StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

A factual cyber atack - Essay Example

Cite this document
Summary
With the increase in the utilization of internet-based applications including financial and control applications, online crimes are also increasing in number. A cyber crime may corrupt a certain set of commands of an internet-based program or alter an HTML code. A criminal may…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
A factual cyber atack
Read Text Preview

Extract of sample "A factual cyber atack"

No: A Factual Cyber Attack With the increase in the utilization of internet-based applications including financial and control applications, online crimes are also increasing in number. A cyber crime may corrupt a certain set of commands of an internet-based program or alter an HTML code. A criminal may tend to steal financial assets of a person, disturb supply or production of a business, or may utilize other strategies to benefit or to harm others. However, it is also utilized to access secure information of military or governmental agencies.

The simplest type of cyber crime is to spread the virus online (“What is Cyber Crime?”). Some of the cyber crimes are much related to the actual crimes: frauds, thefts, etc. However, modern theory suggests that keeping illegal data on a computer is also a type of cyber crime (“What is Cyber Crime?”).As per the FBI reports, the United States military networks were penetrated by the Chinese hackers in 2004. The attackers accessed the US military networks and breached the security systems (Thornburgh).

The set of codes assembled by the attackers was named the “Titan rain” (Thornburgh). The attack was discovered by “Shawn Carpenter”, who was on a secret job at that time. He discovered the set of codes while going through the network codes. The attackers tried to access the sensitive networks as those at Lockheed (Thornburgh). These attacks were supposed to be supported by the Chinese government but no particular evidence showed the fact, and Chinese government neglected the charge. On the other hand, there is a need to respond immediately to stop any more infiltration.

The important concern is finding the severity of the attack and how much damage it did to the networks. The attackers could access the information, could make alteration in the information and the associated networks and could prevent certain permitted users to access the network. On the other hand, the important concern was that the corrupt programs might attack the certain hardware and might so influence the system that it will work improperly a great while (Thornburgh).The attackers made a silent escape all the time.

The secret information was first converted to ZIP format and then sent immediately to China. The person who discovered the attackers, ‘Carpenter’, thinks that no such planned and rapid attack has happened in the past. In the US Time magazine, Carpenter says, “Most hackers, if they actually get into a government network, get excited and make mistakes, not these guys. They never hit a wrong key” (Thornburgh). However, these attacks enabled the US troops to be ready for such attacks and to maintain networks with more stealth (Thornburgh).

Cyber attacks were considered as fatal, as these attacks were kept secret and were planned diligently and intelligently; sometimes, government networks were their targets. In most of the attacks, the criminals corrupt systems for their purposes. Other types of attacks include the alteration in the information and secret access to the information. However, a system with higher stealth detection abilities may prevent the attackers from hacking it.Works CitedThornburgh, Nathan. “The Invasion of Chinese Cyberspace”.

Time Magazine US. 29 August 2005. Web. 6 September 2012. “What is Cyber Crime?” cybercitizenship.org. n.d. Web. 6 September 2012.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“A factual cyber atack Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
A factual cyber atack Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1602478-a-factual-cyber-atack
(A Factual Cyber Atack Essay Example | Topics and Well Written Essays - 500 Words)
A Factual Cyber Atack Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1602478-a-factual-cyber-atack.
“A Factual Cyber Atack Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1602478-a-factual-cyber-atack.
  • Cited: 0 times

CHECK THESE SAMPLES OF A factual cyber atack

Criminology: Cyber Crime

Institution Date Criminology: cyber Crime Introduction The invention and introduction of computer technology presented great advantages that made it receive warm welcome and appreciation from all corners of the world.... cyber crime has been the rightful term to define and explain the nature of the criminal activities performed by use of computers.... Douglas et al define cyber crime as computer mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through the global electronic network (3)....
10 Pages (2500 words) Research Paper

Cyber Techniques and International Tensions

The paper "cyber Techniques and International Tensions" describes that the development of better cyber techniques has led to a situation where a number of countries attempt to hack into other countries' computer systems for the sole purpose of stealing trade secrets.... hellip; It is important that governments and other organizations should carry on with their operational roles while the following guidance on response to cyber incidents....
11 Pages (2750 words) Essay

Black Ice: The Invisible Threat of Cyber Terrorism

This book review "Black Ice: The Invisible Threat of cyber Terrorism" analyzes “Black Ice: The Invisible Threat of cyber Terrorism”.... The book is an investigation of the possibility of cyber terrorism, its global and financial implications, its impact on civil and private infrastructure, and the interest of the international terrorist organizations in the United States.... Investigation of the possibility of cyber terrorism, its global and financial implications, its impact on civil and private infrastructure, and the interest of the international terrorist organizations such as Al Qaeda in interfering with the cyberinfrastructure of the United States....
8 Pages (2000 words) Book Report/Review

Current Cyber Attacks & Its Countermeasures

The paper "Current cyber Attacks & Its Countermeasures" states that generally speaking, it should be kept in mind that the necessities of the cyber law should not be made so rigorous that it may retard the growth of the business and establish itself to be counter-productive.... The planned use of information technology by cyber attackers for producing negative and harmful effects to concrete and vague possessions of others is called “cybercrime” and such attacks are known as “cyber attacks”....
7 Pages (1750 words) Coursework

Cyber Threat Analysis Services

This coursework "cyber Threat Analysis Services" discusses the concepts of cyber threat analysis and technologies involved in accomplishing the task.... It discusses companies that provide cyber threat analysis services and future speculations about the integration of cyber threat analysis.... The rise of computers and the internet that led to the development of the global world witnessed a similar rise in cyber crimes that also conducted through the internet and by the use of computers....
6 Pages (1500 words) Coursework

Cyber Breaches in Different Companies

This paper ''cyber Breaches in Different Companies'' is about the companies which are required to use extremely secure and authentic software programs to ensure the security of customers and their personal information to ensure their trust in their services and products in the short term as well as in the long term; considers the cyber breaches in eight different companies.... hellip; AT&T underwent a cyber breach in 2010 affecting one hundred and fourteen thousand accounts....
11 Pages (2750 words) Term Paper

Information Security Management

This case study "Information Security Management" focuses on cyber trolling that has been described as the anti-social act of intentionally causing interpersonal conflict, and shock-value controversy online.... nbsp;… The social engineering cyber attacks by the blogger that are targeted at discrediting EZ Company's information integration and visualization technology are seen to be as a result of a long-standing dispute between the blogger and some of EZ Company's principal executives....
9 Pages (2250 words) Case Study

Main Areas and Aspects of Cyber Safety

… The paper “cyber Safety, the Ways of cyber-Crimes, Consequences of Lack of cyber-Safety, Online Protection Tools” is an informative variant of an essay on information technology.... The paper “cyber Safety, the Ways of cyber-Crimes, Consequences of Lack of cyber-Safety, Online Protection Tools” is an informative variant of an essay on information technology.... cyber-safety is the responsible and safe utilization of the web/internet services as well as the entire communication and information technology devices, comprising digital cameras, mobile phones, and webcams....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us