StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Information Technology and Cyber Attackers - Essay Example

Cite this document
Summary
The paper "Information Technology and Cyber Attackers " highlights that an enormous quantity of information and economics is transferred by the cheaper and faster technology these days.  A large volume of documents is passed to another source illegally…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Information Technology and Cyber Attackers
Read Text Preview

Extract of sample "Information Technology and Cyber Attackers"

Outsider espionage, the GhostNet targeted the computers in high-level offices of the US government in 2008. It has been reported that GhostNet worked on behalf of the Chinese government. This group causes the target computers to download the malicious software and gives control of computers to attackers. The US Department of Defence has been attacked so many times by this group (Lord & Sharp, 2011).

E-Activity 2
Cyber attackers target important official websites for breaching important data. Threats of computer security are inventive, which are used to harm the individual as well as business computer systems. For example, the computer network of the White House was breached by hackers in October 2012. They used the spear-phishing attack. Another incident occurred when the federal IT staff of Canada was fooled by hackers as giving them access to computers of government offices. In this way, the hackers got access to the government systems (Websene, 2012).

Both individuals and businesses can install the perimeters firewalls, which permit only authorized users to access the network. The network can be protected from the attack “Denial of service “by using the perimeter firewalls. An individual or business network administrator should configure the email servers to remove or block the attachment of emails, which are used to spread viruses, and other, many attacks. Individuals and businesses must keep the backups of their important data (Symantec Corporation, 2011).
It is concluded that information security is important from both inside and outside attackers. Similarly, data security from blended attacks must be ensured for both individuals and businesses.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Questions Essay Example | Topics and Well Written Essays - 250 words - 11”, n.d.)
Questions Essay Example | Topics and Well Written Essays - 250 words - 11. Retrieved from https://studentshare.org/information-technology/1607327-questions
(Questions Essay Example | Topics and Well Written Essays - 250 Words - 11)
Questions Essay Example | Topics and Well Written Essays - 250 Words - 11. https://studentshare.org/information-technology/1607327-questions.
“Questions Essay Example | Topics and Well Written Essays - 250 Words - 11”, n.d. https://studentshare.org/information-technology/1607327-questions.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology and Cyber Attackers

Cyber Attacks on America

The review "cyber Attacks on America" observes America's vulnerability to cyber-attacks has increased leading to loss of confidentiality, integrity, and availability.... Whereas physical attacks would be carried out by hostile foreign nations and terrorists, cyber-attacks could be executed by a wide array of enemies including organized protest groups, terrorists, foreign states, and even teenagers.... Therefore, America is increasingly vulnerable to cyber-attacks which grow by breadth and complexity, indicating the need for the country to continuously adapt and re-engineer its protection approaches that would uphold its cybersecurity....
10 Pages (2500 words) Literature review

A Forensic Investigative Response Approach for Suspected Security Breach

Forensic experts have an onus to their client to show attention about the information and data to be identified that can become probable corroboration , particularly , it can acts as digital proof in investigation and can help to initiate legal action against attackers.... Of late, wide-scale cyber-attacks have buttressed that security and safety safeguards of ICT (information and communication technology) in many infrastructures are not adequate as the aimed attacks perused by talented individuals or organizations....
6 Pages (1500 words) Case Study

Why and How Cyber Attacks Occur

The paper " Why and How cyber Attacks Occur" explains the complexity of cyber attacks due to the fact they can be executed by any individuals from terrorists, political foes to teenage hackers.... cyber attacks are executed by individuals or an organization with social or political motives.... cyber attacks are an illegal process of infiltration into computers to extract or destroy data and information.... Today, with the ubiquity of the use of the Internet in every political and social sector cyber attacks are increasingly growing in numbers....
5 Pages (1250 words) Case Study

Analysis of Hacking Attacks

omputer attackers can generally be classified into three major types, namely: (a) unsophisticated ''script kiddies''; these carry out the junk of the cyber intrusions, (b) crackers; these carry out cyberattacks for self-interest or malicious reasons, and (c) hackers; these are In more smart attackers who are guided more by their curiosity rather than being malicious.... This is not only possible with a single category of attackers (Harris, 2012)....
24 Pages (6000 words) Coursework

Types of Hacking

eneral speaking there are three primary categories based upon the intentions of attackers' actions.... Lastly, the third category, 'hackers,' which, specifically, are more sophisticated attackers whose action can be attributed to curiosity rather than malicious intent.... The paper "Types of Hacking" discusses that recent years have seen the development of a number of interesting developments which detail how the techniques of cyber intrusions and attacks may be used on a national level, executing of host applications, and specific malicious actions....
24 Pages (6000 words) Coursework

Stuxnet: Dissecting a Cyberwarfare Weapon

Due to this, it was classified as the first-ever cyber-weapon.... Unlike other computer viruses that erase or steal any information, Stuxnet's main aim was destroying a military target (Ralph, 49).... Unlike other computer viruses that erase or steal any information, Stuxnet's main aim was destroying a military target (Ralph, 49).... The fact that the virus attacked performance machines rather than information and confidentiality made it a hard nut to crack especially to people in charge of cybersecurity....
6 Pages (1500 words) Assignment

Current Trends in Information Security

The paper "Current Trends in information Security" examines the significant current threats to information security and the most important controls that WebCenter should be considered as a priority to mitigate the risks of these threats being realized.... The primary objectives of information security are; integrity, confidentiality, and availability.... Confidentiality means that information that is stored in the system is protected against unauthorized users....
8 Pages (2000 words) Essay

Mitigating Cyber-Attacks by Destructively Counter-Striking against Attackers

Lobby groups together with IT security professionals are calling for new regulations which could facilitate the private companies to effectively counter-strike or retaliate against cyber attackers.... The active defense also referred to as 'counter-strikes or 'hack back' is the process of reverse-engineering the cyber attackers' efforts with the goal of stopping or reducing cybercrimes through the identification of attacks against the system as well as their origin....
10 Pages (2500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us