Saturday, June 15, 2019

Cyber attack why and how Research Paper Example | Topics and Well Written Essays - 1750 words - 1

Cyber attack why and how - Research Paper Exampleernet governance is subjected to various political and economic difficulties along with lack of opportunities for assessing different regulatory policies (Shackelford, 2014, p.3). Those who engage in cyber attacks are taking advantage of the fact that any kind of cyber security is farthermost from foolproof. It is possible to exert attack on any secured computer network providing the attacker has the time and resources. This paper will focus on the reasons and process of cyber attacks. piece beings are today increasingly becoming dependent on the Internet with purposes as varied as basic browsing for garnering information to business and financial transactions. This has no doubt emphasized the expanse of cyberspace and with it enhanced cyber security against potential cyber threats which has been described as criminal acts committed using electronic communications networks and information systems or against such networks and systems (Lagazio et al., 2014, p.59). There are typically three categories of cyber attacks. First, unauthorized intrusions which means the attacker enters another computer system by hacking techniques. Second, viruses or worms that can be transmitted through emails in order to disrupt or delete all data in another computer. Third is defence reaction of service attacks which destroys the functionality of another computer by inundating it with communications (Howitt & Pangi, 2003, p.221). The ubiquity of the Internet has opened avenues for criminals to execute cyber crimes and use cyber space as their criminal den. When organizations and individuals perform their personalized and business activities on the Internet, they remain unaware that the same cyber space is also becoming grounds for criminals to base their cyber attacks. Although this is an indisputable fact that cyber space needs to be protected from such criminals, it is at the same time true that computer engineers have yet to fu lly comprehend the extent of cyber crime and its consequences. This lack

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.