Premium Essay

Essay On Cyber Security

Submitted By
Words 2239
Pages 9
Cyber security is gaining tremendous attention nowadays due to the increasing use of internet, computers by the media and various public and private institutions. They recognize the terrible impacts with the cyber attacks. Cyber security involves preventative methods which are used to protect information from being stolen or attacked. Cyber attack is a crime that involves a computer and a network for stealing and attacking of information. It is an attack where a person uses a computer to commit an illegal act. At present, cyber attacks is the current challenging issue which has resulted in computer based criminal activities which are generating worldwide threat, destruction and disruption. There is no border for cyber activities. The increase in the use of internet by the world wide users and lack of international cyber …show more content…
It is often used to destroy something on a computer or to steal private information.
2.4.2 Viruses
Viruses make a computer "sick". They infect a computer, just like a virus that infects a person. They hide inside the depths of the computer and replicate themselves and survive by attaching to other programs or files.
2.4.3 Spyware
Spyware is also used to steal confidential information. It is a form of malware that monitors or spies on its victims. It usually remains in hiding and capable of recording keystrokes i.e.; what a user types on the keyboard, which says that the attacker can view passwords that the victim or user enters into the computer.
2.4.4 Worms
Worms differ from viruses. They will not attach themselves to other files or programs and are capable of surviving all by themselves. They not only do they replicate on a single computer host, but they can also replicate across an entire network of computers. This makes a worm significantly more dangerous than a virus. They replicate themselves in multiple times to full fill a nefarious purpose just like virus.
2.4.5 Password

Similar Documents

Premium Essay

Australian Cyber Security Framework Essay

...The Australian Cyber Security Capability Framework (CSCF) & Mapping of ISM Roles by Australian Government Information Management Office (AGIMO) formalizes training, certification, competency and development requirements for staff employed within the IT Security profession [14]. The 20- pages Framework has a two level structure with six main categories of capability: Service Delivery; IT Business Management; Business Change; Solutions Development; Solutions Implementation; and Service Support. The Security domain sits within the Service Delivery area and it is broken down into four capability groupings: Service Delivery; IS; Technology Audit; and Emerging Technology Monitoring. The competencies are mapped onto the Framework based on complexity...

Words: 911 - Pages: 4

Premium Essay

Metacognitive Writing Assignment

...Sherief Beshara ENG 302-DeFazio Metacognitive Assignment Role of Cyber Security in Preventing Future Attacks 1. Copy/paste the following items from your major scholarly project into your Metacognitive Assignment document: * One of the main concerns is whether or not we are prepared for a cyber war. We have to equip ourselves with the education and understanding of what goes into preventing a cyber-attack and what we need to be on the offensive side. Our safety depends on it. Cyber security plays a daily role in our protection and we don’t even realize it. * Another opposing view shows that cyber security sometimes is not enough, and that the need for it is not just limited to our government, but also corporate America is in deep need for cyber security to protect its databases from malicious software and hackers that are always ready to invade and attack their firewalls. Bruce Schneider, a security expert with the Berkman Center at Harvard, mentions how important encryption is and mentions that it “protects our data from criminals. It protects it from competitors, neighbors, and family members. It protects it from malicious attackers, and it protects it from accidents” (Bailey). That is why encryption needs to be automatic to any type of data that needs to be protected or that is a target to any hacker out there. He is saying that encryption just generally puts a protective cover over all the data that needs to be protected and just protects it from everybody, even...

Words: 1179 - Pages: 5

Free Essay

Stuxnet

...form of security threat – cyber-attacks. Numerous advantages of the attackers in cyber space and a lack of attribution and awareness has resulted in an increasing number of aggressive operations in the digital realm. Contrary to the beliefs of many, cyber security is not exclusively a technical issue but also a matter of politics and economics. We can observe an increasing number cyber warfare policies in the international realm, which increases the pressure to establish rules of governance in cyber space. The following essay will be concerned with the Stuxnet worm and its role in Operation Olympic Games, which targeted the Iranian nuclear power plant Natanz. The analyses will provide an overview of the attack, including technical comprehension of the attack, and also looks at the attack in term of its political consequences. The first section will discuss the origins of the attack, building on Ralph Langner’s article published in ‘IEEE Software’. Even though numerous cyber offences took place before, it will explain what made Stuxnet stand out. The second part of the essay analyses the political perspective of the attack and two competing theories explaining the presence of malware in the nuclear facilities. The following section analyses the role of cyber warfare as viable military strategy. It will be argued that cyber offences appear to be more applicable as an offensive rather than defensive strategy, due to the attacker’s advantage. The last part of the essay will discuss...

