cyber attacks. An article written by Yochi J. Dreazen and Siobhan Gorman...
2 Pages(500 words)Essay

Cyber attacks

.... The integration of business on the Internet knows as “E commerce” has facilitated the business to a great extent. On the other hand it has also invited vulnerabilities to disrupt services by hacking, un authorized access etc. As the cyber attacks become more dominant and aggressive, they can severely harm critical databases, Interrupt services running on a background and portray catastrophic financial damage (Financial sector « core security technologies). 4.1 HOW TROJANS AFFECT THE FINANCIAL INSTUTIONS In the network dictionary, Trojan is defined as it “is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or...
10 Pages(2500 words)Research Paper

Cyber Attacks

...communication and usage. With increased usage of computer systems and internet connectivity to share resources among end users, infringement on various personal and national security aspects poses the most disturbing computer related threat to the modern community (Saskia, 2011).. Cases of economic crimes taking place on the internet prove the sensitivity that global business must approach online based transactions to shield themselves against losses. Most importantly, cyber-attacks infringing on national and international efforts to offer security to the national and global citizenry provide newer and trickier ways of propagating terror threats. In a world experiencing...
12 Pages(3000 words)Term Paper

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Homeland Security

..., manipulate or steal data, deny services to the people and to blackmail the U.S government and its people. The individuals and groups that illegally use technologies that are cyber based are in different shapes and forms; pursuing actions to counter the economic and security interest of the United States of America and the entire globe. The types of attacks and cyber threats posed by these aggressors are not limited or mutually exclusive. For instance, hackers whose main target is corporate of organizations’ intellectual properties are usually categorized as cyber-spies or cyber- thieves. Moreover, cyber...
5 Pages(1250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Cyber Attacks and Politics from a technological and security perspectives for FREE!

Contact Us