ipl-logo

Contours Of Security In Cyberspace By Wing Commander Sanjay Poduval

1188 Words5 Pages

“Contours of Security in Cyberspace” by Wing Commander Sanjay Poduval attempts to inform us about the variety of cyber security and help us understand the vulnerabilities of cyberspace. Cyberspace is already in every aspect of our life. We can see this in cell phones or television, and also banks, business and politics. However, cyberspace has become also an intangible world where security is even more challenging.
The classification of cyber security can be understood in different ways. In this text, was defined in the following categories: Acts with mischievous intent, acts with Criminal intent, acts by vested interests and acts by nation-states.
Acts of mischievous intent are irritating acts not aimed to damage or disrupt the targeted …show more content…

The data that is stolen in this act is usually used after to gratify the personal need of the perpetrator. Usually, these kind of acts are made in order to steal peripheral information such as contact details, identity numbers, etc., that can be used or be sold in the black market later on (this kind of information can be worth a lot of money on the black market). This kind of attacks could cause damage in the system, or targeted to the individual or firms concerned.
Acts by vested interests have the potential to cause severe embarrassment to the targeted states or organizations or cause serious monetary loss. We can also see inside the acts the “hacktivists” that break into networks just to disrupt them and make a political point. The cost of such an attack depends on the type of organization that is perpetrating the attack (if is an individual person or an …show more content…

They use the “benefit” when there is a problem in the computer that causes this vulnerability and there is no solution to the problem yet, even to the creator of the software. The programmers that are attacking know there's a loophole in the program and exploit it by planting a virus or worm that harms the computer systems. Usually when the software company finds a loophole in their program they offer a patch that should remove the vulnerability of the original release. Those attacks can appear even if the software creators are aware of the vulnerability they just didn’t finish the patch or they want to check if there are more loopholes so they won't release too many updates at the same time and those actions can expose the customers to a zero-day

More about Contours Of Security In Cyberspace By Wing Commander Sanjay Poduval

Open Document