DissertationProspectus: Cyber Attack in Computer
DissertationProspectus: Cyber Attack in Computer
Acyber attack describes the malicious manipulation of infrastructure,computer programs/networks, and information systems. The goal of acyber attack is often to allow access to sensitive information likelyto aid in the alteration, manipulation or destruction ofcomputer-related systems (Koppel, 2015). In some cases, informationand access to computerized systems enables the execution ofcomputer-generated warfare between nations, cyber crimes, and virtualterrorism (Waseem, 2013). Although most attacks target corporationsand government agencies, there are cases where attacks happen onindividual computer devices such as laptops and mobile communicationdevices.
Therehas been an increase in the number of cyber attacks happening everyyear. According to Symantec’s InternetSecurity Threat Report, thenumber and methods of attack continue to evolve, thus necessitatingan elaborate analysis of the situation and development of protectionmeasures. The report indicates that in 2015, there was theft of 429million personal records and exposure of many more to attacks owingto vulnerabilities in computer information systems (Symantecs, 2016).The report speculates that the number was lower than the actualattacks that occurred, citing the reluctance of companies to admitbreaches in their systems. The report also indicates that the use ofstrategies such as the application of Ransomware increased by 35 % toa total of 55% during the year (Symantecs, 2016). Ransomwaredescribes the use of specific software in attacks that renderscomputerized devices useless. Attackers then demand a ‘ransom’ torestore function to the devices (Karnouskos, 2011).On a muchlarger scale, governments continue to adopt cyber attacks into theirwarfare strategies as was evident in the Stuxnet attack on Iran’snuclear program.
Asthe speed of technological advancements increases, so does theseverity of consequences of cyber attacks on individuals,organizations, and nations. The situation creates a necessity tounderstand the intricacies of cyber attacks and establish possiblestrategies to mitigate the impact of such attacks in addition toreducing and preventing attacks in the future (Rozens, 2016). Forinstance, it is important to understand the purpose and use ofprotective software.
Itis also vital to understand the impact of government interventionstrategies. Individuals, organizations, and government agencies needto be aware of the effects of development and implementation of lawson the efficiency of use of technological devices (Roer, 2015). Ascountries begin to understand the importance of policies in curbingthe growth of cyber attacks, users need to understand and prepare forchanges, as well as restrictions in the use of technology.
Theresearch operates on the premise that cyber attacks occur for varyingreasons and that the development of solution is contingent on thecauses for specific attacks. The research will explore each reasonindividually, provide evidence for each and recommend appropriatesolutions. The second presumption is that lack of adequate governmentpolicies regarding cyber-activity has contributed greatly to thepersistence of the problem. The paper explores legislation fromcountries most affected by the vice to establish the viability of thestatement.
Statementof Research Purpose
Theprimary purpose of the research is to highlight the severity of theproblem and the need for intervention measures that cater for thecauses of the attacks. The research also aims at identifying possiblesolutions and effective implementation. Lastly, the research hopes toexpand available scholarly resources on the subject.
ProposedGeneral Approach to Research
Theresearch is primarily quantitative. It involves the exploration ofsecondary data sources on the subject for analysis of thepresumptions above. The primary advantage of quantitative research isthat it utilizes available data sources and reduces the amount oftime sent on data collection.
of Proposed Research Methods
Themain research method will be review of available literature andstatistical data. Analysis of varying literature will facilitate thegeneration of an objective conclusion. The literature review willalso enable the exploration of perspectives while reducing personalprejudice on specific topics.
Karmouskos,S. (2011). Stuxnet Worm Impacton Industrial Cyber-Physical SystemSecurity. In: 37thAnnual Conference of the IEEE Industrial Electronics Society(IECON,2011). Australia:Melbourne. Retrieved fromhttp://papers.duckdns.org/files/2011_IECON_stuxnet.pdf
Koppel,T. (2015). LightsOut: A Cyberattack, A Naton Unprepared, Surviving the Aftermath.New York: Crow
Roer,K. (2015). Buida Security Culture(Fundamentals Series). New Jersey: ITGP
Symantec(2016). InternetSecurity Threat Report. Accessedon 17/09/2016. Retrieved fromhttps://www.symantec.com/security-center/threat-report
Wassem,A. (2013). Pakistani hackers deface over 1000Indian Websites. TheNews International. Retrieved17/09/2016.http://www.thenews.com.pk/Todays-News-13-22095-Pakistani-hackers-deface-over-1000-Indian-websites