Cyber Security and Startups - Case Study Example

Comments (0) Cite this document
The motive of the attacker is to receive payments in Bitcoins before releasing the service to resume its normal functions. The attack targets…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Cyber Security and Startups
Read TextPreview

Extract of sample "Cyber Security and Startups"

Cyber Security and Start-ups What is a DDoS attack? A DDoS Attack is an attempt to make an online service inaccessible by overpowering it through the obstruction from various sources. The motive of the attacker is to receive payments in Bitcoins before releasing the service to resume its normal functions. The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information. The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort more users (Perlroth & Wortham, 2014).
How can a small company protect itself from DDoS attacks?
A small company can protect itself from DDoS attacks by registering for website hosting services with giant organizations like Amazon and Google that can hold bulky flows of attack transfer. Another way to protect against DDoS attacks can be through subscribing for mitigation services that monitor the flow of data from servers and other data sources (Perlroth & Wortham, 2014). These strategies enable smaller companies to block the viruses that block the smooth scream of information or access to important resources.
Who has become a frequent victim of DDoS attacks?
Small tech start-ups have become frequent targets of the attacks because they possess valuable data that the DDoS attack can hurt (Perlroth & Wortham, 2014). New companies attract numerous users who visit their websites for information concerning the firm. They do not also install security measures to protect against such attacks, which make them vulnerable to pay the ransom demanded. It is apparent that the attackers target new establishments that do not have the experience of dealing with modern elements of cyber attacks.
Comments on the Post
The post clearly illustrates the meaning of DDoS attack and the various ways of avoiding such challenges. However, the writer does not give a detailed analysis of the attack and how small companies are the prime targets. This causes confusion, especially regarding the ransom charges since the post indicates two conflicting charges of $20 and $2000. The charges posted here reflect the ones that future DDoS attackers might demand and not the current rate.
Perlroth, N. & Wortham, J. (2014). “Tech Start-Ups are Targets of Ransom Cyber attacks.” The
New York Times. Business of technology Column. Retrieved from
Read More
Cite this document
  • APA
  • MLA
(“Cyber Security and Startups Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from
(Cyber Security and Startups Case Study Example | Topics and Well Written Essays - 250 Words)
“Cyber Security and Startups Case Study Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Cyber Security and Startups

Cyber Security

...? Cyber security 02-02 Cyber security According to, anything that is at a risk of emotional or physical grievance is vulnerable. Talking about cyber security, vulnerability is a security weakness; anything that can be harmed easily or destroyed effortlessly is said to be ‘vulnerable’. Every now and then new programs are developed and information technology managers are harassed by hackers as their systems are always vulnerable to external threats. In the current age of union of communication and technology, one cannot resist or keep away from being affected by internet, cyber...
10 Pages(2500 words)Coursework

Questions from international business competing in the global marketplace 8th edition by 'Hlll

...Question Google planned to halt its censorship for the Chinese search results. This is because of the cyber attack, which aimed at obtaining information regarding human rights activists in China. There was a crackdown on the internet in China last year that pushed Google to its decision. The Chinese government was against Google’s decision and thus critiqued the move. The decision to Google actually meant closing the as well as its offices there. They ought to have agreed about censorship of such sensitive data. Before announcing, Google contacted the US State Department. Each country has a role to keep its network secure irrespective of the source of the suspicious cyber...
4 Pages(1000 words)Assignment

Cyber security

...? Cyber Security Topic Cultural values as viewed in the static sense represent the heritage and traditional norms that govern behavior in society. However, in the dynamic state it represents contemporary beliefs expressed modes through ideas, creativity in thought and actions. Hence, it is true to state that cultural values are the building blocks for social morality. Consequently, these cultural values are what instill the moral responsibility within a person to engage in a certain behavior. Furthermore, by extension, the same behaviors instigated by our cultural values are what impact on cyber ethics. An example of how cultural values impact on the moral legitimacy can be drawn on the...
3 Pages(750 words)Coursework

Cyber security

...? Cyber Security Organizational business mission and related security goals Intellectual property is a juridical concept that refers to creative formations of the mind that have exclusive rights. Owners of the creations are granted exclusive rights on intangible assets as stipulated in the intellectual property law on intangible creations such as music, works of art, inventions, designs, symbols and innovations. Examples of intellectual property rights include trademarks, copyrights, patents and industrial design rights. In the current international economy and business environment, companies hold their intellectual assets as their most valid assets, the issues pertaining to intellectual...
4 Pages(1000 words)Coursework

Cyber security

...CYBER SECURITY Cyber Security E-government comes at a cost. Is there a trade-off that occurs between the security of federal systems and the cost savings from reduced paperwork? I concur with the response given to the question since it has fully explored the benefits and setbacks of e-government against the benefits of manual storage of information. The answer has outlined the gains the government enjoys for employing technology to store its information. It has clearly shown that substantial amounts of money can be saved in terms of money invested in storage space. This is a true reflection of what takes place when digital data storage is used. The fact...
2 Pages(500 words)Coursework

Cyber security

...Cyber Security Cyber Security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend? If someone asks me for advice on what he or she should do first to get started on intrusion detection then I would suggest him to think about what advantages or opportunities he expects from the deal he is going to make. In this scenario, one excellent starting point can be from looking at the impact of previous intrusions (Bloedorn, Christiansen, Hill, Skorupka, Talbot, & Tivel, 2002). However, if he or she has been caused to experience intrusions and hacking act before, they will be acquainted with...
1 Pages(250 words)Coursework

Big Data is a relative topic for most industries secure their place in the market by squeezing out competition. Halting technological innovations and breakthroughs will be an important repercussion of this type of action. The emergence of cyber crime poses a great threat to the progress of the big data industry. Customers should have complete faith in the ability of companies dealing in big data to protect their private information from misuse by hackers. Press releases about security breaches and stolen information, such as in the case of credit cards, certainly don’t help the cause especially given the fact that the dominant companies in the market, such as IBM, Sony, and Apple are also not immune to this type of risk. As the...
5 Pages(1250 words)Research Paper

Cyber Security

...Insert Introduction The world today is more interconnected than ever before. As many people become more dependent on modern technology, there has equally been an emergence of vulnerability to cyber attack such as security breaches, spear phishing and social media fraud. With all its advantages, increased connectivity means increased risk incidences involving theft, abuse and fraud. Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of technologies, processes and practices designed to protect...
1 Pages(250 words)Essay

Cyber Security

...Cyber Security Cyber Security Today, business and personal operations depend on computers and technology. With the innovation of internet and high levels of computer programming, organizations are dependent on computer programs to make their operation smoother, less time-consuming and error free. Various services like banking and finance, personal investment, clothing stores or any other electronic or non-electronic products access consumer by simply logging on to the internet. US President Barack Obama in mentioned in a speech “Technology is reshaping every aspect of our lives, and protecting our digital infrastructure from cyber threats is one of our highest security priorities” (Martin, 2013). With the development of science... and...
10 Pages(2500 words)Term Paper

Cyber Security

...Cyber Security Cyber Security There is a pressing need for organization’s antivirus policy to specify that anti-virus be configuredin a way that they quarantine files infected with viruses rather than automatically deleting them. Deleting the infected files often lead to non-functioning of the application or operating system, an aspect that can temporarily paralyze operations of a business. This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort to. Furthermore, some antivirus applications identify certain types of files as infected while...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Cyber Security and Startups for FREE!

Contact Us