StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber-Attack Has Two Broad Definitions - Research Paper Example

Cite this document
Summary
The paper "Cyber-Attack Has Two Broad Definitions" discusses that the power infrastructure needs continued and increasing protection from cyber attacks. The other part of the infrastructure or economy of a country that needs continuous protection from cyberterrorism is the security system…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Cyber-Attack Has Two Broad Definitions
Read Text Preview

Extract of sample "Cyber-Attack Has Two Broad Definitions"

?Cyber Attacks In the current age of advanced technology and the advance of the Internet, security issues have continued to emerge to organizations. Terrorism has evolved from the conventional form to include terrorism that is perpetuated over the Internet. One example of this nuisance is the use of cyber-attacks, which refers to the intentional compromise of a computer system through the Internet or the intentional tracking of a user on the net (Lewis, 2011). This means that cyber-attack has two broad definitions, the first definition being the unauthorized gathering of information about a user. This type of cyber attack constitutes the insertion of a computer virus into the end user’s computer, which will ensure that the information used and stored by the user is monitored. This privacy violation is usually perpetrated with the use of spyware, which is usually undetectable by the end-user of the computer. The spyware is downloaded into the user’s system without express knowledge or authorization, and is later used to gather information about the user. Even though this type of attack is not usually malicious, it is used to gather information about the user; information that is then transmitted to the perpetrator. The main aim of this cyber attack is two-fold; monitoring the general movements and procedures of the intended victim, and copying and transmitting information about the user to the perpetrator. The main benefit derived is usually financial, since the information can be used to access financial data and storage, or can be used by a rival organization to gather product or financial information about another competitor. The second constituent of cyber attack is usually malicious and intended to cause harm to the targeted victim (Lipson, 2002). For example, the perpetrator of this cyber attack can sue a virus that disable the usability of a computer in a network or the network in its entirety. In this case, a computer virus is introduced via an existing network, and contrary to the first example, is used to disrupt the working of the computer. This can be done through continued spamming of the user, or by causing a crash or denial of service to the user. The usual result of this type of cyber attack is the denial of service to the user, possible loss of time and earnings, and the disruption of normal working procedures by the affected person. The third and worst form of cyber attacks is when it is used by conventional terrorists to achieve their means, for example, when the Internet is used to disrupt the functioning of a country’s systems (BNAC, 2007). This is usually done through the disruption of the provision of public services, for example, the use of cyber crime to disrupt the functioning of a power grid. This means that online terrorists use the Internet to weaken the infrastructure of a country by stopping or disrupting the provision of normal services. In this case, a country can be severely weakened if terrorists use a series of attacks to disrupt key parts of the economy, for example, disabling electricity provision, water provision, and the coordination of health systems (Cashell, Jackson, Jickling, and Webel, 2004). Even though these kinds of attacks are rare, countries have taken a number of steps to ensure that they never happen, since it leads to a possibility of completely weakening state systems. In the recent past, there has been an increased call for the government to respond to cyber attacks targeting the country with conventional weapons. The main reasoning behind these calls is that cyber terrorism qualifies to be called terrorism, and since the government is obligated to prevent terrorism, conventional weapons should be used (GFI, 2011). However, a more reasonable reaction to cyber attacks is based on preventing the future occurrence of the attacks. Many organizations would find it hard to recover from a cyber attack aimed at crippling operations; therefore, it is advisable that these firms avoid the attacks. It is evident that, since cyber attacks are mainly perpetrated by intentional access of s system from the Internet, the use of spyware and strong anti-virus software would deter cyber attacks. In this case, organizations are advised to invest heavily in software to protect their computers and equipment from possible cyber attacks. The basic preventive measure against cyber attacks is the use of regularly updated anti-spyware and anti-virus software (Vatis, 2002), which will ensure that attackers do not gain access to the network. However, it is completely plausible that, despite measures to prevent cyber attacks, criminals might still get some way to access information, in which case, a response to the attack is needed. The best response to cyber attacks is by the authorities, where rules are enacted to make the attacks serious crimes. This would ensure that jail terms and harsher punishments are meted out to perpetrators of cyber attacks, which will ensure that the attackers become reluctant to launch their attacks (DHS, 2011). However, these actions would not suffice in the case of cyber attacks targeting the government, and from another country. Therefore, the recent decision by the Pentagon to respond to cyber attacks (Gorman and Barnes, 2011) from another country with traditional military force is entirely plausible. In this case, cyber attacks are treated as a form of international terrorism, and the country is allowed to respond using military force. As already stated, the use of cyber attack can be targeted at crippling important infrastructure in a country. In this case, the most susceptible parts of the infrastructure and economy are those that provide critical, public services (Vatis, 2002). For example, the infrastructure that is mostly targeted by cyber attackers includes power grids and electronic systems. This is because the nation is completely dependent on the power grid, and crippling it would essentially weaken the country. In this case, the power infrastructure needs continued and increasing protection from cyber attacks. The other part of the infrastructure or economy of a country that needs continua protection from cyber terrorism is the security system. This is one of the most crucial parts of the economy, since it ensures the safety of citizens in a country. This means that security systems are next to critical public services in the protection from cyber crime. References British-North American Committee. (BNAC). (2007). Cyber Attack: A Risk Management Primer for CEOs and Directors. The Atlantic Council of the United States. Cashell, B., and Jackson, W., and Jickling, M., and Webel, B. (2004). The Economic Impact of Cyber-Attacks. CRS Report for Congress. Department of Homeland Security (DHS). (2011). Preventing and Defending Against Cyber Attacks. GFI. (2011). Targeted Cyber Attacks: The Dangers Faced By Your Corporate Network. GFI White Paper. Gorman, S., and Barnes, J. 2011. Cyber Combat: Act of War. Wall Street Journal. Retrieved on December 11, 2011 from: Lewis, J. (2007). Cyber Attacks Explained. Washington: Center for Strategic and International Studies. Lipson, H. (2002). Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues. SPECIAL REPORT CMU/SEI-2002-SR-009. Vatis, M. (2002). Cyber Attacks: Protecting America’s Security against Digital Threats. ESDP Discussion Paper. Harvard: John F. Kennedy School of Government. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Attacks and Security Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Cyber Attacks and Security Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1440024-cyber-security
(Cyber Attacks and Security Research Paper Example | Topics and Well Written Essays - 1000 Words)
Cyber Attacks and Security Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1440024-cyber-security.
“Cyber Attacks and Security Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1440024-cyber-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber-Attack Has Two Broad Definitions

