Essay sample

Who Might Attack a Computer System and With What Motive?

Free ideas for

Cybersecurity is a constant and growing challenge. Although software is gradually becoming more secure and developers are creating novel approaches to cybersecurity, attackers are becoming more adept and better equipped

And as the world embraces more digital and hyperconnected components, the paths become more numerous for attackers to gain access to our most sensitive information.

Free ideas for

In real life we make decisions every day about the best way to provide our security. For example, although we may choose to live in an area that is not prone to earthquakes, we cannot entirely eliminate earthquake risk. Some choices are conscious, such as deciding not to walk down a dark alley in an unsafe neighborhood; other times our subconscious guides us, from experience or expertise, to take some precaution. We evaluate the likelihood and severity of harm, and then consider ways (called countermeasures or controls) to address threats and determine the controls’ effectiveness. Computer security is similar. Because we cannot protect against everything, we prioritize: Only so much time, energy, or money is available for protection, so we address some risks and let others slide. Or we consider alternative courses of action, such as transferring risk by purchasing insurance or even doing nothing if the side effects of the countermeasure could be worse than the possible harm. The risk that remains uncovered by controls is called residual risk. A basic model of risk management involves a user’s calculating the value of all assets, determining the amount of harm from all possible threats, computing the costs of protection, selecting safeguards (that is, controls or countermeasures) based on the degree of risk and on limited resources, and applying the safeguards to optimize harm averted. This approach to risk management is a logical and sensible approach to protection, but it has significant drawbacks

In reality, it is difficult to assess the value of each asset; as we have seen, value can change depending on context, timing, and a host of other characteristics. Even harder is determining the impact of all possible threats. The range of possible threats is effectively limitless, and it is difficult (if not impossible in some situations) to know the short- and long-term impacts of an action. For instance, Sidebar 1-3 describes a study of the impact of security breaches over time on corporate finances, showing that a threat must be evaluated over time, not just at a single instance.

Free ideas for

Earlier hackers were considered to be genius because they helped in many ways in the development of computers and internet technology as such, but in this modern world where personal benefit has played a major importance in one’s life, people are often attracted to things they can do and gain through illegal entry into people privacy and using for their own benefits (Banks, Michael A. (1997)

Different motivations and opinions have been discussed in this paper, but if we consider them as a person they are a live example of genius because of their abilities of doing the unbelievable and unachievable by getting more involved into the programming and understanding the loop holes in the security systems. I think because of these, scientists and researchers have spent lots of technology to improve the systems security and make them more secure so that no illegal access can be gained. In my own view understanding the different perspective of a hacker, we can develop a much more secure and much more sophisticated environment and provide a safer world for transactions and online shopping. The bad things of them should be taken into good only to benefit our country and its progress (Crucial paradigm (2003).

Free ideas for

Overall, simply put, a cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Cyber attacks can be broken down into two broad types: attacks where the goal is to disable the target computer or knock it offline, or attacks where the goal is to get access to the target computer's data and perhaps gain admin privileges on it.

Free ideas for

Banks, Michael A. (1997), ‘Web psychos, stalkers, and pranksters: How to protect yourself online’. Arizona (USA).

Chakrabati, Anirban and Manimaran, G. (2002), ‘Internet infrastructure security: A Taxonomy’, IEEE Network, November/December 2002, P.13.

CNET (2001), FBI “hack” raises global security concerns

Crucial paradigm (2003), Hacking attacks-How and Why.

Was this essay example useful for you?

Do you need extra help?

Order unique essay written for you
essay statistic graph
Topic Popularity