Verified Document

Terrorist Attack What Type Of Term Paper

A LOIC is software tool that aims a massive flood of traffic at a targeted site. This "weapon" disrupts communication or access, which renders the website useless (Moore, 2005). Your own analysis and feedback about the attack?

The attack by Anonymous highlights the growing threat of cybercrime and the need to subsequently defend against it. Fortunately this attack didn't compromise private consumer information and files. However, as technology continues it rapid advancement, the possibility of a devastating attack increases. Technology, in regards to risk management, has created very unique circumstances by which companies must account for. This recent attack from Anonymous proves as much. Threats of cyber attacks, identity theft, hacking, and the spreading of computer viruses can all can adversely effect business. As such, prudent risk managers must account for these threats as they enter into a more global environment. In particular cyber attacks will become a serious problem over time. Attacks on servers and financial institutions are now becoming more common. As the proficiency of hackers becomes more adept and infringing on consumer rights, the threat of attack becomes more apparent. Over time, and as technology advances, the threat of cybercrime will grow exponentially. Businesses must therefore...

Copyright infringement undermines many of the tenets of capitalism. As such, the DOJ has every right to protect the free market economy of America. By allowing infringement, what incentive do individuals have to innovate if their copyrights are not protected? The DOJ action sends a message to other firms operating in the United States that copyright infringement is not tolerated. As such, I believe this action was warranted. However, as technology becomes ubiquitous, it will become very difficult for the DOJ to protect both consumers and companies from the actions of hacking groups. As such, I believe a more coordinated effort on the part of both the public and private sectors to prevent future attacks is needed (David, 2007).

Sources used in this document:
References:

1) David Hillson (2007). Practical Project Risk Management: The Atom Methodology. Management Concepts. ISBN 978-1-56726-202-5

2) Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing

3) Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010, pp.75- 91
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now