Cyber attack why and how - Research Paper Example

Comments (1) Cite this document
Cyber attacks are basically an illegal process of infiltration into computers to extract or destroy data and information. Today, with the ubiquity of the use of Internet in…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Cyber attack why and how
Read TextPreview

Extract of sample "Cyber attack why and how"

Download file to see previous pages ernet governance is subjected to various political and economic difficulties along with lack of opportunities for assessing different regulatory policies (Shackelford, 2014, p.3). Those who engage in cyber attacks are taking advantage of the fact that any kind of cyber security is far from foolproof. It is possible to exert attack on any secured computer network providing the attacker has the time and resources. This paper will focus on the reasons and process of cyber attacks.
Human beings are today increasingly becoming dependent on the Internet with purposes as varied as basic browsing for garnering information to business and monetary transactions. This has no doubt emphasized the expanse of cyberspace and with it enhanced cyber security against potential cyber threats which has been described as “criminal acts committed using electronic communications networks and information systems or against such networks and systems” (Lagazio et al., 2014, p.59). There are typically three categories of cyber attacks. First, unauthorized intrusions which means the attacker enters another computer system by hacking techniques. Second, viruses or worms that can be transmitted through emails in order to disrupt or delete all data in another computer. Third is denial of service attacks which destroys the functionality of another computer by inundating it with communications (Howitt & Pangi, 2003, p.221). The ubiquity of the Internet has opened avenues for criminals to execute cyber crimes and use cyber space as their criminal den. When organizations and individuals perform their personal and business activities on the Internet, they remain unaware that the same cyber space is also becoming grounds for criminals to base their cyber attacks. Although this is an indisputable fact that cyber space needs to be protected from such criminals, it is at the same time true that computer engineers have yet to fully comprehend the extent of cyber crime and its consequences. This lack ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyber attack why and how Research Paper Example | Topics and Well Written Essays - 1750 words - 1”, n.d.)
Cyber attack why and how Research Paper Example | Topics and Well Written Essays - 1750 words - 1. Retrieved from
(Cyber Attack Why and How Research Paper Example | Topics and Well Written Essays - 1750 Words - 1)
Cyber Attack Why and How Research Paper Example | Topics and Well Written Essays - 1750 Words - 1.
“Cyber Attack Why and How Research Paper Example | Topics and Well Written Essays - 1750 Words - 1”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
farrellzachery added comment 10 months ago
Student rated this paper as
The topic of "Cyber attack why and how" was impossible to find. I spent countless hours to find it. Here at StudentShare, I got the finest sample. Many thanks!

CHECK THESE SAMPLES OF Cyber attack why and how

Cyberterrorism, Cyber terrorists and their methods to launch an attack

... terrorism is a combination of cyberspace and terrorism. Often this type of warfare is used to persuade a group or government to follow certain political beliefs. Cyber terrorism can be used to help plan other terrorist activities, soften a target prior to a physical attack and generate more fear and confusion concurrent with other terrorist acts. Cyber terrorism has no boundaries as it is not limited by physical space and can be carried out by anyone and anywhere in the world. This paper aims to provide an explanation of what cyber terrorism is and how it is propagated in information technology world and the impacts it has on the businesses and organisation s that use the internet and networking to carry out their activities... . It is...
10 Pages(2500 words)Research Paper

Cases of cyber attacks

...? Cases of Cyber Attacks Cases of Cyber Attacks The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another. Instead of bullets and guns, critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power. In this paper, a comparison of three cases of cyber terrorism would be discussed to enable people understand the nature, power and threat caused by cyber attacks. Likewise, the governments’ initiatives to response to similar threats in the...
4 Pages(1000 words)Case Study

How Can Diet Prevent Heart Attack

...? How Can Diet Help Prevent Heart Attacks? David Okolie Prof. K. Wolf Writing 303TTT1 26 April The paper aimed to look into the conceptof a healthy diet, it’s essential components, and its impact on heart disease prevention and recovery. Primarily, it highlights the important function of nutrition on preventing heart disease and allowing patients to have chances of recovery from heart-related conditions. Specific examples of foods to avoid and to consume regularly have been provided along with their effects on the levels of cholesterol and blood pressure, thereby identifying their relationships with heart disease. A number of local and international groups that supported cardiovascular health were also...
11 Pages(2750 words)Essay

