Cybersecurity Hacking: Issue Analysis, Review, and Critique Essay

Verified

Added on  2023/06/12

|6
|1474
|340
Essay
AI Summary
This essay provides an analysis of the cybersecurity issue of hacking, focusing on a review of relevant literature. It examines a seminal article discussing cybercrime risk awareness, highlighting its strengths and weaknesses, and incorporating additional research to support the critique. The essay covers the definition of cyber-attacks, the importance of user awareness, and evolving cybercrime trends like cyberbullying and identity theft. It also addresses the need for collective responsibility in creating cybersecurity awareness and the role of law enforcement in protecting users. The essay concludes by emphasizing the importance of informed security measures and collaboration among stakeholders to mitigate cyber threats. Desklib provides a platform for students to access similar solved assignments and past papers.
Document Page
The Cyber Security Issue of Hacking
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
Introduction....................................................................................................................................2
Paper Under Review......................................................................................................................2
Justification for paper selection...................................................................................................2
Summary of findings.....................................................................................................................3
Shortcomings of the articles..........................................................................................................4
Conclusion......................................................................................................................................4
REFERENCES..............................................................................................................................5
Document Page
Introduction
Ismailova and Muhametjanova journal tries to indicate the cause of the rise of cybercrime in the
Kyrgyz Republic and the way forward in trying to create awareness among the users so as to
avoid being victims of these attacks. According to Ismailova and Muhametjanova (2016 p.1)
Cyber-attack can be described as any act done through a computer network to compromise the
security of an individual, information or a group. A person who may try to access one's
information using the internet or any other computer network without the conceit of the owner is
also practicing an act of cybercrime. It is hard to define Cybercrime since there is no harmonized
rule to show the limits of using computer ambiguity network. As a result, malicious people have
device mechanism of attacking nations and organization without the knowledge of any
underlying attack through cyberspace which is a new mode of cybercrime.
Paper Under Review
Ismailova, R. and Muhametjanova, G. (2016) Cybercrime risk awareness in the Kyrgyz
Republic. Information Security Journal: A Global Perspective, 25(1-3), pp.32-38.
Justification for paper selection
Security of any computer or information on the network starts with the user awareness which
affects the whole organization (Korpela 2015). With this in mind, any mistake done by any user
may act as a gateway to cyber-attack which may cripple the whole organization functionality. As
such, it is important to create awareness to the network users some of the attackers’
vulnerabilities they do exploit and how to ensure that one is safe from any kind of attack.
Ismailova and Muhametjanova use the Kyrgyz Republic as a case study to show how developing
countries have embraced the use of the internet. They state that the level of penetration of those
networks is minimum with a recorded case of just 24% which ranks the country at 112 out of
possible 154 countries. This indicates that the level of attack is minimal but more awareness
needs to be done so as to reduce these cases. Youths particularly those in higher learning
institutions use the internet at a higher rate and most of them are not yet aware of the way to
Document Page
make them stay safe while browsing and as stated, most students are not aware of the existence
of ISA (Information Security Awareness).
McCrohan et al. (2010) reveal some of the evolving cybercrimes such as cyberbullying, Identity
theft, cyber terrorism and also virus injections. In order to become a victim, in most cases, the
attacker requires that you trigger commands so as a malicious software can run in the
background as they can extract the information they are after. These kind of malicious codes and
programs are propagated through emails and embedded ads on a website that one frequently
visits. They use cookies cache so as to trace the kind of sites one visits and try to create a replica
of the same site and upon clicking on it or enter credentials the attacker gains access to the
information they needed.
Summary of findings
The most eye-catching aspect of Ismailova and Muhametjanova journal is how it defines Cyber-
attack and the difference that exists between Cybercrime and cyber-attack. It enables the reader
to be aware of the rate at which cybercrimes exist within nations. This kind of information will
help one to be aware of the way to learn how to keep one protected from any intrusion and be
more careful while using a computer and the network. At this juncture, a reader will be able to
comprehend and analyze better ways that will enable them not to fall into the traps of attackers.
Amoroso (2011 p.10) states that any user on the network should try to refrain from accessing
vital information from a public network and try to enable up-to-date firewall protection.
Amoroso statement adds wait to Ismailova and Muhametjanova by giving a more insight into a
collective responsibility in creating awareness about cyber-crime. However, Ismailova and
Muhametjanova journal does not refer to Amoroso journal which is more elaborate on proper
methods to keep network safe. It undermines the concept of the government coming in between
to keep users safe and creating laws that will protect the users from unavoidable situations.
Strengths of the articles
It is convincing that there is little information conveyed to the students pertaining internet
security Ismailova and Muhametjanova (2015: 6). This reveals why students act as the loophole.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Institutions should not undermine the role of students when it comes to mater of cybersecurity as
they are also stakeholders and in case of any kind of attack, they will use students unprotected
network so gain access into Institution network where they can bring it into a standstill.
International bodies mandate to create awareness to the developing countries have neglected
some of the growing nations as is the case in Kyrgyz Republic Ismailova and Muhametjanova
(2015: 8). Few have stepped their feet in this country to take the survey and considering their
rank in terms of vulnerability, it is sad to say those monitoring bodies have not yet taken any
action to help the country create awareness among citizens.
Shortcomings of the articles
McGee and Byington (2013) outline some of the countermeasures that should be adhered so as to
be safe while using computer and networks. Some of these issues highlighted by McGee and
Byington are omitted by Ismailova and Muhametjanova which make one of the journals
drawbacks. It is important to note that illiteracy has a hand at victims exposing themselves to
attackers. Low knowledge among the network users on how to always safeguard their network
and computers plays a bigger role in exposing them to attacks. At the same time, some of the
victims are ignorant about the whole concept. Some of the challenges faced by victims as
indicated by Cardenas et al.(2009) is securing physical layer by updating the software for uses.
They are given an update plea by software and OS manufacturers but they fail to update simply
because it is a large size or will cost them.
Conclusion
In conclusion. The journal has raised an eyebrow on the need to get involved in getting users
information safe and try to limit attracting attackers in one’s personal information. Richardson
and Director (2008 p.10) help to emphasize the point that it makes harder for an attacker to
access ones critical information who are well informed about the kind of security measures to put
in place. It is a collective responsibility from all the end users at the application level as well as
other stakeholders to keep everyone safe. Law enforcers will also work closely with the victims
to help others from being culprits
Document Page
REFERENCES
Ismailova, R. and Muhametjanova, G. (2016) Cybercrime risk awareness in Kyrgyz Republic.
Information Security Journal: A Global Perspective, 25(1-3), pp.32-38.
Korpela, K., 2015. Improving cyber security awareness and training programs with data
analytics. Information Security Journal: A Global Perspective, 24(1-3), pp.72-77.
McCrohan, K.F., Engel, K. and Harvey, J.W., 2010. Influence of awareness and training on
cyber security. Journal of internet Commerce, 9(1), pp.23-41.
Amoroso, E.G., 2011. Cyber attacks: awareness. Network Security, 2011(1), pp.10-16.
McGee, J.A. and Byington, J.R., 2013. How to counter cybercrime intrusions. Journal of
Corporate Accounting & Finance, 24(5), pp.45-49.
Cardenas, A., Amin, S., Sinopoli, B., Giani, A., Perrig, A. and Sastry, S., 2009, July. Challenges
for securing cyber physical systems. In Workshop on future directions in cyber-physical systems
security (Vol. 5).
Richardson, R. and Director, C.S.I., 2008. CSI computer crime and security survey. Computer
security institute, 1, pp.1-30.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]