Fifteen years ago the economist, Stephen Polasky (1992), identified information as one of the most valuable commodities known to man. Information, as he argued, was coveted both because of its tangible and intangible value, because of its financial and non financial rewards…
The consequences of unauthorized access, on the one hand, and the tampering with information, on the other, are enormous, whether accessed in terms of its impact upon individuals, corporate entities or the economy as a whole (Sturdevant, 2005). Indeed, a considerable of the potential consequences of the unauthorised violation of information, or of cyberattacks, highlights the aforementioned.
Much has been written about the consequences of cyberattacks and the extent to which the theft, unauthorized access or tampering with information has the potential to wreak havoc upon individual lives, companies and economies. In explaining this, Schwartau (1994) identified three levels of information warfare, each of which had its own unique characteristics, targets and, naturally, consequences. The first level, referred to by Schwartau (1994) as interpersonal Attacks,' focuses on identity theft, both of individuals and of corporations. The successful theft of identity, entailing the gathering of personal/corporate information and records, allows the identity thief to pose as the person/entity in question. Through possession of information such a credit history, driving records, medical files/history and accounts, the identity thief can proceed to harass the entity/person in question and assassinate his/her character or corporate reputation (Schwartau, 1994).
While interpersonal attacks, primarily limited to identity threat, are classified as the first level of information warfare, the harm done to victims can take years and substantial amounts of money to repair. As Block (2007) reports, official crime statistics indicate that approximately 5% of all American adults have been victimized and, as a consequence, have witnessed both the destruction of their credit history and, in many instances, their reputation. On the corporate level, however, identity theft may be identified as a serious annoyance more than a problem insofar as the theft of corporate identity is much more difficult than the theft of individual identity and much easier to disprove. That does not mean to imply that it is not problematic or that it does not expose the entity in question to both financial loss and negative publicity but only that its consequences are much more containable than those which result from one of the other two levels of information warfare.
Within the context of level two information warfare, referred to by Schwartau (1994) as InfoWar, the consequences are infinitely more serious and substantially more costly. InfoWar, as defined by Schwartau (1994), involves sabotage, the theft of company records, including client and subscriber lists, and industrial espionage. A not uncommon scenario can involve the theft of client and subscriber lists and their subsequent selling to a competitor. In order to highlight the magnitude of the consequences of this act of InfoWar, Gold (2001) discusses the consequences of InfoWar in relation to Encyclopedia Britannica, which was subjected to such a cyberattack incident approximately ten years ago. Its database, containing the names of 3,000,000 subscribers was stolen and sold to a competitor. That database, considered the company's most valuable asset, was conservatively estimated at $1,000,000. Needless to say, the company lost tens of thousands of subscribers, not to mention the financial loss it incurred (Gold, 2001).
InfoWar is not, ...
Cite this document
(“Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.net/miscellaneous/276916-consequences-of-attacks-via-cyberspace
(Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words)
“Consequences of Attacks via Cyberspace Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.net/miscellaneous/276916-consequences-of-attacks-via-cyberspace.
This is not just a problem in the countries where technology is highly accessible, but also with nations who practically belong to the third world. The borderless nature of the internet has become both a boon and bane for the modern world.
Technology is useful, but many people have gone as far as committing cybercrimes such as sending virus which are damaging to others, revealing confidential issues to the third party without one’s approval and many others. Cybercrime is one is one of the problems that many people using Internet face.
Computer Ethics happens to be a part of practical philosophy dealing with the manner in which computing professionals engage in decision making, in regards to professional, as well as social conduct. The identification of ethical matters as they arise, along with the definition of dealing with these issues has in the past been problematic.
Workplace Mediations in Cyberspace. Cyberspace appears to be well suited to allow disputing parties without having to use formal laws or legal mechanism. Internet allows the disputing parties to have direct links when communicating to resolve conflicts. This is a privilege that is available to anyone.
A metaphor that does not structure one concept in terms of another but instead organizes a whole system of concepts with respect to one another is called an orientational metaphor. Most of these metaphors are centred on spatial orientation like 'up-down', 'front-back' and 'on-off'.
It's important to determine why we need to apply ethics in the internet. The first reason is that internet and e-business can reach anywhere. It can connect people who were never capable of being connected before and in ways that were unimaginable only a decade ago.
However, cameras mounted in London City have resulted in protests. There is no data to support the contention that the mere awareness of cameras fosters a sense of safety and therefore serves as a means of revitalizing public social life.
Nevertheless, contrary to the popular assumption, the surveillance camera is not only used and implemented in the United States and in fact, the United Kingdom is the largest user of closed-circuit television (CCTV) in the world (Bulos & Chaker, 1998).
This essay is going to study of code of ethics that are used pertaining computer networking and what behavior should be expected in such cases. It also deals with what computer is networks are used and how they are programmed nowadays. Topics such as display people’s personal information and the anonymity of their location are discussed.
rm, thus, if it is an essay if it is game if it is a song if it is the original movement of dance if it is a photo, coding HTML or a computer graphic which can be established on a paper, recorded on a tape or saved to hard disks, it can be protected.”
One should put focus on
The author states that the friends that you make in cyberspace are as caring and as supportive as any “real life” friends can be. They are ofter the only supportive group that a socially awkward, teen can find in their lives; even more supportive than one’s family. The friendships formed on social media are not restricted by any geographical constraints.
5 Pages(1250 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Consequences of Attacks via Cyberspace for FREE!