Cyber Espionage Attacks And Cyber Attacks

1662 WordsApr 20, 20167 Pages
Cyber Espionage Attacks This kind of attacks differ from other types of cyber-attacks as they have a different source from where the actual attack comes from, which is mainly from within the organization that is being attacked. It may be the most difficult type of attack in which organizations are able to defend themselves from, for example if the attack is emanating from an individual that holds a high rank within the company. Taking an example of the United States where the government has a process in place where it issues security clearances and the main idea behind this is to prevent the employees that are likely to perform espionage type of attacks not to gain access to classified or crucial information but however, the system has still not proved to be effective. So considering the types of attacks out there and the extremism with which they have potential to cause harm, it is clear that the threat posed by cyber-attacks is a very deadly one. Cyber-attacks have different origins from which they can be executed and the minds behinds those attacks may range from teenagers who are simply being mischievous, playing dare games, to identity thieves or groups that are after peoples’ financial information and identities to the most dangerous who might be enemy countries or terrorist groups who are mainly motivated by acquiring crucial information to instill harm to that particular nation or individual. Ashmore, W. C. in his journal Impact of Alleged Russian Cyber Attacks
Open Document