Answered You can hire a professional tutor to get the answer.
Hello, I am looking for someone to write an essay on Cyber Attacks and Security. It needs to be at least 1000 words.Download file to see previous pages... This type of cyber attack constitutes the ins
Hello, I am looking for someone to write an essay on Cyber Attacks and Security. It needs to be at least 1000 words.
Download file to see previous pages...This type of cyber attack constitutes the insertion of a computer virus into the end user’s computer, which will ensure that the information used and stored by the user is monitored. This privacy violation is usually perpetrated with the use of spyware, which is usually undetectable by the end-user of the computer. The spyware is downloaded into the user’s system without express knowledge or authorization, and is later used to gather information about the user. Even though this type of attack is not usually malicious, it is used to gather information about the user. information that is then transmitted to the perpetrator. The main aim of this cyber attack is two-fold. monitoring the general movements and procedures of the intended victim, and copying and transmitting information about the user to the perpetrator. The main benefit derived is usually financial, since the information can be used to access financial data and storage, or can be used by a rival organization to gather product or financial information about another competitor. The second constituent of cyber attack is usually malicious and intended to cause harm to the targeted victim (Lipson, 2002). For example, the perpetrator of this cyber attack can sue a virus that disable the usability of a computer in a network or the network in its entirety. In this case, a computer virus is introduced via an existing network, and contrary to the first example, is used to disrupt the working of the computer. This can be done through continued spamming of the user, or by causing a crash or denial of service to the user. The usual result of this type of cyber attack is the denial of service to the user, possible loss of time and earnings, and the disruption of normal working procedures by the affected person. The third and worst form of cyber attacks is when it is used by conventional terrorists to achieve their means, for example, when the Internet is used to disrupt the functioning of a country’s systems (BNAC, 2007). This is usually done through the disruption of the provision of public services, for example, the use of cyber crime to disrupt the functioning of a power grid. This means that online terrorists use the Internet to weaken the infrastructure of a country by stopping or disrupting the provision of normal services. In this case, a country can be severely weakened if terrorists use a series of attacks to disrupt key parts of the economy, for example, disabling electricity provision, water provision, and the coordination of health systems (Cashell, Jackson, Jickling, and Webel, 2004). Even though these kinds of attacks are rare, countries have taken a number of steps to ensure that they never happen, since it leads to a possibility of completely weakening state systems. In the recent past, there has been an increased call for the government to respond to cyber attacks targeting the country with conventional weapons. The main reasoning behind these calls is that cyber terrorism qualifies to be called terrorism, and since the government is obligated to prevent terrorism, conventional weapons should be used (GFI, 2011). However, a more reasonable reaction to cyber attacks is based on preventing the future occurrence of the attacks. Many organizations would find it hard to recover from a cyber attack aimed at crippling operations. therefore, it is advisable that these firms avoid the attacks.