Cyber Security: Stuxnet Virus Attack

...of the attack did not spark much debate. The uncertainty of the origin of Stuxnet virus presents a bigger picture of how difficult it is to curb cyber terrorism. Siemens had to come up with an antidote for Stuxnet. The technological giant recommended the installation of Microsoft patches as a preventative measure. In addition, users should and restrict the use of USB flash disks of unknown sources. Siemens also advised users of their products to contact the company’s technical team incase a virus infection becomes detected. In addition, users need to use strong and undetectable passwords. Detection of the instigators of malware attacks proves to be a challenging...
4 Pages(1000 words)Research Paper


...the reader wondering whether the cost paid for the cause is worth it. Lives are lost; people are left psychologically disturbed by the effects of recurrent bomb attacks, hostilities and general unrest. Those close to the attackers are left tormented by betrayal and deceit. For Dr. Amin, news of his wife’s involvement with a fanatic group leaves him with a lot of unanswered questions. After the attack, Amin loses his friends, neighbors and political affiliates, who think that he was his wife’s partner and is therefore equally guilty. Truth is, unlike his wife, he was dedicated to setting aside religious differences; and focusing on his career and success. It is disturbing to imagine...
4 Pages(1000 words)Essay

Attack Plan

...? Attack Plan Introduction The modern age of computers, coupled with the increased globalization present throughout society, has certainly simplified life in many regards. In many instances, however, it has opened up vulnerabilities inside organizations that were previously unheard of. In decades past, the theft of information was almost always physical and done from within the organization building itself. The modern age of attacking company and personal information, however, has bought with it criminal activity that has no boundaries. One person thousands of miles away can wreak havoc on an entire company. Computer networks are vulnerable attack and it is wise to consider those weak...
4 Pages(1000 words)Essay

Heart Attack

...Heart attacks in Australia Introduction Heart Attack is technically known as myocardial infarction (Lee, . This is a medical situation where the blood flow is blocked for a long time leading to damage or death of muscles. Myocardial infarction is gaining global attention in terms of the increasing number of cases occurring across the globe. Life style changes including changes in food habits, lack of physical exertion and unscientific routines largely contribute to the increase in the occurrence of myocardial infarction. The statistics on myocardial infarction in Australia are suggesting alarming observations. The objective of this essay is to critically analyze the prevalence of myocardial infarction in Australia. Heart attacks... &...
2 Pages(500 words)Essay

How Does Cyber Bulling Affect Teenagers

...synonymously with electronic bullying or online social cruelty (Eden, Heiman and Olenik-Shemesh 1036). Cyber bullying incorporates a wide range of behaviors such as sending hate, mean or threatening messages to others through emails or text messages; sharing photo-shopped or embarrassing photos of other people through a cell phone or web; spreading rumors about a certain individual and many others. In addition, this form of harassment is commonly practiced in the absence of parents, teachers or even other responsible adults. This paper provides a thoughtful discussion on the how cyberbullying affects the teenagers. Studies confirm that cyber bullying is a common problem that affects...
6 Pages(1500 words)Research Paper

Cyber Security, Cyber Crime and Cyber Forensic

... is not limited to boundaries. Loop holes in information protection results in diverse kind of crimes, ranging from defense to finance. References Santanam, R., &Sethumadhavan, M. (2011).Cyber Security, Cyber Crime and Cyber Forensic: Applications and Perspectives. Idea Group Inc. Print Finklea, K. M., &Theohary, C. A. (2013).Cybercrime: Conceptual Issues for Congress and U. S. Law Enforcement.Congressional Research Service.... Role of Federal Agencies in Fighting Digital Crimes Question 1 TheUnited States of America among other developed countries are facing escalating war against cybercrimes. The safety of the nation on digital basis entirely depends on the competence and devotion of the Federal agencies in the country. The a...
2 Pages(500 words)Assignment


...Cyber Attack Conventional computer security has its base on the taxonomy of security threats such as confidentiality, availability, theft and integrity (Amoroso 4). In the recent past, a new occurrence in the technologically interconnected world related to computer security called cyber attack emerged. Cyber attack refers to the use of computers and the internet to carry out warfare in cyberspace (Schiller 5). Most of people’s daily activities often rely on technological inventions and advancement made up of complex computer networks which form the cyberspace. In the modern society, cyberspace technology, “instrument of power,” has...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Cyber attack why and how for FREE!

Contact Us