1,666
4
Essay, 2 pages (400 words)

Cyber attack

Cyber Attack Conventional computer security has its base on the taxonomy of security threats such as confidentiality, availability, theft and integrity (Amoroso 4). In the recent past, a new occurrence in the technologically interconnected world related to computer security called cyber attack emerged. Cyber attack refers to the use of computers and the internet to carry out warfare in cyberspace (Schiller 5). Most of people’s daily activities often rely on technological inventions and advancement made up of complex computer networks which form the cyberspace. In the modern society, cyberspace technology, “ instrument of power,” has become more susceptible to a country’s opponents. The opponents may utilize it to attack and disrupt communication and the information flow (Schiller 6).
The major types of cyber attacks include DDoS (Distributed Denial of Service) and using computers hijacked and infected with viruses to target websites (Apps). However, according to Apps, a new type of cyber attack which involves overwhelming data centres and crashing websites has evolved. The attackers are majorly nation states, criminal gangs, and diehard activists seeking a chance to hit their enemies. Apps further reiterates that the goals of the attackers include political activism, providing data theft distraction, extortion and some attackers just want to showcase their hacking skills. Prevention of cyber attacks requires the vulnerable parties to understand the critical assets that need protection and enhance the available security solutions for better detection of possible attacks and real-time response (Shackelford 267).
Cyberspace vulnerabilities raise tremendously important legal questions. In defining the legal issue, it is vital to know what constitutes an adversarial attack in cyberspace. While there is no clear statement in international law that outlines legally acceptable or unacceptable cyber defensive actions, there are legal principles that establish the rights to counter a cyber attack as a valid legal response to acts of aggression (Carr 278).
Works Cited
Amoroso, E. G. (2013). Cyber attacks: protecting national infrastructure. Amsterdam: Elsevier.
Apps, P. (2014, March 6). Increase in Cyber Attacks Costing Millions, Stressing Internet. Insurance Journal News. Retrieved June 5, 2014, from http://www. insurancejournal. com/news/national/
Carr, J. (2011). Inside cyber warfare: mapping the cyber underworld (2. Aufl. ed.). Sebastopol, CA: OReilly & Associates.
Shackelford, S. J. (2013). Managing cyber attacks in international law, business, and relations: in search of cyber peace (Revised ed.). Cambridge: Cambridge University Press.
Schiller, J. (2010). Cyber Attacks & Protection: Civilization Depends on Internet & Email. Seattle, WA: CreateSpace Independent Publishing.

Thank's for Your Vote!
Cyber attack. Page 1
Cyber attack. Page 2
Cyber attack. Page 3

This work, titled "Cyber attack" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Cyber attack'. 15 August.

Reference

AssignBuster. (2022, August 15). Cyber attack. Retrieved from https://assignbuster.com/cyber-attack/

References

AssignBuster. 2022. "Cyber attack." August 15, 2022. https://assignbuster.com/cyber-attack/.

1. AssignBuster. "Cyber attack." August 15, 2022. https://assignbuster.com/cyber-attack/.


Bibliography


AssignBuster. "Cyber attack." August 15, 2022. https://assignbuster.com/cyber-attack/.

Work Cited

"Cyber attack." AssignBuster, 15 Aug. 2022, assignbuster.com/cyber-attack/.

Get in Touch

Please, let us know if you have any ideas on improving Cyber attack, or our service. We will be happy to hear what you think: [email protected]