Malicious Attacks: Questions And Answers

Great Essays
1). Based on our discussion of various types of malicious attacks (Chapter 11), which two or three of them do you consider to be the most significant threat against government and political organizations, and why? Which threats may not be as great of a risk for those organizations, and why?
Malicious attacks tend to forcefully take advantage of or abuse some other ’innocent’ person’s computer with the intention of stealing the individual 's information or tamper with the functionality of the machine. These attacks can either be through phishing, social engineering or computer viruses. Political organizations and governments are prone to spying attacks which include Trojan horses, Spyware, and Adware (Edwards et al.,2008).). Political rivals are always in search of ways of pinning down their opponents and accessing their private information may aid this journey. These two attacks may be very helpful to
…show more content…
That planning style is all about immediate gratification. Whereas long-term viability planning is looking at how things are going to be helped over a long period of time. That kind of planning focuses more on the long-term effects of what the organization is doing, and trying to figure out what will be the most beneficial over time. Also, they strongly consider what will be the least detrimental over that time.

7. What are some of the ways that technology-based tools can support an organization’s operations in the face of a disaster? For example, in banking, customers might be able to use Internet banking to conduct their business, even if the bank branch is closed. What other technologies can an organization put in place or leverage to support its operations? Pick an industry to focus on and think about what technologies and services might work best for that industry. What critical points of failure might still be present that limit the effectiveness of these

Related Documents

  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Ultimately, an organization would implement a suite of plans to effectively and efficiently prepare response, recovery, and continuity activities for events causing disruptions in system and business processes. Since disaster recovery has an inherit relationship with business continuity, there must be a coordination between each plan during development, updates, and testing to identify duplicate efforts and remove counterproductive…

    • 2117 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    The Target breach ranks one of the worst ever security breaches in history. Not only did someone hack into Target’s security system, but it was during peak holiday months when Target stores are overrun with customers getting ready for the upcoming holiday. In this paper, the reader will learn about the history of cyber security attacks, the Target Security Breach in detail along with the future problems…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dear Professor Ross, You asked whether Conner Walsh could be charged with cyberstalking in connection to the text messages and Facebook posts sent from his personal accounts. The answer is probably not. In order to be found liable for cyberstalking the defendant must show repeated electronic communication that is, “directed at a specific person,” that, “serve[s] no legitimate purpose.” Leach v. Kersey, 162 So.3d 1104, 1106 (Fla. Dist. Ct.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Roles of Core Technologies in an Effective IT System Technology permeates all aspects of modern civilization. It is woven into the fabric of our daily lives. What was once barriers to knowledge and communication have been stripped down as we are now connected, in an instant, to the farthest reaches of the globe. With every new advancement comes an opportunity to usher in a revolution in how societies live, work, and play. The major players that make it all possible are the men and women who create and manage the technology we use today.…

    • 996 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Miller, J. and J. Miller., (2009). 21st Century Criminology: A Reference Handbook. 1st ed.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Office of Personnel Management reported individual information on 21.5 million people was bargained by the hack of the organization's examination database called e-QIP. OPM's endeavors to settle vulnerabilities in the framework used to oversee foundation examination information, known as Electronic Questionnaires for Investigations Processing (e-QIP). However, the recuperation on these individual’s information will forever be lost. In the domain of cybersecurity, the government houses information related to national security that follow cyber ethnics and the government is morally obligated to secure online database environments. Establishing polices relating to cyber ethical values include cyber incident complications immediately to all affected users.…

    • 1150 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Washington, a former aid to Democratic candidate Hillary Clinton has turned over security logs from Clinton’s private server to the FBI. Records of these security logs show no signs of foreign hacking. Former aid, Bryan Pagliano, describes how he initially set up the server in her home in New York. As secretary of the state, Clinton’s work related emails have been made public as part of the Freedom of Information Act lawsuit. After receiving sporadic emails, somebody clicked on a malicious link that was traced to Russia.…

    • 472 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    National Security Agency

    • 1122 Words
    • 5 Pages

    information systems. Also, NSA has become the lead agency responsible for monitoring and protecting all the federal government’s computer networks from acts of cyberterrorism. Therefore, NSA agents are responsible for detecting and exploiting weakness in an oppositional country’s computerized secret coding systems. The NSA’s function in protecting classified computer data demands an eclectic mix of agents who specialize in a wide range of professional fields, including researchers, computer scientists, mathematicians, and…

    • 1122 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    While attacks on institutions are ongoing, I believe that attacks on individuals are a greater threat to our nation. Institutions like the Department of Defense (DOD) or even the Federal Bureau of Investigation (FBI), are well protected and have protocols in place to counter cyber-attacks. Individuals, however, are less likely to practice good cyber-awareness therefore making these persons likely and susceptible targets to attacks. In an article published on cnbc.com, writers stated how vulnerable the United States is as a whole. After an in-depth interview with an expert in cyber warfare, cnbc went on to state, "Attacks such as the cybersecurity breach at the Office of Personnel Management in 2015, have reportedly given key information to governments like China that can be used to blackmail American citizens working with sensitive information" (Amaro, Gamble, 2018).…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Cyberattacks have become one of the biggest threats facing the United States today. Although Bill Clinton, George Bush, and President Obama have passed laws and put forward executive orders; cybercrime is still a prominent threat to our country. Obama further extended Bush’s Patriot Act through executive orders, improving the security to sixteen sectors by providing more in order to prevent future breaches and threats. Cybersecurity has become a prominent issue in politics and how our government reacts to cyber threats. The stakeholders from a political lens focus on how cybersecurity affects our government.…

    • 293 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    You may also find particular topics (e.g. leverage, inventory management, labor issues, marketing, financing, product development, etc.) interesting or…

    • 1234 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    As well as creating the legislature, public officials are creating back-up systems for their databases and information in case of a cyber attack. This is one of the best ways to thwart any cyber activity: by always staying one step ahead of the hackers (Kemp, 2012,…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays

Related Topics