Terrorist Attack What Type of Term Paper

Total Length: 776 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

A LOIC is software tool that aims a massive flood of traffic at a targeted site. This "weapon" disrupts communication or access, which renders the website useless (Moore, 2005).

Your own analysis and feedback about the attack?

The attack by Anonymous highlights the growing threat of cybercrime and the need to subsequently defend against it. Fortunately this attack didn't compromise private consumer information and files. However, as technology continues it rapid advancement, the possibility of a devastating attack increases. Technology, in regards to risk management, has created very unique circumstances by which companies must account for. This recent attack from Anonymous proves as much. Threats of cyber attacks, identity theft, hacking, and the spreading of computer viruses can all can adversely effect business. As such, prudent risk managers must account for these threats as they enter into a more global environment. In particular cyber attacks will become a serious problem over time. Attacks on servers and financial institutions are now becoming more common. As the proficiency of hackers becomes more adept and infringing on consumer rights, the threat of attack becomes more apparent.
Over time, and as technology advances, the threat of cybercrime will grow exponentially. Businesses must therefore be proactive in their prevention of cybercrime as it relates to their overall business operations.

I personally applaud the DOJ for their actions against copyright infringement. Copyright infringement undermines many of the tenets of capitalism. As such, the DOJ has every right to protect the free market economy of America. By allowing infringement, what incentive do individuals have to innovate if their copyrights are not protected? The DOJ action sends a message to other firms operating in the United States that copyright infringement is not tolerated. As such, I believe this action was warranted. However, as technology becomes ubiquitous, it will become very difficult for the DOJ to protect both consumers and companies from the actions of hacking groups. As such, I believe a more coordinated effort on the part of both the public and private sectors to prevent future attacks is needed (David, 2007)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Terrorist Attack What Type Of" (2013, February 05) Retrieved May 20, 2024, from
https://www.aceyourpaper.com/essays/terrorist-attack-type-85707

Latest MLA Format (8th edition)

Copy Reference
"Terrorist Attack What Type Of" 05 February 2013. Web.20 May. 2024. <
https://www.aceyourpaper.com/essays/terrorist-attack-type-85707>

Latest Chicago Format (16th edition)

Copy Reference
"Terrorist Attack What Type Of", 05 February 2013, Accessed.20 May. 2024,
https://www.aceyourpaper.com/essays/terrorist-attack-type-85707