Essay on Cyber Attacks

284 views 4 pages ~ 1012 words Print

Although the number of cyberattacks has increased in recent years, “most leaders still misjudge this risk and their cyber-adversaries” 2015 (Schlacter). It is feasible to argue that the decision-makers may disregard this issue because they are unaware of the risks and damages connected to cyber-attacks. Although many people are aware of the hazards connected with cyberattacks today, they may choose to overlook this problem because they believe the likelihood of their firm becoming a victim is low (Nugent, Collar and Emilio, 2015). Therefore, these individuals may be reluctant to invest their time, workforce, money and other resources on the matter they are convinced is not likely to occur.

Cyber-attack

When a group or an individual thwarts a cyber-attack, then they are considered to be heroic. This is because preventing cyber-attack helps in making the organizations and persons never to undergo various attacks, which are rampant in the society. The heroic act might be exploited as lessons learned or rather as various best practices, which can be used in controlling cybercrimes globally. Additionally, most of the individuals believe that their organizations are likely to spend more money and other resources in securing their systems and network by developing sophisticated technologies than the value of the loss that the company may incur in case of a cyber-attack. For that matter, the heroic acts of thwarting cyber-attacks will assist in ensuring that less amount is spent on cyber attacks as many people believe that more money will be required to implement effective cyber-security framework, which they would not be able to cover profitably (Maurer, 2016).

Threat Intelligence

Cyber-attack is not a simple issue. Therefore, recommendations to leaders would be necessary to help correct this deficiency. If the threat is relevant, actionable, and valuable, then leaders in an organization should develop and deploy cyber threat intelligence practices by ensuring that measures are put in place to counter any cyber-crime attacks, which might be felt in society. The leaders should be made to understand that cyber-attacks cases are on the rise and vulnerable networks are the primary targets of malicious hackers than systems which are more secure (Shouse, 2015). They need to know that a cyber-attack can be sponsored by the government or can be carried out by criminals which depend on it as their primary source of income. Hence, it is predictable that these hackers will use a more advanced form of attacks and they would never rest until a system that can benefit them or that contain valuable information is compromised (Matthews, 2015).

By recognizing and preventing the attack, the individual or rather a group were simply doing their job as well as implementing industry best practices in support of improving cyber security risk alleviation. The 1980s was characterized by an increase in the popularity of personal computers. This development led to an increase in a number of computer system hence increase in the number of potential targets. For the first time, potential targets of the cyber criminals increased and included a broad range of essential infrastructure. One of the main disadvantages of the expansion of computer system was an increase in software interest that led to the development of types of software piracy and other cyber crime related patents for the first time in history. For that matter, deploying cyber threat intelligence best practices, as an offensive measure was never justified. This was because an increased cases of the cyber attack made it possible for the deployment of cyber threat intelligence best practices to thwart the rampant cases of cyber crimes witnessed (Gobran, 2015).

Cyber-Threat Intelligence

New forms of crime emerge with the development of computer network system. Interconnection of computers nowadays has enabled cyber criminals to access the computer without their physical presence at the scene. Additionally, the possibility of software distribution through interconnected computer system enable cyber criminals to distribute malicious software. Therefore, cyber threat intelligence is essential since it covers technical information which gives exclusive indicators that might be employed in locating and mitigating present and future threats which might happen to a country or an organization. The information provided can give situational awareness concerning the landscape of the threat alongside assisting in comprehending who might be interested in attacking the state or rather an organization. However, the best practices on CTI might have both negative and positive outcomes. The development in CTI can compel many countries to begin the procedure of changing their rules and regulations related to the cybercrime to meet the existing requirements. It is clear from that this is not an easy matter. On the other hand, the major positive outcome is that CTI assists mitigating cyber-crimes, which bedevils the society nowadays (Cyber defense,2013).

Conclusion

In conclusion, development of computer networks, as well as an increase in the popularity of personal computers has led to an increased current cyber-security concern. Not only was the number of potential targets increased, but also there was the development of forms of computer viruses that could be distributed through the computer networks. Currently, cyber criminals continue to advance and develop their techniques and they are shifting focus on their focus targets to government and financial institutions.

References

Cyber defense - military training for cyber warfare, Full Length Documentary. (2013). Retrieved from https://www.youtube.com/watch?v=HnnvVnsDCGw

Gobran, A. (2015). Cyber terrorism threats (Order No. 1588500). Available from ProQuest Dissertations & Theses Global. (1683128117). Retrieved from Trident Library ProQuest.

Matthews, W. (2015). Building a cyber force. National Guard, 69(10), 20-24. Retrieved from Trident Library ProQuest.

Maurer, T. (2016). Global cyber-security norms face challenges. Jane’s Intelligence Review, 28(3) Retrieved from Trident Library ProQuest.

Nugent, P. D., Collar and Emilio, Jr, (2015). Where is the cyber security hero? Practical recommendations for making cyber security heroism more visible in organizations. International Journal of Computer Science and Information Security, 13(4), 1-5. Retrieved from Trident Library ProQuest.  

Schlacter, T. (2015). Cyber security: the best defense is a good offense, Mysterious Universe. Retrieved from http://mysteriousuniverse.org/2015/05/cyber-security-the-best-defense-is-a-good-offense/

Shouse, K. (2015). Actionability of cyber threat intelligence (Order No. 1603985). Available from ProQuest Dissertations & Theses Global. (1739017603). Retrieved from Trident Library ProQuest.

March 10, 2023
Number of pages

4

Number of words

1012

Downloads:

60

Writer #

Rate:

4.7

Expertise Understanding
Verified writer

Love the way Robbe works with legal papers. As a Law student, I had to deliver four different case study assignments. If you are in trouble, just get in touch with Robbe, and he will get things fixed for you!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro