StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Hackers Broaden Their Attacks against Business - Essay Example

Cite this document
Summary
The author concludes that at the highest level of the management of a company robust understanding of the software and hardware security technologies should be developed so that both the managers and engineers can join hands to improve cybersecurity and help in protecting critical data…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Hackers Broaden Their Attacks against Business
Read Text Preview

Extract of sample "Hackers Broaden Their Attacks against Business"

Running Head: Response Paper on Response Paper on Hackers Broaden their Attacks against Business Organizations ComputerSciences and Information Technology Instructor Name Date of Submission Response Paper on Hackers Broaden their Attacks against Business Organizations In the article titled Hackers Broaden their Attacks, the writers have described the contemporary security situation of the business world intricately. The article is informative, and it is primarily centered on some recent developments in the sphere of cyber security in USA.

On 21st May, 2011, the computer networks of Lockheed Martin Corp. were attacked. According to the company, its information security team detected the attack in proper time and initiated aggressive security measures before any significant damage was actually done. Lockheed is a major information and defense technology supplier to the federal government. After a few days, the renowned broadcaster PBS also faced a serious cyber attack. In the words of Worthen et al (2011), “Over the weekend, the website for the PBS show "NewsHour" was altered by hackers to include a fake article claiming that rapper Tupac Shakur, who was murdered 15 years ago, was alive in New Zealand.

The hackers also posted login information that stations and other entities use to access PBS sites.” In the article, the writers have further pointed out that the hackers generally used to target corporations, which stored and managed secret government information or critical financial data. Hyundai Card/ Hyundai Capital Co., Epsilon, EMC Corp., etc. had been victims of such attacks. But of late, the hackers are targeting corporate secrets, media operations, and other sorts of diverse information security implementations too.

The situation is changing rapidly, and the CEOs, CIOs, and CTOs of different organizations are facing unexpected challenges in the sphere of IT security. They are really being taken aback! After reading this article, I would suggest that the organizations should not panic due to the news of increased hacking activity. It should be borne in mind that since the motives of the hackers have expanded, the organizations must also expand their security systems and cyber surveillance in reply. In advising a CEO, CTO, or CIO, I would further suggest that the security measures for preventing computer related crimes must include proper documentation of the criminal activities, especially in regards of hacking.

Profiling the computer criminal (i.e., the hacker), understanding legal considerations, seizing computerized evidence, etc. are the ways to prevent this hi-tech crime (Paladin Press, 1990). It is vital to have a methodology to analyze the impact of cyber threats and subsequently make the current and future computer networks resilient. Implementation of complicated cryptography, proper maintenance of public and private key infrastructure, simulation based network security trials, and utilization of advanced firewall technologies can put up a substantial organization level multi layer defense system (Cetinkaya et al, 2010).

To conclude, at the highest level of the management of a company robust understanding of the software and hardware security technologies should be developed so that both the managers and engineers can join hands to improve cyber security and help in protecting critical data. The dynamic needs of the information technology infrastructure can be considered to be a part of strategic management. Without data integrity and information security, no corporate entity can survive these days. Therefore, the focus should be put on synchronizing the management and technological needs of the company.

Otherwise, the hackers will become unstoppable, and the global economy will be at stake. References C?etinkaya, E.K., Broyles, D., Dandekar, A., Srinivasan, S., Sterbenz, J.P.G. (2010). IEEE Xplore - A comprehensive framework to simulate network attacks and challenges. Retrieved June 10 2011 from http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5676585. Paladin Press. (1990). Computer Crimes: High-Tech Theft. Boulder: Author. Worthen, B., Adams, R., Hodge, N., and Ramstad, E. (2011).

Lockheed, PBS Join Roster of Hacking Victims - WSJ.com. Retrieved June 10 2011 form http://online.wsj.com/article/SB10001424052702304563104576355623894502788.html.  

