StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Consequences of Attacks via Cyberspace - Essay Example

Cite this document
Summary
Fifteen years ago the economist, Stephen Polasky (1992), identified information as one of the most valuable commodities known to man. Information, as he argued, was coveted both because of its tangible and intangible value, because of its financial and non financial rewards…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
Consequences of Attacks via Cyberspace
Read Text Preview

Extract of sample "Consequences of Attacks via Cyberspace"

Download file to see previous pages

The consequences of unauthorized access, on the one hand, and the tampering with information, on the other, are enormous, whether accessed in terms of its impact upon individuals, corporate entities or the economy as a whole (Sturdevant, 2005). Indeed, a considerable of the potential consequences of the unauthorised violation of information, or of cyberattacks, highlights the aforementioned. Much has been written about the consequences of cyberattacks and the extent to which the theft, unauthorized access or tampering with information has the potential to wreak havoc upon individual lives, companies and economies.

In explaining this, Schwartau (1994) identified three levels of information warfare, each of which had its own unique characteristics, targets and, naturally, consequences. The first level, referred to by Schwartau (1994) as interpersonal Attacks,' focuses on identity theft, both of individuals and of corporations. The successful theft of identity, entailing the gathering of personal/corporate information and records, allows the identity thief to pose as the person/entity in question. Through possession of information such a credit history, driving records, medical files/history and accounts, the identity thief can proceed to harass the entity/person in question and assassinate his/her character or corporate reputation (Schwartau, 1994).

While interpersonal attacks, primarily limited to identity threat, are classified as the first level of information warfare, the harm done to victims can take years and substantial amounts of money to repair. As Block (2007) reports, official crime statistics indicate that approximately 5% of all American adults have been victimized and, as a consequence, have witnessed both the destruction of their credit history and, in many instances, their reputation. On the corporate level, however, identity theft may be identified as a serious annoyance more than a problem insofar as the theft of corporate identity is much more difficult than the theft of individual identity and much easier to disprove.

That does not mean to imply that it is not problematic or that it does not expose the entity in question to both financial loss and negative publicity but only that its consequences are much more containable than those which result from one of the other two levels of information warfare.Within the context of level two information warfare, referred to by Schwartau (1994) as InfoWar, the consequences are infinitely more serious and substantially more costly. InfoWar, as defined by Schwartau (1994), involves sabotage, the theft of company records, including client and subscriber lists, and industrial espionage.

A not uncommon scenario can involve the theft of client and subscriber lists and their subsequent selling to a competitor. In order to highlight the magnitude of the consequences of this act of InfoWar, Gold (2001) discusses the consequences of InfoWar in relation to Encyclopedia Britannica, which was subjected to such a cyberattack incident approximately ten years ago. Its database, containing the names of 3,000,000 subscribers was stolen and sold to a competitor. That database, considered the company's most valuable asset, was conservatively estimated at $1,000,000.

Needless to say, the company lost tens of thousands of subscribers, not to mention the financial loss it incurred (Gold, 2001).InfoWar is not,

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/miscellaneous/1503953-consequences-of-attacks-via-cyberspace
(Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words)
Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/miscellaneous/1503953-consequences-of-attacks-via-cyberspace.
“Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1503953-consequences-of-attacks-via-cyberspace.
  • Cited: 0 times

CHECK THESE SAMPLES OF Consequences of Attacks via Cyberspace

The National strategy of the USA

The strategies include: Defeating terrorism globally After the September 9/11, terrorism attacks the United States has made significant steps in ensuring the safety of the nation.... Homeland Security Strategies (Name) (University) (Course) (Tutor) (Date) Introduction In the wake of the 21st century, the United States is faced with a wide range of complex challenges that are related to national security....
8 Pages (2000 words) Research Paper

Discuss some of the treats that Cyberterrorism pose. How can cyberattacks be prevented

Terrorists harvest money and indulge in other criminal objectives via computer technology.... They utilize the internet to share novel methods to employ in their future attacks and other important information.... This technology has been evolving continuously and computers have become ubiquitous....
11 Pages (2750 words) Essay

Security of Big Data

When deploying their own certificate, which is a better solution, organizations are extra cautious of these elements to protect themselves against these attacks.... Domain AttacksOne of the worst vulnerabilities for user domains is insider attacks.... Insider attacks occur.... Insider attacks occur when one user domain gains more privilege than the other user and shares that information.... Inside attacks can be vast and potent depending on the type of attack....
8 Pages (2000 words) Case Study

The importance of Ethics to Sustainable Growth in Engineering Enterprise

Based on the previous research, it had been anticipated that the future attacks and threats would be characterized by a combination malware with strong cartography.... In the last couple of years, there has been the emergence of a new form of malware in the cyber spaces and it has put organizations at increased risk of suffering attacks.... Haimes (2003) notes that organizations have been forced to invest heavily in security measures so as to mitigate the impact of such In the instances where security measures are inadequate, the consequences are usually catastrophic....
5 Pages (1250 words) Essay

Technological Disasters

A disaster is defined as the occurrence of an event as a result of in part or totally to human error, intent, or failure in man-made systems leading to deaths, injuries, damages to… According to a view shared by Wang, Iannotti, and Nansel (2009), cyberbullying entails the use of text messages, emails, embarrassing videos, pictures, or fake profiles, and rumors sent via the Internet....
4 Pages (1000 words) Annotated Bibliography

Political and Legal Influences of Cyber Wars

From the work "Political and Legal Influences of Cyber Wars", it is clear that cyberwar has been an issue in most nations since the advent of internet technology.... Legal and political issues have been some of the issues considered to fuel cyberwar.... hellip; However, there has been inadequate research and sensitization on the forces behind internet usage....
6 Pages (1500 words) Essay

Treatise on International Criminal Law

In a civilian setting, the term simply implies the availability of information or the exchange of such information via computer networks.... The researcher of the following paper states that in both civilian and military applications, the term computer network operation has been extensively used....
13 Pages (3250 words) Coursework

Network Security in the Organization

Connect via LAN ServerThis approach requires the user to install on his/her PC a network adopter card and Open datalink Interface (ODI) or Network Driver Interface Specification (NDIS) packet drivers.... onnect via SLIP/PPPThis approach requires a modem and the TCP/IP protocol software plus serial line Internet protocol (SLIP) or point-to-point protocol (PPP) software.... onnect via Dell Service ProviderThis approach requires nothing more than what is required to connect to any of the on-line information services – a modem, standard communications software, and an online information service account like ours'....
10 Pages (2500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us