Encryption, Stenography & Cyber Criminal Terrorist Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The internet and the ICT system as a whole are vulnerable to cyber attacks. These cyber attacks emanate from hackers and other cyber criminals who use malicious viruses to achieve their selfish goals. It is therefore important to fully understand the nature of these attacks and come up with appropriate measures to protect our systems and networks. This paper is an attempt to analyze the basic attacks on cyberspace.

Cyberspace has become the focal point for terrorism, crime and antisocial behaviour. It is often used by group of criminals to target the ICT systems and prey on individuals, organizations, government information, and personal identities. Hackers engage in such heinous acts with a view to harming others, propagating certain beliefs and ideologies, and to destroy the information infrastructure (Schiller, 2010).

Fraud

In recent years, the cyberspace has become a hot bed for frauds and scams they use it to solicit money from unsuspecting individuals. The best example of this is an article that was featured on the UK Telegraph in 27 September 2011. The article reported that over 20, 000 people have been the victims of internet romance fraudsters. These sites are managed by fraudsters who often appeal to internet users to send money online via credit cards before they can subscribe to these sites. Fraudsters have also devised ways of stealing the accounts of people that appears on the internet auction sites through phishing techniques (Graham et al, 2009).

Cyber attack

Cyber attack appears in different forms ranging from espionage to sabotage to breaching the security of certain government by obtaining classified information or top secrets. The motive behind such moves is to achieve a political or military goal, if not to destroy the infrastructure (Amoroso, 2012). The best example is when hackers attacked the websites belonging to the Pakistani Army and other government ministries on November 26, 2010. This move was revenge to the Bombay terrorist attacks (Express Tribune, 2010).

Intellectual property theft

This is the process of obtaining information and knowledge from someone without their permission. The best example of intellectual property theft is when a hacker gained unauthorized access to the ICT systems’ database of SK Communications in South Korea in July 2011 and personal identities of over 35 millions people. The hackers used the Trojan software to jam the system before gaining access (Command Five Pty, 2012). Such attacks are used for the purpose of stealing the intellectual property of an organization, government agencies or individuals by obtaining secret information from them (Amoroso, 2012).

Denial of service

This is the process of prohibiting someone from gaining access to their own website or email. The best example is when several attacks were carried out on important websites belonging to financial institutions, news agencies and governments in the US and South Korea. The origins of these attacks originated from the UK (Sudworth, 2009).

Conclusion

Although ICT systems have revolutionized the world and humanity, they are very vulnerable to criminal attacks. Cyber criminals often used the internet to engage in fraud and intellectual theft. It is therefore imperative that our computers systems are protected from hackers. These hackers use message boards, chats houses, emails and the internet to gain access to other computer systems. One way of protecting our computers is with steganography to protect the transmission of messages. This is the method of using to trademark to protect our images and copyright on our intellectual properties. We should also update the antivirus softwares in our computers systems.

Reference List

Amoroso, E. G. (2012). Cyber attacks: Protecting national infrastructure. Oxford: Butterworth-Heinemann.

Command Five PTY 2012, SK Hack by persistent threat, Web.

Express Tribune 2010, 36 Government sites hacked by ‘Indian Cyber Army’, Web.

Graham, J., Howard, R., Thomas, R., Winterfeld, S., & Bryan, K. (2009). Cyber fraud: Tactics, techniques, and procedures. Boca Raton: CRC Press.

Schiller, J. (2010). Cyber attacks & protection: Civilization depends on Internet & email: using research from the Internet. Scotts Valley, Calif: CreateSpace.

Sudworth J 2009, New cyber attacks hit South Korea, Web.

Telegraph 2011, 200,000 fall victim to internet romance scams in UK, Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, September 14). Encryption, Stenography & Cyber Criminal Terrorist. https://ivypanda.com/essays/encryption-stenography-amp-cyber-criminal-terrorist/

Work Cited

"Encryption, Stenography & Cyber Criminal Terrorist." IvyPanda, 14 Sept. 2022, ivypanda.com/essays/encryption-stenography-amp-cyber-criminal-terrorist/.

References

IvyPanda. (2022) 'Encryption, Stenography & Cyber Criminal Terrorist'. 14 September.

References

IvyPanda. 2022. "Encryption, Stenography & Cyber Criminal Terrorist." September 14, 2022. https://ivypanda.com/essays/encryption-stenography-amp-cyber-criminal-terrorist/.

1. IvyPanda. "Encryption, Stenography & Cyber Criminal Terrorist." September 14, 2022. https://ivypanda.com/essays/encryption-stenography-amp-cyber-criminal-terrorist/.


Bibliography


IvyPanda. "Encryption, Stenography & Cyber Criminal Terrorist." September 14, 2022. https://ivypanda.com/essays/encryption-stenography-amp-cyber-criminal-terrorist/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1