Words: 2431 - Pages: 10

Free Essay

Realism Theory Focused Chinese – United States Foreign Policy

...taming the American power (Walt, 2005). China along with other nations are facing this daunting question of how to balance the power, even the playing field by striving to become a great power (Forsyth, 2008). This essay will address the realism theory focusing on the three of the instruments of power (IOP) as it applies to the Chinese foreign policy towards the US. To begin with, this essay will touch on Chinas fluctuating military stance. China continues to display the traditional realist view of balancing power plus states gain their power through war and military intimidation (Forsyth, 2010). Chinas strategic culture and historical record shows they are willing to use force to maintain security and power against the US. They are positioning their assets and “threatening potential US conflict over Taiwan” (Gompert & Phillip, 2011, 42). They’ve increased their military budget, showed capabilities by shooting down a satellite, and “acquired military capabilities-including anti-ship cruise missiles, ballistic missiles, and electronic countermeasure technologies—that could hinder US forces if they tried to operate in China’s neighborhood” (Walt, 2005). In conclusion, this on again, off again military stance is showing that China is fearful of its ultimate security. Second, I will address economics and international trade agreement that China has with the US. China has proven it is an economic force to be reckoned with, second only to the US. China welcomes continued...

Words: 898 - Pages: 4

Premium Essay

Cyber-Savvy Bombardments

...Written Assignment 3 “Documented Writing” Using the articles you have read for this module, search engines, and the EBSCO databases, write a 500-word essay on what you believe to be the greater threat to the nation—cyber crime directed against individuals or terrorist cyber attacks on national institutions. Provide your opinion on whether the United States is active enough in countering these threats. Cyber-Savvy Bombardments In the case of cyber attacks, where the results can vary from the annoying to the disastrous and destructive, there are no winners. I believe that both cyber crimes directed against individuals or terrorist cyber attacks on national institutions pose equal but different threats to our nation. Let’s take the recent news about a certain congressman who is claiming that his Twitter account was “hacked” resulting in a lewd photo being sent to a college student in Seattle (FoxNews.com 2011). Democrat Rep. Anthony D. Weiner who is a member of the Energy and Commerce committee from New Yorks 9th District (house.gov) uses the social media website Twitter to “tweet” with his followers. The media has jumped on board turning this into a national and even international spectacle, which makes this event annoying and possibly destructive to his career. If Congressman Weiner’s Twitter account was hacked “two broad possibilities exist: (1) the Congressman's Twitter account (and perhaps other accounts) were hacked, or (2) the Congressman or someone with authorized...

Words: 784 - Pages: 4

Free Essay

Pricewaterhousecoopers Competitor Intelligence Report

...PricewaterhouseCoopers Competitor Intelligence Report MGD 426HF Professor Tim Richardson Gabriela Rojas 998288160 Thursday, October 16th, 2014 Description of the business sector within which this enterprise operates: PricewaterhouseCoopers is an international professional services network that provides industry focused assurance, auditing, consulting and tax services for a variety of companies with the majority of their revenue coming from business to business relationships. The firm was established in 1998 after a merger between Coopers & Lybrand and Price Waterhouse and the name was shortened to PwC for rebranding purposes. (“Big four (audit firms)”1) According to company revenue records in 2014, PwC is currently the second largest professional services network in the world, and are considered one of the big four auditors, competing with Deloitte, EY and KPMG. (“Big four (audit firms)”1) In addition, PwC has firms across 157 countries with over 195,400 employees. Their total revenue in 2014 is around 34 billion dollars with 15 billion generated by their assurance service, 8.8 billion by their tax services, and 10 billion by their consulting services. (“Big four (audit firms)”1) Types of competition this enterprise faces: PwC is one of the big four auditing companies along with Deloitte, EY and KPMG, therefore making it an oligopoly. Oligopolies provide very similar products, where smaller firms follow the lead of the top four auditors in the industry and...

Words: 1777 - Pages: 8

Premium Essay

No Paper

...PAPER WRITTEN IN PARTIAL FULFILMENT OF THE ESSAY CONTEST ON CYBER CRIME BY ONUOHA, MAUREEN CHIZOBA C/O MR. DIKE G. OKORONKWO, PLOT 607 MONSTERRADO STREET, (NEAR RUSSEL CENTRE) WUSE ZONE 4, ABUJA, NIGERIA 2348055954286 27TH MAY, 2005 onuchizoba@yahoo.com INTRODUCTION Over the past twenty years, unscrupulous computer users have continued to use the computer to commit crimes; this has greatly fascinated people and evoked a mixed feeling of admiration and fear. This phenomenon has seen sophisticated and unprecedented increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The level of sophistication has gone high to the point of using the system to commit murder and other havoc. The first recorded cyber murder committed in the United States seven years ago according to the Indian Express, January, 2002 “has to do with an underworld don in hospital to undergo a minor surgery. His rival goon hired a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient”[i] This work seeks to define the concept of cyber-crime, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, we would look at how best to detect a criminal mail and in conclusion, proffer recommendations...