Twelve Security Attack Trends of 2011

Intimation to consumers about completion of each and every transaction in their account through SMS messaging services has generated new opportunities for hackers who could use the path of sending data outside the domain for attack.... Keeping cyber security apart from business operations has created huge opportunities for hackers and individuals.... The trend of making cyber security the part of business operations is developing rapidly for example Intel Corporation made acquisition of McAfee and HP of Fortify (ComputerWeekly 2010) The ninth security threat is from the proactive approach of security practitioners which has although helped in catching more hackers, created strong professional ‘bar' of hackers (ComputerWeekly 2010) The tenth security threat is from the attacks of hackers on industry....
9 Pages (2250 words) Essay

Cyber-crime: Its History, Types, Methods and the Effects on Networks and Users

According to the Ecommerce website, the first category includes those in which 'the computer comprises the 'object' of a crime,' and where the object of the perpetrator's attack is the computer itself ('Computer Crime – definitions').... The second category of cyber-crimes includes the category where the computer is the 'subject' of the crime, such as in the case of viruses and similar attacks whose purpose is to destroy the computer or a network of computers ('Computer Crime – definitions')....
13 Pages (3250 words) Research Paper

Forensics Based On Evidence Gathered With Peep Attacks

Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme.... It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed.... Cybercrime has been cited as one of the most prevalent problems in society....
15 Pages (3750 words) Essay

Legal Issues in Fight against Terror

two classical cases that defined the interaction between the fight against terror and legally supported government polices illustrate the apparent standoff.... Involvement of laws in recognition of various loopholes that terrorism continues to exploit in perpetrating destructive activities is critical in modern legal regimes....
13 Pages (3250 words) Term Paper

Cyber Terrorism Attacks

"Cyber Terrorism Attacks" paper establishes narrow and broad descriptions of cyber terrorism.... he following discussion establishes narrow and broad descriptions of cyber terrorism.... Further, the discussion establishes profound research and analyses to intensify and reveal cyber-terrorism activities with the assertion of a relevant matrix....
10 Pages (2500 words) Essay

Concept of Virtual Space in Cyberethics

Digital connectivity now has high dependence and reliance on networked resources.... he education sector is now adopting virtual learning and online tutoring, this has been exploited by unethical behaviors where people just payments and earn free degrees.... .... ...
7 Pages (1750 words) Literature review

Future Cyber Security Crimes

The DNA technique adopted fingerprinting aspects in order to connect the semen stain and samples that were collected from two crime scenes in Leicestershire, United Kingdom.... he nature of effective criminal investigations today has been a beneficiary of numerous breakthroughs in different aspects of criminal profiling....
8 Pages (2000 words) Research Paper

CERT Australia Network Threat Risk Assessment

Australia has put in place the necessary measures to achieve cybersecurity.... Since its inception in 2010, CERT Australia has been sharing information and collating responses related to cybersecurity to improve information security in Australian society.... The paper 'CERT Australia Network Threat Risk Assessment' studies possible cyber threats that CERT Australia is likely to experience on the launch of a new policy to the public....
14 Pages (3500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us