Cases of cyber attacks - Case Study Example

Only on StudentShare

Extract of sample
Cases of cyber attacks

The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another.Instead of bullets and guns, critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power. In this paper,a comparison of three cases of cyber terrorism would be discussed to enable people understand the nature, power and threat caused by cyber attacks. Likewise, the governments’ initiatives to response to similar threats in the future are also included in this report. The case of the cyber attack in Estonia. In 2007, Estonia experienced a massive DDOS attack which paralyzed most of its government websites. Although Russian authorities denied the attack, the Estonian government highly believed that it was from Russia. The attack happened after a political issue which involved removing Estonia’s transfer of a Soviet war memorial in Talinn to a military cemetery ( A cyber riot, The Economist.com). The cyber attack is considered a DDoS or Distributed Denial Of Service. According to searchsecurity, techtarget.com, DDoS happens when “ a multitude of compromised systems attack a single target, thereby causing a denial of service; hence, the target system is forced to shut down which prevents legitimate users to receive service”. The main targets were banking institutions, schools, government websites and other institutions; however, the first launch targeted government sites. ...
Download paper

Summary

The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another.Instead of bullets and guns,critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power…
Author : randybergnaum

Related Essays

Anti-abortion laws and maternal mortality in the US
History of abortion goes back in centuries; women were using various abortion techniques in the past (Potts, Diggory, and Peel 1977). Abortion was not banned in ancient societies, it was not considered illegal. However the perception of abortion has changed over the centuries. Abortion became one of the most controversial and debatable subjects in the modern society. Donald T. Critchlow (Critchlow 1996, 1) points out that abortion transformed into political issue since “reproduction rights became public policy.” There are various issues related to abortion: ethical, biological,...
3 pages (753 words) Research Paper
Figurative Language versus Literal Language.
Even if it does not take for one to acquire a poetic nature to get along, comprehension and skills with figurative speech and writing must be examined from time to time to ensure quality and proper or correct usage besides the anticipated end with creativity. Idiom is a figurative language that refers to an expression consisting of words which are not supposed to be understood in their literal sense, rather by the meaning through the context in which the idiomatic terms are placed. American language is rich in idiomatic expressions that are often used as alternatives to common words or phrases...
4 pages (1004 words) Term Paper
Labor Relation: antinepotism policy case study
Organizations want to promote equity in the workplace. This is why they develop and implement anti-nepotism policies. Nepotism can be defined as “the bestowal of patronage by reason of relationship regardless of merit” (Jones et al, 2008, p.18). In simple words, nepotism means hiring and promoting friends, relatives, or family members, when these practices lead to unfairness and discrimination against other job applicants and workers. The issue with Keith W. Walton is clear: he was fired once the company was reported that his uncle was working for the same company. Walton was fired for...
3 pages (753 words) Case Study
Should Abortion be Legal?
Arguments for the Legalization of Abortion ...
9 pages (2259 words) Research Paper
Stereotype Logic and Programming Paper
The current paper critically discusses three stereotypes encountered in life and the effects they can have on others. The common stereotype about bullying is that the perpetrator is always a big, dumb and violent boy, while the victim is smaller and weaker. This notion is embedded in traditional views among schoolchildren that bullying is a rite of passage. From a social perspective, prejudice bullying is viewed as a social crisis deeply rooted in the wider social discourse with individuals justifying the use of negative behavior towards an out-group (Boyle, 2005). Traditionally, bullies were...
3 pages (753 words) Assignment
The vulnerabilities of industrial control systems and possible solutions
Industrial control systems (ICS) are imperative to the quality of life that most of society shares and depends on every day. These systems regulate the electricity, food supply, medical and chemical manufacturing, as well as many other processes and utilities that are used daily.After September 11, 2001, the threat of terrorist attacks became a high priority on the home front (Marsh 2006). Most people worried about airplanes, metro or subway systems, or bombs, but a few realized that with the computerization of control systems in a variety of industries becoming normal operating procedures,...
3 pages (753 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!