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Hackers Broaden Their Attacks against Business Essay, n.d.)
Hackers Broaden Their Attacks against Business Essay. Retrieved from https://studentshare.org/information-technology/1425178-read-an-article-about-how-hackers-broaden-their
(Hackers Broaden Their Attacks Against Business Essay)
Hackers Broaden Their Attacks Against Business Essay. https://studentshare.org/information-technology/1425178-read-an-article-about-how-hackers-broaden-their.
“Hackers Broaden Their Attacks Against Business Essay”, n.d. https://studentshare.org/information-technology/1425178-read-an-article-about-how-hackers-broaden-their.
  • Cited: 0 times

CHECK THESE SAMPLES OF Hackers Broaden Their Attacks against Business

The Importance of Digital Security

KINDS OF THREATS Based on the goals and purposes of the attacks on any digital system, the threats can be categorized as STRIDE.... Repudiation These attacks are difficult to prove as the users deny that they performed any specific action.... They are the gatekeepers that guard the system and applications from intrusions and attacks.... … Organizations are at a greater risk and more prone to digital security threats than individuals, as hackers find it more rewarding breaching their security boundaries....
14 Pages (3500 words) Essay

Regardless of Computer or Network Security

The focus of this paper "Regardless of Computer or Network Security" is on the driving forces behind most hackers' actions.... The internet has further made it easy for hackers to go beyond borders with Chinese hackers gaining access to the American government or security information.... hellip; Possible security vulnerabilities exist and hackers are always on the lookout.... Black hat hackers are the most daring because they use their knowledge to obtain information and data for their own personal gains or to disrupt network systems....
12 Pages (3000 words) Assignment

How to Save Organisations from Hackers

Nevertheless, the initial role of social engineering in these attacks is core and cannot be overlooked due to the technologies used.... This report "How to Save Organisations from hackers" sheds some light on the recent worrying trends in which more types of sophisticated technical approaches are used to compromise and illegal access information and computer systems/networks.... In their actions, hackers in contemporary society use the most sophisticated of malware to attack information systems and networks in ways never seen before....
26 Pages (6500 words) Report

Ethical versus Unethical Hacking

However, not all hackers and hacking is wrong, and some do assist in developing robust systems and guarding them against attacks.... The paper "Ethical versus Unethical Hacking" highlights that the boundary between ethical and unethical hacking is slim, and it calls for qualities such as trustworthiness to ensure that system administrators do not use sensitive information maliciously....
10 Pages (2500 words) Research Paper

International Analysing Different Dimensions of Cyber-Warfare

In the modern world, every business operation is based on advanced technology.... Data transmission is a major aspect of the business world but cyber warfare leads to the exploitation of data.... The paper "Analysing Different Dimensions of Cyber-Warfare" discusses that targeted attacks can be referred to as those when a specific victim is to be targeted.... Cyber attacks can be stated as anonymous and are launched from various sources across the globe....
15 Pages (3750 words) Research Paper

A Forensic Investigative Response Approach for Suspected Security Breach

The paper "A Forensic Investigative Response Approach for Suspected Security Breach" summarizes that the security advisor should monitor all business systems for any security lapses, document the entire episode of hacking and list the security incidents, educate employees about security awareness.... Forensic experts have an onus to their client to show attention about the information and data to be identified that can become probable corroboration , particularly , it can acts as digital proof in investigation and can help to initiate legal action against attackers....
6 Pages (1500 words) Case Study

Computing Security & Computing Forensics

The interesting bit of the story is that the malware is very specific and attacks the bank's sites only.... The hackers have been very witty, posing a threat even to those with up-to-date anti-virus software.... In a network standard-setting check-up done by the BBC check, it was found that the majority of web security did not detect the malware created by the hackers.... The malwares released by the hackers is a bit complicated because whenever an update is made on the malware it may take the security personnel more than a week or so, to detect its characteristics then destroy it....
6 Pages (1500 words) Report

Types of Hacking

The paper "Types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions.... The term “hacker” is presently too broad to represent the specifics of the different sorts of computer-related attacks.... In order to incorporate all of the different computer attacks in a way that facilitates understanding it will be necessary to identify specific sub-categories that will fall under the umbrella of “hackers” (Howard, 1997)....
24 Pages (6000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us