Cyber-Attacksin Computer Science
Cyber-Attacksin Computer Science
Theconcept of cyber security is nothing new in the modern world. Therising cases of cyber-attacks have led to the need for cybersecurity. Cyber-attack is a common phenomenon and a dilemma in themodern society there has been a continued rise in attacks on themain corporations, even government institutions are targeted(Cavelty,2014).That is the reason why corporations have been the forerunners indeveloping initiatives to curb this phenomenon. Such efforts includeholding conferences, followed by funding various technology andresearch institutions. Apart from cooperations, federal governmentshave recognized cyber security as one of the highest forms of threatsthat nations are currently facing. With a click of a button, anattacker can bring down the whole economy of a country. Thisconceptual framework will cover elements like the topic reviewed inliterature, assumptions about cyber security and research question.
Theliterature review to be used in the study is the contextual one. Theessay looks into recent studies that have aided in the definition, aswell as the reader’s understanding of the settings in whichcyber-attacks have occurred (Cavelty,2014).It is by analyzing professional or research-based peer-reviewedpublications or scholarly books developed at the beginning of theissue and identified as relevant to the study or was cited by otherscarrying out the same literature(Hong,Liu & Govindarasu, 2014 Balzacq& Cavelty, 2016). More so, there is the need to considertechnical or research-based (typically peer reviewed) publicationswithin the last five years and are recognized as relevant to thestudy. One of the topics to account for is the wireless network. Itis defined as a collection of nodes in the network. It is one of thefacilitators of cyber-attacks because hackers can use WIFI to getinto any system using the same network (Choucri, Madnick &Ferwerda, 2013). Another issue is the type of attacks that take placein cyberspace and their different forms and applications. Thus, thereview is poised to enumerate the risk associated with third partyapplications such as data privacy and integrity.
Myassumption when dealing with cyber security is to assume that theattacker knows the system better and can launch an attack anytime.The assumption will help those dealing with cyber security to thinklike a hacker to seal the loopholes before an assault. Similarly, itis best to assume that the system is open and vulnerable to anyattack. The assumption is helpful when analyzing the system as itprevents biases. The assumptions will help the cyber securityanalysts to prevent the cyber-attacks before they occur. However,some of the assumptions may not hold in the actual study.
Thethreat of cyber security is growing steadily. In the current age ofinformation, organizations are heavily dependent on cyberspace, whichis evolving as a critical aspect of organizational security. Variousinfrastructures set up by organizations are currently connecting inthe cyberspace. It has dramatically increased the risk level tonational security(Choucri,Madnick & Ferwerda, 2013). Some of the preferred targets forcyber-attacks have been colleges and universities’ computer systemsas they have been found to store the same information as banks. Ithas resulted in various academic institutions to continuously keephandling issues related to malicious software, peer to peer dataleakage, and phishing, among other attacks. The definition of a cyberattack, in this case, can be a deliberate action, which at times isdone over a period to alter, disrupt, deceive, or destroy computernetworks or infrastructure, or programs for individual gains(Ben-Asher& Gonzalez, 2015).So, do such attacks have direct or indirect effects on businessesthat rely on the infrastructure or system or network?
PartII: Visual Presentation
Balzacq,T., & Cavelty, M. D. (2016). A theory of actor-network forcyber-security. EuropeanJournal of International Security, 1(02),176-198.
Ben-Asher,N., & Gonzalez, C. (2015). Effects of cyber security knowledge onattack detection. Computersin Human Behavior,48(2015),51-61.
Cavelty,M. D. (2014). Breaking the cyber-security dilemma: Aligning securityneeds and removing vulnerabilities. Scienceand engineering ethics,20(3),701-715.
Choucri,N., Madnick, S., & Ferwerda, J. (2013). Institutions for CyberSecurity: International Responses and Global Imperatives. InformationTechnology for Development, 20(2),96-121.
Hong,J., Liu, C. C., & Govindarasu, M. (2014). Integrated anomalydetection for cyber security of the substations. IEEETransactions on Smart Grid,5(4),1643-1653.