Monday, 19 February 2018

Examining the Threat from Cyber Attacks and Cyber Security


For more essays on Cyber Attacks, Cyber Security and related topics visit
http://academicresearchtutor.com

Examining the Threat from Cyber Attacks
The extent of the benefits and demerits of use of computer networks is a raveling technological advancement, which is developing. Computer networking has led to technological advancements but at the same time, it provides avenues for the execution of malicious activities (Hathaway et.al, 2017). All over the world, the dependence of organizations on network sharing of computers is unquestionable. Organizations ranging from small companies to large companies and even average users of computers perform networking actions. In the 21st century, almost everyone has an electronic device capable of connecting to the internet and by extension to the world. Home appliances, alarm systems, motor vehicles, security surveillance systems and smart watches all access the internet, which is a network of computers. The inception of the World Wide Web eased communication and made it faster as opposed to before. With the recent increase in technological advancements, many users of computers are embracing the virtual world of information sharing. Global transactions rely on the internet as a vital provider of a connection, which networks people together. The government, local entities, and the state rely on the internet as a mode of communication.
Unfortunately, the internet is increasingly used for ulterior motives by hackers who use the network as a gateway to attack organizations and companies. The hackers are careful enough not to be detected or identified ((Li & Li, 2017). According to Roel Schouwenberg who serves as a researcher at a leading computer security firm called Kaspersky, hackers are now using insidious weapons to attack crucial infrastructure such as banks, water supplies, power plants, and even nuclear facilities. In June 2010, an insidious weapon in the form of a worm ran down Iran’s nuclear plant after it infected the software of other industrial sites. As opposed to viruses that await an unsuspecting user to install it, a worm transmits itself once a connection is available (Kadivar, 2014). The worm used in this cyber-attack was called Stuxnet. According to Collins & McCombie (2012), the worm is described as highly sophisticated and difficult to identify hence causing a lot of destruction before being identified.
The usage of networks for malicious activities such as cyber-attacks invokes concerns about the cyber security and what implications it may have in the future. Cyber attacks conducted via networks show a transition from the ages when only bombs could be used to wage wars (Nye, 2013). Regrettably, these attacks can be directed to specific organizations to advance external agendas of a malicious nature. The security unit in the Federal Bureau of Investigations asserts that cyber-attacks are increasingly becoming more sophisticated and it fears they might become unstoppable (FBI, 2017). The imminent threat posed by cyber attacks raises concerns if world conflict and traditional warfare is changing. Unsubstantiated reports point out that geopolitical warfare might be morphing as was the case of Stuxnet in which United States and Israel were implicated for the attack in Iran (Margulies, 2013). According to Kasperskey security engineers, cyber-attacks can be conducted for financial gain or even have political motivations (Waxman, 2011). The attacks expose political ramifications as a result of states sponsoring covert action against another state.


References
Brantly, A. F. (2014). Cyber actions by state actors: Motivation and utility. International Journal of Intelligence and CounterIntelligence, 27(3), 465-484. doi:10.1080/08850607.2014.900291 (accessed December 9, 2017).
Denning, D. E. (2012). Stuxnet: What has changed? Future Internet, 4(4), 672-687. doi:10.3390/fi4030672 (accessed December 5, 2017).
Federal Bureau of Investigation. (FBI) 2017. What We Investigate-Cyber Crime, https://www.fbi.gov/investigate/cyber. (accessed December 9, 2017).
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 100(4), 817-885 (accessed December 8, 2017).
Kadivar, M. (2014). Cyber-attack attributes. Technology Innovation Management Review, 4(11), 22-27. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1638204721?accountid=8289 (accessed December 4, 2017).
Margulies, P. (2013). SOVEREIGNTY AND CYBER ATTACKS: TECHNOLOGY'S CHALLENGE TO THE LAW OF STATE RESPONSIBILITY. Melbourne Journal of International Law, 14(2), 496-519. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1626835110?accountid=8289 (accessed December 4, 2017).
Nye, J. S. (2013). From bombs to bytes: Can our nuclear history inform our cyber future?. Bulletin Of The Atomic Scientists69(5), 8-14. doi:10.1177/0096340213501338 (accessed December 5, 2017).
Waxman, M. C. (2011). Cyber-attacks and the use of force: Back to the future of article 2 (4).
Collins, S., & McCombie, S. (2012). Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing, Intelligence and Counter Terrorism7(1), 80-91.




For more essays on Cyber Attacks, Cyber Security and related topics visit
http://academicresearchtutor.com




No comments:

Post a Comment

Balsa Glider Project Assignment

Balsa Glider Project Assignment #2 An APA paper must be submitted which includes the following sections (with headings): Prototype...