logo

Cyber Security: Response to Discussions on Cyber Terrorism, Malicious Programs, Hacking Detection and Choice Theory

Identify which type of information attack described in the Week One readings poses the greatest threat to the United States and its citizens.

5 Pages733 Words138 Views
   

Added on  2023-06-03

About This Document

This article discusses the prime threats of cyber terrorism, malicious programs, hacking detection and choice theory in the United States. It provides a summary of the discussions and references used to support the arguments.

Cyber Security: Response to Discussions on Cyber Terrorism, Malicious Programs, Hacking Detection and Choice Theory

Identify which type of information attack described in the Week One readings poses the greatest threat to the United States and its citizens.

   Added on 2023-06-03

ShareRelated Documents
Running head: CYBER SECURITY
Name of the Student
Name of the University
Author Note
Cyber Security: Response to Discussions on Cyber Terrorism, Malicious Programs, Hacking Detection and Choice Theory_1
1CYBER SECURITY
Response to the Discussion 1
The article throws light on the critical system infrastructure and the network system of the
United States. The discussion mainly put its focus on the information of the cyber terrorism
and networking threats occurring in the United States. I agree with the writer’s statement,
that the focus of the information breach has done most damage in the Unites states (Patil et
al.,2017). Many intrusions remain undetected unless there is some potential sign of intrusion
seen or the attacks. The paper discusses the onset of these problems since April 1998, for data
breach. The paper clearly gives prime examples through research that the military
organisation, NASA and the information defence are also affected by these networking
threats.
Reference
Patil, S., Jangra, A., Bhale, M., Raina, A. and Kulkarni, P., 2017, September. Ethical hacking:
The need for cyber security. In 2017 IEEE International Conference on Power, Control,
Signals and Instrumentation Engineering (ICPCSI)(pp. 1602-1606). IEEE.
Respond to Discussion 2
The discussion 2 shares the prime threats that the country fears are virus and worms. As per
the writer, I find this paper satisfactory enough to discuss the potential threats that have been
faced in United States. The writer primarily discuss the importance of the overall definition
of the virus and worm through referencing books and journals to help the reader have the
clear understanding about the subject(Narra, et al., 2016). The writer also throw lights over
Cyber Security: Response to Discussions on Cyber Terrorism, Malicious Programs, Hacking Detection and Choice Theory_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
HSM 438 Introduction to Cyber Crime
|4
|722
|287

Malicious Software Protection Policy
|6
|1728
|181

Software Security: Importance, Techniques and Limitations
|9
|2795
|469

Assignment on Cyber Secuirty
|5
|883
|29

Cyber Security Laws and Regulations
|22
|6363
|15

Understanding Cybercrime: Types, Perpetrators, and Mitigation Strategies
|4
|760
|231