StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Security and Startups - Case Study Example

Cite this document
Summary
The motive of the attacker is to receive payments in Bitcoins before releasing the service to resume its normal functions. The attack targets…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Cyber Security and Startups
Read Text Preview

Extract of sample "Cyber Security and Startups"

Cyber Security and Start-ups What is a DDoS attack? A DDoS Attack is an attempt to make an online service inaccessible by overpowering it through the obstruction from various sources. The motive of the attacker is to receive payments in Bitcoins before releasing the service to resume its normal functions. The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information. The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort more users (Perlroth & Wortham, 2014).

How can a small company protect itself from DDoS attacks?A small company can protect itself from DDoS attacks by registering for website hosting services with giant organizations like Amazon and Google that can hold bulky flows of attack transfer. Another way to protect against DDoS attacks can be through subscribing for mitigation services that monitor the flow of data from servers and other data sources (Perlroth & Wortham, 2014). These strategies enable smaller companies to block the viruses that block the smooth scream of information or access to important resources.

Who has become a frequent victim of DDoS attacks?Small tech start-ups have become frequent targets of the attacks because they possess valuable data that the DDoS attack can hurt (Perlroth & Wortham, 2014). New companies attract numerous users who visit their websites for information concerning the firm. They do not also install security measures to protect against such attacks, which make them vulnerable to pay the ransom demanded. It is apparent that the attackers target new establishments that do not have the experience of dealing with modern elements of cyber attacks.

Comments on the PostThe post clearly illustrates the meaning of DDoS attack and the various ways of avoiding such challenges. However, the writer does not give a detailed analysis of the attack and how small companies are the prime targets. This causes confusion, especially regarding the ransom charges since the post indicates two conflicting charges of $20 and $2000. The charges posted here reflect the ones that future DDoS attackers might demand and not the current rate. ReferencePerlroth, N.

& Wortham, J. (2014). “Tech Start-Ups are Targets of Ransom Cyber attacks.” The New York Times. Business of technology Column. Retrieved from

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Security and Startups Case Study Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1686665-cyber-security-and-startups
(Cyber Security and Startups Case Study Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1686665-cyber-security-and-startups.
“Cyber Security and Startups Case Study Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1686665-cyber-security-and-startups.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Security and Startups

Homeland Security and International Relations

To prevent this will call for protection of the internet space by implementing proper cyber security.... Topic: Homeland Information security Incentives Date: Overview Information and communication technology has advanced and become a tool that gives the security apparatus an edge in information gathering on intelligence.... Discussion areas Questions are being raised as to whether homeland information security is improving over the years....
4 Pages (1000 words) Essay

Role of Software Security in Maintaining Cyber Safety

The paper "Role of Software security in Maintaining Cyber Safety" has reviewed and analyzed the role of software security in ensuring peace on the internet.... hellip; The role and value of software security have been appreciated a great deal because modern browsers are safeguarding the boundaries of the networks and computers by killing the evil in the bud.... Additionally, human error must be minimized by promoting proper shutdown whereas, the proper response to browser notifications can further assist the users in further improving security....
10 Pages (2500 words) Essay

Project on Spyware and Viruses

With the rapid advancement in the information and communication technology cyber-security has become a global issue which needs to be addressed in a focused way for the users to survive in the technological era.... security is more than just installing a piece of software it is using best practices, updating your antivirus, and practicing safe and secure computing” With this background, this project studies the problem of spyware and viruses and presents a report on the issue of spyware and viruses and their impact on the security of the information stored....
8 Pages (2000 words) Essay

Network Security Systems

This essay "Network security" is intended to compare the two internet security packages as Kaspersky and Norton internet securities.... hellip; To cope with the latest and upcoming raised open questions in terms of issues related to security, and antivirus improves the performance at regular intervals.... This leads the antivirus up to date for handling the latest security threats.... A large number of security concerns regarding cyberattacks that need to be handle properly and accurately are focused on....
9 Pages (2250 words) Essay

Cyber crime,the social engineering

The rate of cybercrime is at increase and this threatens the security and financial status of a country.... search security, p.... Social engineering refers to the use of confidential tricks to divulge cyber Crime By Introduction The term cybercrime refers to any unjustified act that relates to a computer and a network....
2 Pages (500 words) Essay

Summary and 3 learnings

The implants are beyond the reach of most security controls and existing antivirus products, making it virtually impossible to stop it.... The first one is that American government Agencies do not use security software products made by Kaspersky Lab.... The group has given American intelligence agencies the power to permanently… ge tools and embed surveillance in networks and computers of their adversaries such as the Russia, China, Pakistan, Afghanistan, and Iran (Perlroth and Sanger) In their article, Perlroth and Sanger say that Equation Group has the same techniques used in Stuxnet, a computer worm cyber-weapon The American intelligence agencies have closely watched over the adversaries of United They have obtained a cyberweapon which has been developed by an attack group called the Equation group....
1 Pages (250 words) Essay

System Identification and Security Categorization

The reporter underlines that federal statue and requirement are very important to observe in order to access the security pose of the Department of Veterans Affairs (VA).... The ability to establish a successful information security system lines on having a good knowledge of the requirements.... hellip; In order to protect information and information system, it is essential to acquire information security program.... Necessary control mechanism has been incorporated into the information security system in order to provide protection....
6 Pages (1500 words) Essay

Cyberspace Policy

It has often been observed that by virtue of cyber security, various ruling parties used to keep track of the opposition which is not at all right.... “Technology is reshaping every aspect of our lives, and protecting our digital infrastructure from cyber threats is one of our highest security priorities.... With the development of science and technology, the possibility of cyber threats is also increasing rapidly in modern times.... And most importantly discuss the process which various cyber companies have to consider as an obligation in light of theories such as rights theory, justice theory, ethics of character, and ethics of care while relating the same about the particular incident....
11 Pages (2750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us