StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Vulnerability - Admission/Application Essay Example

Cite this document
Summary
This can be defined as the use of computers as weapons and targets by politically influenced nations or clandestine agents who threaten to cause violence and fear so that they can influence and force governments to change their policies in a way that can favor them. This can be…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.2% of users find it useful
Vulnerability
Read Text Preview

Extract of sample "Vulnerability"

Vulnerability Vulnerability to Cyber terrorism This can be defined as the use of computers as weapons and targets by politically influenced nations or clandestine agents who threaten to cause violence and fear so that they can influence and force governments to change their policies in a way that can favor them. This can be used to describe the three types of cyber attacks including the EA, CAN and the physical attacks against computers.Some of the United States critical infrastructures which are considered vulnerable to terrorist attack include energy, public health, transportation, banking and finance, human services, water, information and telecommunication among others.

Since nations’ resources are nowadays directly or indirectly controlled by computer systems which are then interconnected with a complex network of interdependence hence the unprecedented levels of vulnerability and infrastructural risk through compromise of those computers, cyber-terrorism has emerged as a real world concern (Lewis, 2006). Operations can be disrupted causing damage to these vital infrastructures due to a vulnerability. Several attacks have been seen directed against the US critical infrastructure including the newly released ‘’Blaster’’ worm of 2003 which caused major disruptions of several computers in during the month of August.

The severity of the Eastern United States power blackout on 14th August could have also been contributed to by this attack. This could have through lowering the performance of several communication lines used to link the utility company data centers, sending warnings to other managers downstream on the power grid. Another example in 2003 was that of a ‘’Slammer’’ attack which occurred when the ‘’Slammer’’ worm was released for five hours to corrupt the computer control systems which was at the Davis-Besse nuclear power plant in Ohio.

This was fortunately rescued by the fact that by the time the attack took place, the power plant was closed hence was off-line. However, the worm successfully penetrated the several systems in the Davis-Besse power plant control room to a larger extent given that the business network for its corporate offices had a multiple internet connection to bypass the control room firewall.Several measures can be taken to avoid these attacks for instance employing a program known as Critical Infrastructure protection (CIP) to safeguard the United States security and defend them against intruders of the infrastructure.

The Department of Homeland Security (DHS) of US puts in place the following recommendations to deal with cyber-terrorism; conducting threat vulnerability assessment, coming up with strategic analysis and warning capabilities in order to identify potential cyber attacks, protection to infrastructure control system, enhancing public or private information sharing and facilitating plan of recovery together with the recovery of the internet in case the disruption is enormous.ReferencesLewis, J. A. (2006). Cyber security and Critical Infrastructure Protection.

Retrieved fromhttp://csis.org/files/media/csis/pubs/0601_cscip_preliminary.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Vulnerability Admission/Application Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Vulnerability Admission/Application Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1622625-vulnerability
(Vulnerability Admission/Application Essay Example | Topics and Well Written Essays - 250 Words)
Vulnerability Admission/Application Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1622625-vulnerability.
“Vulnerability Admission/Application Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1622625-vulnerability.
  • Cited: 0 times

CHECK THESE SAMPLES OF Vulnerability

Hazard and Vulnerability Analysis

Vulnerability is an important concept in the area of hazards research as helps in the development of strategies meant for hazard mitigation at the local, national as well as the international levels.... Since Vulnerability is an important aspect of mitigation during natural disasters, it is important to address the issue of Hazard and Vulnerability Analysis Vulnerability can be defined as the potential for loss (Cutter Vulnerability is an important concept in the area of hazards research as helps in the development of strategies meant for hazard mitigation at the local, national as well as the international levels....
2 Pages (500 words) Essay

The Vulnerability Assessment Project Leader

In the paper “The Vulnerability Assessment Project Leader” the author oversees the redeployment collection of information necessary to support the assessment.... This is essential to save valuable time during the VA, and also it ensures that any judgments or decisions are made on the basis of fact....
2 Pages (500 words) Essay

Consumer Vulnerability and its Exploitation

The following essay "Consumer Vulnerability and its Exploitation" dwells on business ethics, which focuses on the ethical concepts based on consumer Vulnerability and its exploitation.... hellip; Consumer Vulnerability is taking advantage of the consumers' naivety, problems in normal life, financial situations, and lack of understanding or giving false hope or claims.... Some important factors that come under consumer Vulnerability are as follows - Constitutional vulnerabilities: these may include the physical or mental disabilities which affect the consumers....
10 Pages (2500 words) Essay

Windows Vulnerability

It is in this way that malicious attackers could lure system users to Vulnerability Report The TLS Protocol CBC Mode Information Disclosure Vulnerability is found on a variation of windows operating systems.... This report highlights the details of attacks conducted using this Vulnerability, the systems that are vulnerable to this attack, the consequences and effects of the attacks, document some cases where such attacks have taken place and finally explore the fixes that exist so far....
2 Pages (500 words) Research Paper

Vulnerability (Vulnerability) within a human rights perspective

For example, elderly people are open to criticism or… To me, Vulnerability is referent to harsh realities that elderly people are likely to come across, such as violation of their human rights or discrimination, more than the individuals who are more Vulnerability within a Human Rights Perspective Vulnerability WITHIN A HUMAN RIGHTS PERSPECTIVE A vulnerable group is one that canbe injured physically or wounded, as well as one that is open to attack or criticism....
1 Pages (250 words) Essay

Vulnerability Scanning

It is imperative for IT admin to identify those… Vulnerability scanners of different types are used to operate for various levels of invasiveness.... Simple vulnerabilities scanners only check the information about software version and windows registry and determine whether d: Vulnerability Scanning Vulnerability scanning deals with the staple information for security as no software is perfect for the security purposes.... orking of the Vulnerability scanners is similar to antivirus software....
1 Pages (250 words) Essay

Infrastructure Vulnerability and Network Architectures

In the paper “Infrastructure Vulnerability and Network Architectures,” the author talks about how natural events lead to disasters and affects human life.... Bobrowsky reflects and gives examples of the several accidents that have occurred in the new millennium due to natural phenomena....
2 Pages (500 words) Annotated Bibliography

Vulnerability in the Communication System

This case study "Vulnerability in the Communication System" focuses on the problem that the system run by the organization does not have necessary checks against information stored in PDF format because the company uses Adobe Reader and the Adobe Acrobat to access PDF files.... he CVE- 2014- 0567 is a Vulnerability in the Adobe Reader Application and the Adobe Acrobat.... A Vulnerability is a weakness that allows an attacker to obtain confidential files with few restrictions....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us