Sample Technology Research Paper on Cyber attack

Cyber attack

With advancement in technology, organisations and individuals at large have greatly benefited on basis that running of their affairs have become easier and efficient.  However, this vast knowledge in knowledge has been blamed by analysts as the main reason why there are frequent cyber-attacks of late. They argue that knowledge in technology is greatly assisting hackers whose motive is to access information about organisations or individuals for malicious motives. Many countries have at one time or another experienced these attacks with physical attacks being reported of late. Canada is one of the countries that has experienced a physical cyber-attack.  The surveillance system in their major city Vancouver was found compromised and totally malfunctioning (Lowe, 2014).  Interestingly, the systems were not switched off but they were not capturing anything.

Strategies should be employed to help in curbing of cyber-attacks on individuals and personal levels. Professionals should identify vulnerable areas where they are most likely to be attacked. After identifying this vulnerable areas, mechanisms or much attention should be focused on those areas. The strategies that may work on this kind of putting mechanisms in place to frequently evaluate or survey the working of the system. Creating awareness to the relevant stakeholders about the operations and safety measures regarding the cyber-attacks is an effective approach that can be considered b professionals (Wilbanks, 2001). Moreover, professionals have proposed that organisations and individuals should avoid having complex systems since fixing errors in case of an attack may be difficult.

The ‘internet thing’ will certainly play an important role in helping towards the defence of cyber-attack. The good relationship that may certainly develop between public and private organisations may facilitate this. This may be realistic in scenarios where private and public organisations agree to freely share information and keep this kind of information confidential restricting access from other quotas. Tracking or following the operations of the systems and sending of signals in case there is interference with physical infrastructures.

 

References

Lowe, M. (2014). Defending against cyber-criminals targeting business websites. Network Security, 2014(8), 11-13. http://dx.doi.org/10.1016/s1353-4858 (14)70080-7

Wilbanks, J. (2001). Outsourcing Internet Security: The Life You Save May Be Your Company’s. Information Systems Security, 10(2), 1-7. http://dx.doi.org/10.1201/1086/43314.10.2.20010506/31400.5