27 Sep 2022

181

Information Attacks: How to Protect Yourself

Format: APA

Academic level: College

Paper type: Assignment

Words: 321

Pages: 1

Downloads: 0

Information attack is a form of digital terrorism that focuses on the destruction and alteration of content within a system. This type of attack may corrupt or lead to temporary information loss despite the physical and virtual systems remaining preserved (HSM 438 Chapter 2, n.d). Various forms of information attack are likely to have grave economic damages and loss. Cyberplagues entailing viruses and worms is one of the major types of information attack that poses the greatest threat to the United States and its citizens. 

Viruses and worms are malicious computer programs that can duplicate themselves, leading to risk in the information systems. Viruses and worms are a more significant threat to the US and its citizens since they can remove crucial files from a hard drive (HSM 438 Chapter 2, n.d.). Typically, a virus attaches itself to program codes or booting systems and runs when a user takes action on the program. The virus then performs a set of functions that range from taking control of the host computer to wiping files from the computer ( Iliev et al., 2019) . One example of such a case is the spread of the “ILOVEYOU” virus, where Web development and multimedia files were affected. The virus affected millions of US citizens who opened an email labeled “Love Letter.” These led to massive losses amounting to a billion dollars. Worms also have the same effects as viruses, but the difference is that they replicate themselves faster and transfer their code to other targets ( Rajesh, 2019) . In essence, worms are capable of affecting tens of thousands of computer users within a few hours. An example of a worm attack is the “Code Red” worm that targeted the White House in 2001. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

In summary, viruses and worms are a more significant threat to the United States and its citizens. The attack can cost the country billions of dollars, which is deteriorating to the economy. Thus, efforts to mitigate the attack should be considered. 

References 

HSM 438 Chapter 2 Digital Terrorism. Doc. 

Iliev, A., Kyurkchiev, N., Rahnev, A., & Terzieva, T. (2019).  Some models in the theory of computer viruses propagation . LAP LAMBERT Academic Publishing. 

Rajesh, B., Reddy, Y. J., & Reddy, B. D. K. (2015). A survey paper on malicous computer worms.  International Journal of Advanced Research in Computer Science and Technology 3 (2), 161-167. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Information Attacks: How to Protect Yourself.
https://studybounty.com/information-attacks-how-to-protect-yourself-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 62

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration