This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Significant Historical Computer Crimes

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Significant Historical Computer Crimes

Computer crimes have been occurring over the years and are evolving in terms of complexity and damage caused. One of the most notable cyber-attacks that has occurred in history is the Morris worm. Robert Morris is credited for being the developer of the first worm in 1988. Morris intended to discover the vastness of the internet while releasing the worm but later on the worm transformed into a malicious denial of service attack (DDoS). It quickly spread at a rate that Morris did not anticipate infecting close to 6000 computers. Estimates show the attack led to the victims incurring $10 to $100 million dollars in fixing costs (IDG Communications.). The Morris worm massively contributed to the surge in DDoS attacks that have occurred since then. One such attack that has occurred recently orchestrated by hacker group Derp Trolling in 2013 affected a range of online gaming platforms including the Sony PlayStation network.

One strategy applied to control Ddos attacks is distributing servers across different data centers. Spreading the servers across different regions prevents the attack from infecting all servers (Rubens). DDoS attacks have transformed the ethical cultures associated with computer crimes. Organizations are now implementing methods of protecting their information systems and preventing the possibility of being targeted. One way they are doing this is by enforcing a password management policy for users and their devices.

Advanced computer crime detecting technologies are now running on systems that are really effective in preventing DDoS and other types of cyber-attacks. These include anti-virus software and security patches. Installing network firewalls as well as load balancers assist in safeguarding against Ddos protocol attacks (Rubens). Additionally, running specific software modules on web server applications assists in mitigating against application-layer threats including Slowloris attacks.

 

 

Works Cited

IDG Communications. Top 10 most notorious cyberattacks in history. 2020. 17 July 2020. <https://www.arnnet.com.au/slideshow/341113/top-10-most-notorious-cyber-attacks-history/>.

Rubens, paul. How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe. 26 June 2018. 17 July 2020. <https://www.esecurityplanet.com/network-security/how-to-prevent-ddos-attacks.html>.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask