Hello,Looking for someone who can review this paper and even supply a "turnitin" report to make sure that the originailty is under 25%, (without actually submitting my paper to turnitin). This paper i

COMBATING CYBER- ATTACKS 27

Name:

Institution:

Course:

Date:

Combating Cyber Insecurity

Introduction

Terrorists are taking a new trend on how they conduct their activities. The traditional methods of attack and theft are no longer having any use since they have started using the internet largely. While the internet can be used for benefiting people and companies, it can also be used to destroy them. In fact, there are a hundred and one risks associated with cyber and internet use. It should be noted that computer specialists have tried their best in laying the strategies that can curb cyber insecurity, but this does not mean that cyber terrorists are resting. The cyber criminals too are working ups and downs in order to get adjusted into the system.

This brings a balance between the two forces and a need for specialists to work an extra mile in order to ensure that they are able to combat cyber insecurity (Pitts, 2017). If they do not do this, there is a probability that cyber criminals will get the good of the country; not only companies and organizations but even the government and homes. This brings to mind the question that is so complicated although it is very simple to ask: what they might do next? This is a sort of question that evokes feelings of fear which also leads to the computer specialists to take strict measure sin trying to curb and combat cyber insecurity.

Risks associated with cyber insecurity

There are far many problems and risks that are associated with cyber insecurity. In the first place, the rate of theft is growing and companies as well as organizations are losing so much. Theft comes in form of hacking and fraud. In the current years, the companies that have been hacked were growing by number. For instance in 2012, LinkedIn was hacked and 6.5 million accounts had been hacked. By the year 2016, 117 million accounts had been hacked and their passwords as well as their names had been sold. In December 2013, target’s 110 million customer and personal financial information was exposed and this led to the resignation of CEO Gregg Steinhafel because he was part of the fallout that resulted from the massive breach.

In 2014, JPMorgan Chase’s servers were hacked and data was stolen from them. It is estimated that millions of bank accounts were opened to stela cash amounting to $100 million. Home Depot was hijacked in the same year and $179 million worth of cash was stolen. Sony was also hacked in the same year with hackers who were believed to be associated worth North Korea through the servers of Sony Pictures Entertainment. Hilton Hotels was hacked in 2015 together with Law Firms and in 2016 by hackers who are believed to be Chinese who accessed email accounts of the firm. Swift followed in 2016 together with Tesco (Ulsch, 2014). Chipotle was next in 2017 and many more others. In fact, the list is endless.

Hackers have stolen a lot of cash that could be used in developing the nation in a number of ways. It is also important to note that some of these companies have been totally failed since too much cash has been stolen from them. In a situation where a company loses more than $500 million in theft is a sure downfall and it is thus one of the risks of cyber insecurity. In case this situation is not handled, so many companies both private and public and other organizations will end up closed because they will lack cash to run their activities. All the cash will be going to the hackers and hijackers.

Government hacking can lead to loss of direction. More than once, the hackers have hacked government systems thus disabling governance. There is no way that tasks can be carried out if the system is not working. In most cases, the hackers could be aiming at something when they hack the government system. For instance, it has been researched that when the terrorists are planning to attack a given place, they disable the system so that the defense will not be aware of them. This is affecting the performance of the government and especially the dense system.

Terrorism activities are also enabled through cyber insecurity. Through the use of the internet, it is clear that terrorism is made possible through the internet. Countries such as North Korea and China are accessing the information of the U.S and other nations by use of the cyber; after which they attack them. It is believed that in the recent and future time, terrorists will not hit any place without the use of the internet. This is one reason why people should be very careful about their accounts, emails and passwords among other items that can be leading to the terrorists.

There is also the risk of ransomware through the internet. This is a situation in which hackers hack the computer system that in infects. There is evidence that this malware uses a very sophisticated technology in carrying out its services. There are ransomware variants that are able to evade the security ware that is normally installed and get rid access to the cloud- based storage solutions like Dropbox, one drive as well as Google Drive (Amoroso, 2015). This malware will then affect the data of the user such that the credentials of the logged- on user will be affected. This malware can hack mobile devices and cloud-backed data.

When the user of the system is that are hacked try to access, they find that they are needed to pay ransom in order to be given access to their cloud storage that can enable them to restore their data. The hackers will not release the data of these victims until they get ransom. This is also another form of theft although it comes in a different way; it too involves taking someone’s cash without working for it and without getting it from the person legally.

In some instances, hackers are just happy when they disable systems and they cause pain to people. For example, hackers can disable health care systems so that services are stopped. They are just happy when other people suffer since they have the spirit if terrorists. In other times, they may hack the education systems when there are exams, so that students miss their exams. All these can be counted on hacking directed towards bringing pain to the society. This is also one of the main aims of hackers and terrorists especially when they have revenge attitudes.

Physical theft is also an aim of cyber insecurity. There are times when the whole system in a company or organization is infected with viruses and malware such that they cannot work. This is also a big warning that the attackers will be sending that they may hit any time to steal the computers and laptops and any other expensive machine they may avail. It the recent times, the use of internet has been used as a true warning of upcoming threats.

Measures taken in order to combat cyber insecurity

There are a number of steps that can be taken in order to combat cyber insecurity. The aim of combating cyber insecurity is to increase safety of the people, the government and that of companies and organization. There are three levels from which cyber insecurity can be handled:

  1. Prevention which points to how the cyberspace insecurities can be kept from being launched. This level also points to how an attack can be failed before it reaches its final destination so that it does not cause any harm as the attackers had intended.

  2. Management of incident, mitigation of attacks and damage mitigation. This is pointed at lessening the effects that have been caused by cyber insecurity especially when the attacks have reached their targets (Sood & Enbody, 2014). It points at how the defense can get prepared to defend during an attack and how they can defeat the attack without so much loss on the victims who have been attacked. It also points at how the defense can identify and limit the damage that has already been caused by the cyber attackers.

  3. The third level is consequence management which points at what to do next especially when an attack has been conducted.

There are a good number of approaches that can be used in each of the three stages above. All the approaches are aimed at protecting the critical infrastructure of the government, the people, companies and organizations against cyber- attacks. Each approach is a concern on how to lay strategic options and the strategic objectives as well as the tactics that will be used in order to curb this crime. Since the cyber terrorists are learning to use high technologies in attacking by the cyber, it is also important that IT developers come up with unique and distinct strategies that will curb or mitigate the effects caused by this crime.

Prevention strategies

There are many strategies that can be used in blocking the attacks from happening. The strategists try to develop ways that can help prevent attacks before the attackers can hit. In fact, the developers here do not even want to know that the attackers are planning to attack, but they lay general strategies that can prevent any attack from any part of the world or with any intentions. This is a step that is aimed at securing the system from any sort of attack. Cyber- attacks are in a sense prevented because they are thought of as being futile and which can cause a lot of damage it is left to go until the last stage. It is important that cyber security is given a core concern so that strict measures can be drawn on how to prevent it. Some of the prevention strategies include:

  1. Creation of awareness

The first and foremost strategy in cyber space security is creating awareness in the general public on what cyber insecurity is. It is also important to tell people how it works and the effects it can create if it is launched. BY creating awareness, there is a great possibility that people will gain knowledge and insight about the dangers of cyber space insecurity and hence, they will engage in prevention strategies. Creating awareness will not only be at the company and organization level but also in the general public. This is because it can also affect individuals and private enterprises (Shackelford, 2014). Thus, creation of awareness in all the masses will enable bring to light the plight of cyber- insecurity and what entails.

Creating awareness will also enable the people to be ready to face the crime. For instance, if people are aware of this sort of crime, it is possible that people will create passwords that are more complicated and which can enable their systems to be secure. In addition, the people will try to install spyware and other security systems that will ensure that the security of their systems is guaranteed. When they take action, they could have prevented any given attack on their systems because the attackers will not avail their email accounts or for that matter; any sort of data from their systems. The attackers will not be able to manipulate their systems in any manner.

  1. Offering training services

Training is very important in an environment where the terrorists are also getting more and more knowledge. By offering training services to the people, they are equipped with more insight about the problem and hence enabling them to get solutions. For instance, through training, it is possible that the professionals are able to come up with better strategies that can help overcome the problem. Training also enables the professionals to know which angle to use in dealing with such problems. In the recent times, there are many security measures that have been given by IT specialists that can be used in preventing cyber – attacks.

For instance, when using passwords, the professionals make it very complex by mixing letters and numbers, mixing small and capital letters and other symbols. This will not allow the attackers to predict the passwords of their systems. There is no way they can attack any system if they do not have the system passwords and accounts. Training will help the trainees to identify easily with any internal and external risks in the email boxes as well as across the internet. In fact, this can reduce the risk of people who walk into phishing schemes and malware attacks.

Trainings should also extend to informing the employees not to be clicking on phishing email links because these may be the tricks used by hackers (Pitts, 2017). The mails can only be clicked into if the sender is known to the company or to the individual who is using the system. In addition, employees should know how the spyware and firewall systems work such that when they are given a warning, they can actively respond to it as appropriate as possible.

There are some cases reported of firewall or spyware giving messages on threats but companies and organizations ignoring them only to be hacked very soon. It should be clearly understood to the employees that there is no message that should be ignored from the spyware and the firewalls because these are installed security monitors in a system and any message they give is important and should be handled with maximum concern; maybe by signaling the cyber experts to try and find out about the warning.

  1. Vetting partners in companies and organizations

In fact, partners and stakeholders may be given access to the organization’s network servers. For instance, potential customers or investors may be given access to the company’s network housing. This network housing may have lots of important data that can endanger the company if it is exposed. In some situations, there could be people who may pretend to be potential customers but their main aim is to get access to the company’s network system. This can be evidenced by what had happened to Target and Home Depot in 2013 and 2014 respectively.

It is very essential that before a company or organization discloses important information such as passwords to its third party stakeholders, it should be well investigated and well understood on what their intentions are and their views about cyber security. Sharing such information can also help companies to come up with a concrete plan on how they can handle any misfortunes related to cyber -attacks. One thing that company management and administration needs to be sure of before sharing any important information about their systems is total trust from their stakeholders no matter how close or far they are.

It is very possible that companies and organizations will overcome any cyber insecurity; but it is important that all stakeholders from the private sectors, public sectors and the government to come together in order to design ways they can use in combating cyber insecurity. All these and other partners such as non- governmental organizations can be stakeholders in this problem and their contributions in whatever manner will be very helpful to ending this cyber- crime that is growing so fast.

  1. Laying a plan for off-site workers

It should be noted that some workers may pose a threat to the company’s security. This is normally true in companies that have given their passwords and emails to so many workers even those who are not working in the company. Some of the workers could be working from their homes and others will be distant workers (Sood & Enbody, 2014). No one will be quite sure about what the workers are doing when they are not in the company. Even when they are working in the company, there are some workers who may be working with other digitalized gadgets such as USBs, Flashes and others that are able of collecting and storing large amounts of information from the company system.

It is as such important that the company administration evaluates mobile device management and the way workers use their electronic gadgets. In an effort to do so, a company can decide to employ multi-level verification in the procedures and requirements of mobile use in the company as well as the use of other electronic gadgets. When this is done, the company should then work hard to ensure that it is only the authorized people who have access to the company’s system. This can be very helpful in preventing internal threats and workers who can manipulate company information and selling it out for their own benefits.

Even the internal workers too can be a threat to the company. In a way, the company management should make rules about administration clear. It can be easier to track a person who has manipulated the system when there are few employees working with the system than when the whole company has access to the company system passwords. The company could only give access to the people who are leaders in a way and who have higher offices. Otherwise, the other employees should be prevented from entering the administration offices.

It is up to the company management to have a given office for all the other workers. Other passwords that are not leading to important company data can be created and given to these other workers while the important data only by the management. This can be a better way of handling workers so that they do not feel excluded from company activities at the same time taking care of the company’s important data.

  1. Remaining up- to- date and get educated on the current cyber information

The company has to set the time limit for editing the cyber security information. It can be annually, two times a year or even less. These intervals will be aimed at helping the company to learn new cyber threats and the threats that are mostly used in the moment (Shackelford, 2014). This can help companies to know which preventive measures they will take in order to prevent an attack from happening. For instance, McAfee Labs is an agency that produces a Threat Prediction Report annually and this helps the company to know which direction the attackers are taking and what strategies they can lay in order to prevent the attacks from being launched. The information is also very important because it can help IT professionals to bridge the gap that is widening between the hackers of cyber space and the IT professionals that is also thought to be widening. Therefore, it is safe to be updated and to maintain the security solutions.

  1. Hiring a cyber expert

Cyber experts are people who better understand the knowledge about cyber security better than any other employee. They are trained specifically on the cyber issues and their only responsibility will be to ensure that the company is protected. This means that every morning they wake up, their tasks will be to check whether the company is secure and whether there are any threats that can be handled. It can be very easy to detect early signs of a cyber threat when the company is alert and cyber insecurity can easily be prevented. This is because many companies are hacked not because they do not have security measures, but because they did not read any early warnings.

With cyber experts permanently in the company and regular outside cyber experts who are invited to check if everything is in order, it is possible that the company in insured of any cyber threat. However, it should be noted that when external cyber experts are invited to the company, there is a big need to have their trust first before giving them the company passwords. These cyber experts can be a big threat to the company since they may manipulate the system with the passwords given (Popoola, 2015). Thus, it can be important that immediately after an external cyber expert has been given the passwords and they are sure that there is no threat to the company, the company will change the passwords. Even so, the company should not depend on these external cyber securities because with time, they may learn the trend used by the company when creating their passwords and therefore, prediction will be easy.

  1. Creation of complex passwords

Passwords are the locks and keys to company information. In one way or the other, they are the ones that can either give or deny access to the system. If a hacker does not have the system password, it is not easy for them to manipulate that system because they will be locked outside. Just like a house, an individual or company needs to have a strong lock that one will struggle with in order to open; especially if that individual is not part of the family. Security passwords need to be the same. When creating passwords, they should be made as complex as possible such that one will not predict them easily. For instance, passwords can be made of letters that are mixed with symbols and numerals and other unique characters. The letters can be mixed with small and capitals and should be as confusing as possible. It should also be long and complex.

This is to ensure that one will not easily predict it and at the end, it is the company that will be protected. In addition, passwords need to be changed from time to time (Popoola, 2015). It should be noted that no one knows what will be going on behind the office hours with the employees. Having their trust is important but there are some who may like to exchange the company information for large sums of cash.in order to avoid this, passwords to special data such as finance should only be given to the top two or three leaders in the company such that in case of anything, they will be questioned.

Otherwise, with technology increasing day and after day, companies can use locks that are not letters but can manipulate their signatures into electronic cards that can be flown on top of a machine to give access to the system. This will be the only super security that can end all these problems. After all, no one will go home with this machine and no hacker really comes to the office to steal the card. This is one technology that the technology experts should struggle to come up with because it will offer a total insured solution to cyber threats.

  1. Addition of a cyber blanket

With so many threats on cyber and internet, it is high time companies seek to get back up from companies that are more able. Just like any insurance plan, a company can decide to insure themselves from cyber threats. This means that the company will be paying small premiums and if they are hit with such a calamity as cyber hacking, the insurance company will be able to fund it to close the gap that the hackers close. This will be so functional owing to the fact that most companies have subscribed to online commerce to get access to many customers.

This puts them at a higher risk of being hacked than when they are simply working from their storehouses. Insurance will ensure that the company does not get a total loss when an attack has occurred but that it is covered (Sood & Enbody, 2014). According to Willie Sutton’s message, money is in the companies that make it and the internet age is witnessing an expanded and dramatic criminal conduct in the internet that is in form of fraud, theft and espionage. The banks, stage coaches, trains and private businesses are the central focus of the cyber criminals and these are the organizations that need to get insured since they will not be aware when and where the hackers will shoot next.

Incident management, mitigation of attacks and damage limitation

It is important that in this stage, businesses offer indications and warnings that an attack is taking place. Although some companies that have been hacked indicate that it is hard to know that hacking has taken place, it can be detected because the email addresses will be blocked and the company administration will not be able to login in. this is one sign that is supposed to warn a company that there has been an attack. When a warning has been sent that there is an attack, the company can try to prevent penetration of the system that is at risk from the outside erecting barriers and hardening the security to the interior of the system.

However, it is good to note that detection will be difficult given the prone and false positives during the early stages of any given attack before the real damage has not been reached. The criminals are aware that if they are much exposed, they may not be able to get what they want. So they may stay at hiding for as long as they have got their goals. While passwords are the oldest security techniques, there are most recent ones can be the use of firewalls and proxy servers. This does not mean that these are not defeated by criminals, but they offer better security than the passwords.

They also offer quite a strong defense and protect the system from attempted attacks. When using physical protection techniques, it is very important to consider penetration attempts in order to isolate the system (Sood & Enbody, 2014). For instance, there can be attacks on electronics by the use of electromagnetic pulses, attempts to cut cable endings and others and their protection can range from installation of fences and biometrics.

Immediately the company has warnings of external attacks, there is an immediate need for internal compartmentalization as well as containment. This will be aimed at limiting penetration to the internal system where important data is stored and thus limiting damage, protecting and gathering information that will help in the response system and protection of the surviving assets. In order to protect the internal system after an external attack, the company will create internal barriers and cyber barriers. This can also an effort aiming at need- to- know access controls of the system, the intrusion tolerance schemes, the maintenance of protected redundancies, hiding assets and setting up decoys. All these strategies are enabled with static of the pre-positioned and unchanging as well as dynamic variants.

It is also very important to ensure that automatic or the partial shutdown and relocation of the system is made. A normal system that has signals of an attack will erect internal barriers that will be intolerable during normal operations so that it can set apart the parts of the system that have been tampered with. The system can also load –shed to relocate surviving capabilities to the core functions needed by the organization. That can be a real- time reconfiguration as well as reassignment under given rapid degradation.

There is a core need to pay attention to the preserving and data collection in any attack. This can easily be achieved through back- up plans as well as audit. The first step here is to get a recent pre- attack state that can be used to effectively recover and allow the system to resume its operations. This can be made even easier when a given attack has a starting time and back-ups are made in a regular interval. It can also be easier if the company or organization has a redundant shadow system. It is noted that internal attacks are in most cases very slow- building and they offer a more difficult challenge when it comes to identification of a state where the system has been compromised, especially when the system is free from inserted malicious code.

This is the reason why strong and regular auditing are very essential because they will aid in identifying when an attack started and can also help get data that can help in the identification as well as the apprehension of the attacker. It can also offer the company or organization with a better defense for similar future attacks; enabling the company management to formulate and establish strong security policies and response plans that will be a wall against future attacks. The comprehensive plan should be made to cover all the possible identifiable risks to the organization and have a defense system that covers all these risks (Amoroso, 2015). Even when there are many identified risks of attacks, the company should be given special attention to the insider attacks. This is because this is where the heart of the company lies and when insider attacks take place, the company losses so much that it may even come down.

The staff members in any company and organization should be told in advance who to call and who to inform when they sense that help is needed. Using exercises can be a better tool to train the employees and make them ready to face these attacks. In most private systems especially those that are owned by individuals, the high cost of fire drills and their disruptive nature makes the individuals not to use them. This is added to the fact that the fire drills are delicate making the individuals have constant fear of being attacked.

It is however important to note that all the approaches that are being discussed do not form 100% risk protection, but they can be of ultimate importance if they are all incorporated since they can form a multifaceted defense approach and can offer security to a company from cyber- attacks. Some security systems such as the DC/SCADA have given specific challenges. In the first place, they are very small and self- contained and has many requirements. This means that they may not offer security at all times due to power needs, lack of space and other real time problems. In fact, there could be times when security measures can lead to reduced performance and challenge sin synchronization of other system processes. Since they have high costs. So many private businesses may also lack a financial way of securing them hence, putting their businesses at risk.

Looking at counter terrorism, one can think that attacking physical targets through the control and management systems will lead to massive damage, mass casualties and fear as well as lack of confidence. Most systems have a high risk of being tampered with especially on their control signals by insiders. This is where cyber terrorists pose a real- time concern. Activities in this stage are called terminal defense or passive defense since it is owned by the private business owners. Cybercrime can pose far- reaching long –term effects apart from just stealing cash and data.

These can range from loss of personal property, credit outstanding and loss of personal resources among others. While cybercrime is a big threat to businesses and governments, it is estimated that a total of 80% of the total attacks is a result of lack of protective measures by the company. Only 20% of the total attacks are as a result of sophisticated and advanced people. This is why before coming to the mitigation story, the preventive story should be very strong and business stakeholders ensuing that there is not a small gap left for the attackers to penetrate and take what we have worked for so long. In most recent studies, there are indications that criminals are at a better chance of winning since economics favor them (Pitts, 2017). One can just imagine a single individual who is able to havoc on so many individuals and companies with the least cost and with the least risk of being caught. This can be a very sophisticated cyber expert.



Implementation of a response plan

In matters of national economy and national security, it is very important that a National Cyber Incident Response Plan be established. This national response plan should include all the stakeholders in matters of health. It should start with the government going down to the public sectors such as public companies and organizations, the private sector, the defense system and even individuals and the public at large all have a role to play in the establishment of a cyber security response plan. In fact, the nature and the risks of cyber – attacks are unique and very unpredictable. In presenting a sustainability of security system the roles should be distributed to all the stakeholders (Pitts, 2017). The strategy that should be used should be integrated with a framework by operational playbooks across all the areas.

In the response plan, it is very important that a coherent, coordinated and a collaborative approach is used so that all the stakeholders get to participate equally ensuring that attacks are totally reduced or that their effects are mitigated. People should not just look up to the government to give the solution to the cyber insecurity challenges. Everyone should be aware that he or she has a big role in security cyber environment. The response should also be a trusted partnership that is based on mutual respect as well as an engagement, responsibility and that recognizes that tasks will be carried out in a joint and integrated manner so as to reach common goals and objectives. This will start with the internet devices that are on our hands and houses. Ensuring that they are totally secured from cyber- attacks is the first step and contribution towards ending cyber - attacks.

One thing that needs to be noted is that cyber security is not a fight with some thieves who are hiding in a nearby bush but with people who have brains and who are sophisticated. They too understand technology better. In addition, they are too fighting their way so that they can get better strategies that can be used in order to continue stealing the big money that they get. Thus, combining effort is important in order to come up with one solid and concrete solution that will bring the long story of cyber terrorism to a stop.

Consequence Management

This is a defense stage that can be divided into two; recovery and response. In recovery, IT assets are reconstituted to enable the organization is enabled to work almost as normal as it used to do before it was attacked. It can be defined as a passive form of defense. On the other hand, it can be used to help the organization to get future defense against any cyber- attack. This stage of defense will be engaged with removing and shutting down harsh defective entities. It is also involve assessment of damages that were caused during the attack; what assets have been broken, altered or even changed. It is also aimed at prioritizing functions that need to be reconstituted, automation and semi-automation procedures for making assessments, quickly and efficiently reallocating as well as rationing whatever has been left (Amoroso, 2015).

Other responses that will be required are:

  1. Getting the culprits who committed the crime, getting them arrested. This needs strong forms of clear and accurate forensic tools such as finger- printing.

  2. Retaliation measures; these are the legal principles that are applicable and proportional to the kind of crime the culprit is found committing.

  3. Escalation; this is rating the damages caused in order to make a decision on what step to take next.

  4. Asymmetries; this is making a decision about what to do concerning the attackers who have few IT assets.

Conclusion

Dealing with cyber security is very subtle and it needs sophisticated knowledge. There is also a need to combine effort so that the task can be much simpler. It may not take one year- two years or a specific amount of time but ultimately, it come to a stop. Cyber professionals are doing a lot in ensuring that they come up with a strategy that can be used in dealing and providing a solution to the cyber threats and crime. There are many measures that can be used to combat cyber- attacks; preventive, management and maintenance strategies. One thing that is very important is that all people should come together and understand that they each have a role to play in making the long journey a success. All of us have a role to play.









References

Amoroso, E. G. (2015). Cyber Attacks: Protecting National Infrastructure. Elsevier, 2015.

Amoroso is specifically handling the challenge of national infrastructure. To him, cyber-terrorism has led to many challenges that are related to destruction of the national economy. Controlling and managing cyber threats can lead to a more developed culture and a stable governance system.

Pitts, V. (2017). Cyber Crimes: History of World's Worst Cyber Attacks. Vij Books India Pvt Ltd, 2017.

Pitts follows the history of cyber- crimes and the cyber-criminals who have been in history. It is a way of teaching the current businesses to learn from the past mistakes so that they can get defense against cyber- attacks.

Popoola, D. M. (2015). Nightingale Online Praxis and Prevention of Cyber Attacks. Trafford Publishing, 2015.

Popoola talks about online attacks and how they can affect businesses. According to Popoola, the best strategies that can be used to prevent cyber threats is preventive. They help do away with cyber- attacks.

Shackelford, S. J. (2014). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace. Cambridge University Press, 2014.

This source handles the cyber- crimes that have been handled in the criminal courts, where the crimes happened and the judgment that the criminals were given. It is aimed at bringing to light the methods and strategies that cyber criminals use so that the others can learn from them.

Sood, A., & Enbody, R. (2014). Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware. Elsevier Science, 2014.

These authors handle the companies that are targeted by cyber - attackers and the reasons why they are targeted. This is a strict warning that strict and strong cyber security walls need to be built in order to prevent the attacks from being installed.

Ulsch, M. (2014). Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks. Wiley, 2014.

This source comes as a warning to create awareness that cyber- attacks are real and they can come when they are least expected. The best thing to do is to get secured so that the company or organization is at the safe side.



Bottom of Form