Words: 2267 - Pages: 10

Free Essay

Threatend Cyber Space.Docx

...increasingly using new information technology and the Internet to formulate plans, raise funds, spread propaganda, and engage in secure communications. Cyberterrorist- meaning the use of cyber tools to shut down critical national infrastructures(such as energy, transportation, or government operations) for the purpose of coercing or Intimidating a government or civilian population is clearly an emerging threat. (Dale Watson 2-6-2002) Cyberterrorism or digital terrorism cannot be concretely defined and has spurred significant debate over exactly what is means. Todays' battlefields have no national borders. Quickly describing terrorism is not easy work. However, cyber terrorism is specifically a premeditated publically or ideologically motivated attack or threat of attack against information, computer systems, programs, and data that can result in violence against civilian targets. Attacks are fast, easy and relatively inexpensive. The attack is a commission of a crime with the use of a computer and a network. Growth in the use of computers has caused computers to be a large part of illegal activities. The categories that we fall as a victim are Crimes committed using a computer as a target, as a tool, as incidental to computer use, or associated with the prevalence of computers. In most cases, caught cyber criminals have usually committed several types of crimes. The tools used required no extra training or financial aid. Many businesses that connect to large masses of people connect...

Words: 646 - Pages: 3

Premium Essay

Choose One Global Crime as a Case Study and Critically Evaluate the Effectiveness of the Transnational Policing of This Crime.

...Choose one global crime as a case study and critically evaluate the effectiveness of the transnational policing of this crime. This essay focuses on money laundering and argues the effectiveness of the transnational policing of this crime; money laundering is one of the world’s most prevailing organised crimes. This essay firstly defines policing from contrasting viewpoints of different philosophers as well as identifying modes of the police. I will explore the modes of policing and various definitions of policing; this essay considers definitions and approaches to policing through a transnational concept with influences from prominent figures within the ideology of transnational policing. The conventional process of money laundering is clarified together with implications of the how this global crime effects other crimes as well as society as a whole. Aided with two case studies I give examples of how money laundering takes place; taking into hindsight the effectiveness of the policing of money laundering. This essay also addresses the connection between money laundering and the risk society theory whilst also taking into consideration the contrasting views of domestic police modes and transnational police modes. Through addressing ways in which money laundering is combated through global organisations such as Interpol, I critically address significant notions of the policing of money laundering. Policing is typically understood as a method of crime control; however the...

Words: 3023 - Pages: 13

Premium Essay

Security Breach

...Cyber Attacks and Security: The Problem and The Solution Shamika A. Woumnm BIS/221 February 16, 2015 Gregorio Chavarria Cyber Attacks and Security: The Problem and The Solution In December of 2013, Target reported that up to 70 million customers worldwide were affected by a major security breach. It was reported that thieves stole massive amounts of credit and debit card information during the holiday season which also swept up names, addresses and phone numbers of their customers, information that could put victims at greater risk for identity theft. The Problem The Target breach is ranked as one of the worst ever. During the peak of the holiday season that year Target said that up to 40 million customers’ credit/debit card information had been stolen from people who shopped in their stores from November 27 to December 15. That following Friday that’s when another 70 million customers were affected, some of who, might have had their personal information compromised as well. Cyber criminals gained access to the computers entity and steered the information to a server in Eastern Europe to eventually sell on the black market card. According to the press, there when the two automatic intrutions alerts and installations of malware took place within the software and computer systems they were neither detected nor identified by the company. When there are security breach’s within a company it has a major effect on the company’s revenue...

Words: 558 - Pages: 3

Free Essay

Cyber Crime in Bangladesh

...about her, in all over the Bangladesh there are lots of women or girls who are facing problems of cyber crime and taking some deadly attempt. In the article “Cyber Crime” the author Supan (2015), he describes the definitions of cyber crime. To begin with, there are many cyber crimes which are actually women centered (morphing, cyber stalking, cyber pornography etc.). However, these types of cyber crime mainly destroy women’s reputation and the reason behind of this inexperienced in cyber world. Moreover, Supan (2015) morphing is basically done for blackmailing women or girls by changing their pictures using graphic animation. Furthermore, cyber stalking is another cyber crime which is done by former friend or ex-lover of women or girls with whom she shared her feeling and emotions, so they bother her taking this advantage. In addition, cyber pornography means criminals made a private video of a girl and upload it over the internet for destroying her respect. He also says, in our country dealing with rules and regulation for preventing cyber crime by information and communication technology act, 2006 (ICTA) and pornography control act, 2012 (PCA). The purpose of this essay is to analyze the article, discuss my points of agreement which include common effects (destroying reputation, create fear, harassing etc.) of cyber crime and also discuss my points of disagreements of which include cyber crime not only women centered. Reading the article has made it clear that Quazi MH Supan is targeting...

