Cyber Security Threats and Possible Solutions

Document Type:Thesis

Subject Area:English

Document 1

Consequently, individuals are unable to protect themselves and their vital information from the cyber-attacks. With the increase of the recent higher profile breaching in both the public and private sectors, those in power should be held responsible and reaffirm their commitments to protect the vital organizations and companies or individuals information. Generally the cyber-attacks compromises the security of many companies and organizations across the world are most designed to syphon money from such organizations and companies due to the access of some vital information. In addition, they create am interruptions in the world and accesses there data of high quality. Therefore, this proposal paper will outline the background of the cybercrimes, various forms of cybercrimes and their possible solutions. At one endpoint, there are various crimes that involve fundamental breaches of some personal and corporate information.

Sign up to view the full document!

This affects the integrity of the information that is held in the digital depositories and the use of the illegally extracted digital information, this is also known as blackmail (Cleveland, 2008). In the midway of this platform of cyber-crimes lies a crime of fraud, digital piracy and money laundry. These are normally specific crimes with specific individuals but the crime is always provided by the internet. Examples of Cyber Attacks A cyber-attack refers to any form of offensive activity that mainly targets the key information in a computer system, infrastructure and compare networks. Ping of Death Attack This form of cyber-attack normally uses the IP packets to ping a target system with an IP address over the maximum of 65534 bytes. Normally the IP address of this kind is allowed.

Sign up to view the full document!

Therefore, the attacker will definitely fragment the IP packet. Once the target already resembles the packet, it can experience the buffer overflows as well as other crashes. This kind of attack can be controlled by mainly using the firewall that will evaluate the fragmented IP packets for maximum size (Tsai & Chan, 2007). Through being honest, individuals will accept the multilateral arrangements to protect their critical infrastructure and the commerce as well thus leaving the traditional forms of the military activities and the intelligence unregulated (Blakemore, 2016). In addition, the private companies and the organizations, as well as individuals, should use should use strong encryption or make use of the open source software which does not have the built-in vulnerabilities. References Blakemore, B. Policing cyber hate, cyber threats and cyber terrorism.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable