Cyber Security Questions

Hello everyone, I need help in my Cyber Security assignment. the instructions are write 1800 words as for the whole assignment which means300 words per questions. please add citations and in the citations put the book author’s name and page number.the questions are in file (Cyber 2.jpeg),,in questions A pick one question and solve it.In questions B pick four questions and solve it.In questions C pick the book report question and solve it (The book report is attached also).The due date is this Sunday (April 29, 2018)


Don't use plagiarized sources. Get Your Custom Essay on
Cyber Security Questions
Just from $13/Page
Order Essay

Unformatted Attachment Preview

“Cyberphobia by Edward Lucas” Report
The book Cyberphobia – identity, trust and the internet by Edward Lucas brings to light
the various risk that people face as a result of the internet. Throughout the twelve chapters, Lucas
explores avenues that cybercriminals use to attack victims about which many victims don’t know.
He emphasizes that people should take caution when dealing with computers the way they take
caution for example while driving. Lucas points out that email accounts form a fertile ground for
hackers to access victims. He also notes that the complex nature of current software and hardware
make it hard for the users to understand them. The author predicts that cybercrimes may continue
to increase in future because of the increased number of internet users. He, therefore, encourages
people to take simple cautionary measures such as securitizing emails before responding and
shunning the “free” internet things as a way of saving oneself.
The first chapter of the book talks about how people normally live a cautious life. The
writer gives an example of the Hakhetts family. The couple lives a careful life of observing all the
life rules. The two drive carefully, have insurances and service their cars often. By observing the
normal rules of life, the Hakhetts believe any misfortune that may come to them can only emanate
from a careless person near them. However, the Hakhetts understand little about their devices
including their computers and cars. The book advocates for “prudence and cautiousness” with the
internet and advice users to know the internet well. The writer points out that by failing to know
the nature of the devices we use, attacks may happen and we fail to know (35).
In the second chapter, the author talks about the unreliability of computers. Networking in
computers came into the scene for purposes of backups in the military and sharing academic
information among researchers in late 60’s and early 70’s. At the time no one knew that the
networks could grow and become complex as they are today. No one knew that developments of
networks could turn to a ground of all illegal activities including stealing money from banks,
exposing personal information and other forms of illegal trade. The author also notes that
computers get manufactured with little care of security. The main qualities considered in
computers currently include cheapness, quick manufacturing process, and profitability. Due to the
complex nature of modern computerized devices, the author states that its hard for normal users to
protect themselves from malware. Therefore, it calls for the governments and internet companies
to protect users.
The third chapter talks about how identities get misused through the internet for malicious
purposes. The writer states that currently destroying another person’s reputation had become easy
as compared to earlier days when people had to write blackmailing letters. Currently, people
misuse the internet and write false information about others with the aim of destroying their
reputation. In a world where business activities get conducted through internet platforms, it’s easy
to lose market if a competitor posts false information about your business. Authorities like the
police have little control over what people write and talk about others through the internet. The
author also notes that people steal password and login details and pretend to as the owners, borrow
loans or send bad messages to partners of the victim. According to the book, to reduce the risks
better mechanisms need to be put in place.
The book explores the dangers email accounts hold to their owners. One can purchase email
accounts details of several people from the internet; people also can crack email accounts using
off- the- shelf software available on the Internet. Criminals crack peoples’ email accounts and send
messages to the contacts in the account requesting for funds without the owner even noticing.
Before the whole drama comes to an end, the account holder will have to explain a lot to relatives
and friends. The author also notes that fraud gets conducted in the person of banks, where criminals
send emails pretending to be banks. Such emails lead to exposure of bank credentials and thus
theft. The author advices people to always scrutinize emails before responding to avoid such scams
because our fate hangs on” the slender string of access to an email account.”
The author also captures much about the geopolitical arena about cyber crimes. The author
notes that some countries use criminal gangs to hack into another country’s sensitive system. The
chapter has some examples of breaches of the US system by Chinese and the KGB. The attacks
led to the loss of intellectual property and leaking of vital government information to adversaries.
Currently, when the east wants to overtake the west, some countries believe electronic spying can
greatly help achieve the objective. According to the author, due to the high numbers of computer
hardware and software, weak points have increased enabling criminal groups to perpetuate in their
cybercrimes. In this chapter, the author advices governments to protect the public from the highly
crafted cyber crimes.
The book touches on digital weapons, and how they have created an unnecessary tension
between countries. International laws forbid development of weapons such as biological weapons.
The author notes one can develop a biological weapon and get detected when developing the
vaccine but Digital attacks occur and may stay unnoticed for long periods of time because it’s not
physical assault. The book has an example of an attack on America’s military network that led
exposure of 700,000 classified documents that included a video of an airstrike on Iraq civilians.
The exposure led to international cries and almost made America appear in a bad light. Similarly,
if one attacks the Russian nuclear system, America may appear as the primary suspect thus causing
tension when it was not an American attack. Through the vulnerabilities created by computers, the
author notes that unnecessary tensions will continue to rise.
The book also talks about monoculture as a habit that has led to insecurity on the internet.
In a world where people like cheap and easy to use software, it has become easier for people with
ill intentions to steal information and commit other cyber-related crimes. The author compares the
problem with a situation where all the doors in the world had the same type a lock, noting that
when the weakness of the lock gets discovered everyone else becomes vulnerable. Though
diversity may seem less efficient in the short run, it proves beneficial in the long run. The writer
laments the lack of seriousness on the side of the bodies that should provide security on the internet.
The writer calls for diversification of computer software and hardware and continuous securing of
security certificates.
The book covers the threats brought about by the development of internet and computing.
The author goes ahead and states that the problems may increase in future. Due to the complex
nature of current software and hardware, users cannot understand the devices they use. The book
also outlines the dangers presented by current software developers who have little concern for
diversity. Lack of diversity puts masses in danger of being compromised. The book also points
email accounts as great avenues through which cybercriminals work. The author encourages
internet users to shun emails that lack enough evidence to prove legitimacy. People should also
avoid the “free” things on the internet that usually transfers malware to computers. The book
advocates for prudence and cautiousness with the internet.
Lucas Edward “Cyberphobia identity, trust security and the internet” Bloomsberry London 2015

Purchase answer to see full

Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.


Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.


Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.


Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.


Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.

Order your essay today and save 15% with the discount code DISCOUNT15