Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
Cyber Threats: Executive Summary
It is important to note, from the onset, that even before the personal computer became as popular and as widely used as it is today, vandals still compromised computerized phone systems either for fun or for economic benefit. During the very early decades of IT, computer attacks were mostly committed by insiders, i.e. disgruntled employees of an entity (de Leeuw and Bergstra, 2007). The said attacks in this case were largely limited to physical damage to computing devices. At the time, "the systems were not networked with other systems…" (de Leeuw and Bergstra, 2007, p. 706). This was, however, until vandals discovered new ways of making use of computer systems to turn a profit or register protests. During these early days of technology, criminals would commonly modify data after subverting security systems via mostly authorized access. With the spread of telecommunications technology during the 1960s, computer criminals started learning how penetrate networks and systems. Vandals would often subvert phone systems with their intention being theft of services or just for amusement purposes.
The appearance of ARPANET, defined by de Leeuw and Bergstra (2007, p. 706) as "the world's first packet switching network," is seen by many as having set the stage for cyber attacks. In linking computers in numerous universities and other companies, ARPANET effectively "linked hackers all over the country…" leading to the emergence of more sophisticated cyber attacks (de Leeuw and Bergstra, 2007, p. 706). It was, however, not until the 1980s that vandals with varying levels of programming expertise begun to write malicious software designed to self-replicate and interfere with the normal functioning of personal computers.
The early 1990s, as Casey (2011) notes, saw the introduction of the World Wide Web and hence greater connectivity across the world. With the increased utilization of the internet, computer criminals developed ways of gaining unauthorized access to systems that were poorly protected. The motivation for this was in most cases financial or political. As the decade progressed, penetration as well as subversion of computing devices became a common avenue for the perpetration of crimes of a financial nature. With operating systems being strengthened further in the mid 90s so as to limit the occurrence of computer crimes, vandals shifted to new attack vectors and retired earlier versions of malware (de Leeuw and Bergstra 2007). It was also at around this time that criminals started making use of new attack avenues -- email, with torrents of fraudulent and unsolicited emails being sent out to target corporations and individuals. Continued utilization of email as a method of corporate and individual communication and networking of computer systems gave rise to more serious forms of cyber attacks and criminal behavior that persist to date. These include identity theft, credit cart fraud, data diddling, etc.
Recent years have seen an unprecedented growth in both the frequency and severance level of cyber threats. Threats such as DoS attacks have evolved from just a typical interruption of access to a war tool. Today, DoS attacks are designed to not only cripple financial networks but to also bring down websites and make them virtually inaccessible.
Today, threats to the United States cyber infrastructure are not only increasing but also evolving. Since the early 90s, there have been concerns regarding the utilization of the components of telecommunications and the internet to launch widespread attacks and harm the interests of target governments and corporations. Of key concern has been the utilization of the said components to compromise the security interests of the country, especially given that the nation, as the Center for Strategic and International Studies -- CSIS (2014) points out, lacks effective protections against cyber attacks.
According to de Leeuw and Bergstra, (2007), there is a high likelihood that cyber crime and attacks are firmly on the path to professionalization. The authors support their assertion by pointing out that gone are the days when cyber crime was a province of idle and creative computer enthusiasts. Today, cyber crime, as the authors further point out, is big business. As a result, organized crime gangs are likely to show significant interest in this new 'opportunity' going forward.
One of the current forms of cyber threats most individuals fear could in future be modified is extortion attack, which has in the past been used against casinos by vandals. In this case, hackers attack casinos by launching what is referred to as Distributed Denial of Service…[continue]
"Cyber Threats Executive Summary It Is Important" (2014, April 22) Retrieved October 22, 2016, from http://www.paperdue.com/essay/cyber-threats-executive-summary-it-is-important-188414
"Cyber Threats Executive Summary It Is Important" 22 April 2014. Web.22 October. 2016. <http://www.paperdue.com/essay/cyber-threats-executive-summary-it-is-important-188414>
"Cyber Threats Executive Summary It Is Important", 22 April 2014, Accessed.22 October. 2016, http://www.paperdue.com/essay/cyber-threats-executive-summary-it-is-important-188414
Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year
Security Plan for the Maryland Public Safety Education and Training Center This paper will focus on a security plan designated for the Maryland Public Safety Education and Training Center. Here emphasis will be given on many things including facility assets that require protection, various threats which are directed towards the assets and the probability of loss. It is important to note that there are many complexes and facilities associated with the
Lufthansa Structure and Governance. Performance and Competition. Five-force analysis. Lufthansa is one of the oldest and most successful commercial airlines in the world, and is the fourth-largest in terms of passengers. However, the company has not always been so successful, and in fact was teetering on the brink of bankruptcy just a short while ago. By examining Lufthansa's history, structure, governance, and contemporary strategies and goals, one is able to see how the company
Assurance Program Why/How to create an Information Assurance Just as paramount as the availability and access to information is significant in every company or business outfit, certain concerns always come to the fore: the kind of information is to be made. How the information is going to be organized? How will it be possible to ensure that the information released represents the judgment of the management of the company and gives
Security Technologies and Methodology in the United States Air Force The objective of this study is to evaluate the effectiveness of security technologies and methodology in the U.S. Air Force. This work will first determine uncertainties and calculate the risk for each threat. This work will additionally identify any needed controls including technical, administrative and managerial controls. Finally, this work will describe the network security methodology and technology used in
Ethical and Legal Issues in Ecommerce A Concise Definition of ecommerce Motivation for E-Commerce Ethical and Legal Issues in E-Commerce Enforcement of Legal Directives and Contracts Collecting and Securing Consumer Information Lack of Uniform Laws Copyright and Patent Laws Violation Taxation Other Issues: In Brief Privacy and Security 'Extinction' of Some Small Businesses Electronic Deception Language Issues Declaration During the last one decade, the internet has experienced unprecedented growth. Thanks to this increase in online activity, consumers and businesses from all over the world are
Twelve ESL learners who participated subsequently found that participating in text-based online chat rooms promoted a noticeable difference in their face-to-face conversations, particularly in noticing their own linguistic mistakes. Psychologists stress little if any learning occurs without attention. "Text-based online chat, a particular form of synchronous computer-mediated communication (CMC) involving written oral-like conversation, has the great potential of increasing noticing for two reasons: 1. Compared to face-to-face conversations, CMC allows conversations