StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Attack Issues - Essay Example

Cite this document
Summary
The essay "Cyber Attack Issues" focuses on the critical analysis of the major issues in the problem of a cyber attack. Conventional computer security has its base on the taxonomy of security threats such as confidentiality, availability, theft, and integrity…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Cyber Attack Issues
Read Text Preview

Extract of sample "Cyber Attack Issues"

They are made up of complex computer networks which form cyberspace. In modern society, cyberspace technology, an “instrument of power,” has become more susceptible to a country’s opponents. The opponents may utilize it to attack and disrupt communication and information flow (Schiller, 6).

The major types of cyber attacks include DDoS (Distributed Denial of Service) and using computers hijacked and infected with viruses to target websites (Apps). However, according to Apps, a new type of cyber attack that involves overwhelming data centers and crashing websites has evolved. The attackers are majorly nation-states, criminal gangs, and diehard activists seeking a chance to hit their enemies. Apps further reiterate that the goals of the attackers include political activism, providing data theft distraction, and extortion and some attackers just want to showcase their hacking skills. Prevention of cyber-attacks requires the vulnerable parties to understand the critical assets that need protection and enhance the available security solutions for better detection of possible attacks and real-time response (Shackelford, 267).

Cyberspace vulnerabilities raise tremendously important legal questions. In defining the legal issue, it is vital to know what constitutes an adversarial attack in cyberspace. While there is no clear statement in international law that outlines legally acceptable or unacceptable cyber defensive actions, there are legal principles that establish the right to counter a cyber attack as a valid legal response to acts of aggression (Carr, 278).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CYBER ATTACK Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/law/1649045-cyber-attack
(CYBER ATTACK Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/law/1649045-cyber-attack.
“CYBER ATTACK Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/law/1649045-cyber-attack.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Attack Issues

Political and Legal Influences of Cyber Wars

This is the extent to which legal issues fuel cyber wars.... All these are ways in which legal issues could lead to the rise of cyber warfare.... For example, on June 1, 2012, David Sanger of the New York Times reported that the United States together with Israel had developed the Stuxnet computer worm that was used to attack Iran's uranium enrichment facilities.... Most specifically, the United States and Iran have been enemy states for quite some time due to Iran's links with terrorist activities and this may have been the most probable reason for the attack....
6 Pages (1500 words) Research Paper

Cyber Attacks on America

The 11 September 2011 terrorist attack on the US exposed the vulnerability of the country to foreign attack in a way not witnessed in a long time.... Additionally, Lee (2013) observes the incapacity to protect all computer networks or cell phones or pagers from attack, especially now that 95% of these gadgets are operated and owned by the private sector.... Cyber-attack refers to an attack originated from a computer system against another computer system or a website, aimed at altering, stealing or erasing information or have the functionality of the targeted computer system impeded or destroyed (Lee, 2013)....
10 Pages (2500 words) Literature review

Cyber Attacks in the United States

government has also already designated a special military unit to address the threat of cyber attack.... This “is primarily responsible for the protection of the defense and civilian networks of the United States and can also be deployed to mount an information warfare attack on its enemies” (Trends Updates).... Cyber-security, cyber-attack, and the development of governmental response: the librarians view.... Dreazen and Siobhan Gorman reveals that the US cyber infrastructure is vulnerable to attacks....
1 Pages (250 words) Essay

Why and How Cyber Attacks Occur

It is possible to exert attack on any secured computer network providing the attacker has the time and resources.... The paper " Why and How cyber Attacks Occur" explains the complexity of cyber attacks due to the fact they can be executed by any individuals from terrorists, political foes to teenage hackers.... cyber attacks are executed by individuals or an organization with social or political motives.... cyber attacks are an illegal process of infiltration into computers to extract or destroy data and information....
5 Pages (1250 words) Case Study

Cyber Terrorism

The terrorism through cyberterrorism cyber attack i.... It can be described as an unlawful attack that is made especially against the computers along with their supported networks.... According to the report, the aspect of cyber terrorism, considered to be quite significant in this era of globalization, is observed to be increasing rapidly in the world.... Various aspects that include the benefits through the execution of the procedure of cyber attacks on behalf of the cyber terrorists and significant effects of cyber terrorism will be presented....
12 Pages (3000 words) Research Paper

Political and Legal Influences of Cyber Wars

Legal and political issues have been some of the issues considered to fuel cyberwar.... This is the extent to which legal issues fuel cyber wars.... For example, on June 1, 2012, David Sanger of the New York Times reported that the United States together with Israel had developed the Stuxnet computer worm that was used to attack Iran's uranium enrichment facilities.... Most specifically, the United States and Iran have been enemy states for quite some time due to Iran's links with terrorist activities and this may have been the most probable reason for the attack....
6 Pages (1500 words) Essay

Analysis of Hacking Attacks

Hacking is not just carried out, but the attack is thoroughly planned with smaller details (Goldstein, 1997).... This shows that the hackers are normally aware of committing the act and they select well the system to be hacked prior to the attack (Howard, 1997).... omputer attackers can generally be classified into three major types, namely: (a) unsophisticated ''script kiddies''; these carry out the junk of the cyber intrusions, (b) crackers; these carry out cyberattacks for self-interest or malicious reasons, and (c) hackers; these are In more smart attackers who are guided more by their curiosity rather than being malicious....
24 Pages (6000 words) Coursework

Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers

Tang (2015) emphasizes that the challenges associated with differentiating aggressive counter-strikes from the actions of actual hacking could result in serious legal issues.... The objective of this paper "Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers" is to demonstrate why private companies and governments can mitigate a cyber-attack by destructively counter-striking against attackers.... Lobby groups together with IT security professionals are calling for new regulations which could facilitate the private companies to effectively counter-strike or retaliate against cyber attackers....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us