¶ … Business Messages
Send to:
Andrea, Tech. Rep., CIS
Copy To:
Janet, Supervisor,
Jack, Manager, CIS
Information Services
Potential Threat to Company IT Systems
Over the past few weeks, it has become increasingly evident to me that our company may be the target of a denial of service attack or other computer virus for which we may be ill-prepared today. In this regard, I have reviewed the company standing operating procedures concerning computer viruses in an attempt to determine what measures should be taken by whom and when. Unfortunately, the company's SOP does not even address denial of service threats and only mentions computer viruses in a tangential way.
To help address this apparent gap in the company's ability to respond to threats to the integrity of its IT systems, I believe we should form a task force immediately to develop appropriate responses in the event of a computer virus infection in general and a denial of service attack in particular. The specific issues to be addressed by the task force should include: 1) availability of alternative IT systems during periods of downtime for whatever reason, but specifically for this threat; 2) what event or events will trigger a response by the company; and 3) who will be primarily responsible for coordinating the response? This email is being sent to Andrea based on her expertise in this area and to Jack to solicit his assistance in getting the ball rolling as soon as possible on this effort.
Based on past experience in other companies and the daily news reports, the importance of this matter cannot be overstated; if these steps are not taken immediately, it will not be a matter of if a computer virus will infect the company's IT system, but it will rather be a matter of when.
Please let me know if you have any questions, or if I can be of any assistance in coordinating this task force.
This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.
Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism. Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth,
These attacks result in billions of dollars in damage to the United States and other global economies. Although technology is becoming more secure, cybercrime has increased as Internet use has risen. In fact, according to the Computer Emergency Response Team (CERT) Coordination Center at Carnegie Mellon University, the number of cybersecurity incidents more than doubled to nearly 53,000 last year. In the first three months of 2002 alone, CERT counted
Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of
computer virus is among the greatest enemy of computer technology's globalization. In just a few split of seconds, it can turn our endeavor of automating our diverse activities into a nightmare. This is especially a catastrophe to businesses whose operation at a large percentage depends on computerized data access and retrieval. Globally, computerization is the trend among businesses. Thus, the damage that computer viruses can cause is a global
Essay Topic Examples 1. The Evolution and Impact of Computer Viruses on Cybersecurity: This essay explores the history of computer viruses, detailing their progression from simple self-replicating programs to complex malware that can cause significant damage to digital infrastructure, steal sensitive data, and compromise personal information. It discusses the impacts on individuals, businesses, and governments, and the growing importance of robust cybersecurity measures. 2. Cyber Fraud and Its Effect on the Global Economy: The
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now