Sunday, May 12, 2019
Cybercrime - reading critique Essay Example | Topics and Well Written Essays - 750 words
Cybercrime - reading critique - try out ExampleCyber criminals and terrorist groups are formed a nexus to destroy the US interests. US military is currently depending partly on the civilian technology services which can be misused/ exploited by the cyber attackers.Kinetic weapons, power of electromagnetic energy, malicious computer code etc are some of the most familiar methods of cyber attacks employed by cyber terrorists. Botnets (vast numbers of compromised computers that have been infected with malicious code, and can be remotely-controlled through commands direct via the Internet) are another major tool for cybercrime, because of its effectiveness and the easy use by even a non-skilled malicious user.The cyber attacks faced by Estonia in April 2007 revealed that political protestors may have rented the services of cybercriminals in come in to destabilize the government. Cyber criminals have already established alliances with drug traffickers in Afghanistan, the Middle East, and elsewhere where profitable ineligible activities are used to support terrorist groups. A coordinated attack on civilian and military computers by the cyber attackers may adversely affect the interests of US economy and the US military.Every action has equal that opposite reaction which is Newtons third law. It is true in the case of computers and internet as well. It is a fact that computers and internet have revolutionized the human life immensely. At the same time wish well most of the other great discoveries, internet can also be used for destructive purposes. When nuclear energy was discovered, people thought that it can be used for constructive purposes. But nowadays the humanity is undergoing the immense threat of nuclear weapons and a mathematical nuclear war. Same way it is quite possible that prominent countries may engage in cyber wars in order to destabilize other countries.Instead of utilizing the contributions of lore and technology for constructive purposes and collective growths, most of the prominent
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.