Words: 698 - Pages: 3

Premium Essay

Does America Have the Best Government

...Is the American Government the Best in the World? Taurean Gardner POL201: American National Government Instructor: Shawon Jackson-Ybarra 19 September 2015 I. The Constitution The American constitution has many strengths and weakness that make our political system best in the world. One major strength of the constitution is the believe that all men are created equal. One unique major weakness it can be extremely vague and it is a 100 years out of date. A way to enhance the strength and correct the weakness of the American constitution is to further push the believe, that all men are created equally, especially in the light of everything going on in today’s society. One way to fix the weakness is the update the constitution to modern language and make it easier to understand. “We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. - That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, - That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness. Prudence, indeed, will dictate that Governments...

Words: 2016 - Pages: 9

Free Essay

Cyber Crime

...What is Cyber Crime? The has been a remarkable increase in the use of technology in the past decades whether it is computers, mobile phones, iPods, iPads or computer games in both the personal and business sector. There has been significant change in all aspects of society, and new opportunities had risen in every field whether it is entertainment, business, sports, education, health, banking, telephones, air traffic control, electric power, and the stock exchange. The improvements in these industries are huge and now depend on information technology for their operation. This rapid increase and change in technology advance has confirmed that the twenty first century was the new information age. This extraordinary growth, as well as the increase in the capacity and accessibility of computers has brought about innovative changes within crime. Crime refers to breaking or violating the law or the command of an act which is forbidden by law. Countries across the world have different strategies practices when dealing with crime and this is contingent on the extent and nature of crime. According to Wikipidia.com the new type of crime known as cybercrime or computer crimes involves the use of network and a computer as either a tool or a targeted victim. Moreover, Joseph A E, (2006) explains cybercrime as crime committed on the internet using a computer as either a tool or a targeted victim. The computer is considered a target when the crime is intended directly to the computer. Cybercrime...

Words: 701 - Pages: 3

Premium Essay

Identity Theft Crime

...For this essay, I will go over if the government done enough to detect and deter the crime of identity theft. I will also go over how technology made identity theft easier to commit. Also for this essay, I will also go over how will emerging technologies changed the role of the cybercrime investigator. Sources used: http://www.cardhub.com/edu/identity-theft/http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.htmlhttp://www.pcworld.com/article/2453400/the-biggest-data-breaches-of-2014-so-far.htmland http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.html   The Fight Against Identity Theft Over the years people look at identity theft and say, “Oh it won’t happen to me. I don’t have a lot of money for people to want.” The thing is identity theft can happen to any with a Social Security Number, medical insurance, and any information useful to cyber criminals. Identity theft can occur when someone gains unauthorized access to someone’s personally identifying information. According to The Federal Trade Commission, there is about nine million Americans experience some form of identity theft. That number may be subjected to fluctuate because it can be consider both crime fighting tactics and methods that criminals use to steal identities over time but the FTC’s Consumer Sentinel Network received over...

Words: 606 - Pages: 3

Free Essay

Jurisdictional Issue in Cyber Crime

...Ad idem ‘12 | Jurisdictional Issues in Cyber Crimes | | | | | Arashdeep Singh Gurm Address: #181 Anand Nagar A, Gurudwara Street Patiala(147001) E-Mail Id: arashdeepgurm@gmail.com Contact Number: 7508729986,9646020181 RAJIV GANDHI NATIONAL UNIVERSITY OF LAW, PUNJAB Mohindra Kothi, Mall Road,  Patiala - 147 001 (PUNJAB) | ABSTRACT In this essay I wish to discuss the various types of crimes that are emerging with special reference to developing countries like India By developing we mean where growth of Information Technology is rampant but still it has not reached its peak. Cyber crimes can take place across various jurisdictions and hence the legal issue of jurisdiction of International Courts and country specific Indian Courts arises. Throw light on the present system in India, how it is ineffective and also upon international treaties and legal solutions to deal with the same. I have suggested possible ways to tackle the problem taking into consideration the domestic laws in India. The inefficiency of legislature to enact a more user friendly law is also examined in detail. Turning back our focus on the main legal dilemma of Jurisdiction of Cyber Crime Courts we have suggested a model that would be successful in India taking into consideration its working in other countries. In my concluding remarks a problem solution approach is taking where we have addressed the issue and after due consideration the solution is suggested. If proposal taken...

Words: 2824 - Pages: 12