Saturday, August 10, 2019

Cyber attack why and how Research Paper Example | Topics and Well Written Essays - 1750 words - 1

Cyber attack why and how - Research Paper Example ernet governance is subjected to various political and economic difficulties along with lack of opportunities for assessing different regulatory policies (Shackelford, 2014, p.3). Those who engage in cyber attacks are taking advantage of the fact that any kind of cyber security is far from foolproof. It is possible to exert attack on any secured computer network providing the attacker has the time and resources. This paper will focus on the reasons and process of cyber attacks. Human beings are today increasingly becoming dependent on the Internet with purposes as varied as basic browsing for garnering information to business and monetary transactions. This has no doubt emphasized the expanse of cyberspace and with it enhanced cyber security against potential cyber threats which has been described as â€Å"criminal acts committed using electronic communications networks and information systems or against such networks and systems† (Lagazio et al., 2014, p.59). There are typically three categories of cyber attacks. First, unauthorized intrusions which means the attacker enters another computer system by hacking techniques. Second, viruses or worms that can be transmitted through emails in order to disrupt or delete all data in another computer. Third is denial of service attacks which destroys the functionality of another computer by inundating it with communications (Howitt & Pangi, 2003, p.221). The ubiquity of the Internet has opened avenues for c riminals to execute cyber crimes and use cyber space as their criminal den. When organizations and individuals perform their personal and business activities on the Internet, they remain unaware that the same cyber space is also becoming grounds for criminals to base their cyber attacks. Although this is an indisputable fact that cyber space needs to be protected from such criminals, it is at the same time true that computer engineers have yet to fully comprehend the extent of cyber crime and its consequences. This lack

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.