Friday, May 3, 2019
Cyber attack why and how Research Paper Example | Topics and Well Written Essays - 1750 words - 1
Cyber attack why and how - Research Paper Exampleernet governance is subjected to various political and economic difficulties along with need of opportunities for assessing several(predicate) regulatory policies (Shackelford, 2014, p.3). Those who engage in cyber attacks are taking advantage of the fact that any kind of cyber security measures is far from foolproof. It is possible to exert attack on any secured computer network providing the attacker has the beat and resources. This paper will focus on the reasons and process of cyber attacks.Human beings are today increasingly beseeming dependent on the Internet with purposes as varied as basic browsing for garnering information to contrast and monetary transactions. This has no doubt emphasized the expanse of cyberspace and with it enhanced cyber security against potential cyber threats which has been exposit as criminal acts committed using electronic communications networks and information systems or against such networks and systems (Lagazio et al., 2014, p.59). at that place are typically three categories of cyber attacks. First, unauthorized intrusions which means the attacker enters another computer system by hacking techniques. Second, viruses or worms that can be transmitted through emails in order to disrupt or strike down all data in another computer. Third is denial of service attacks which destroys the functionality of another computer by inundating it with communications (Howitt & Pangi, 2003, p.221). The ubiquity of the Internet has opened avenues for criminals to execute cyber crimes and use cyber space as their criminal den. When organizations and individuals run their personal and business activities on the Internet, they remain unaware that the like cyber space is also becoming drive for criminals to base their cyber attacks. Although this is an indisputable fact that cyber space needs to be protected from such criminals, it is at the same time true that computer engineers have y et to fully comprehend the extent of cyber crime and its consequences. This lack
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.