SlideShare a Scribd company logo
1 of 3
Download to read offline
Essay on Cyber Attacks
On April 27, 2007 cyber–attacks began crippling key infrastructures of banks, ministries, and newspapers. These attacks took place, in part, because of
a statue. This statue is not just a two–meter tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second WorldWar.
The statue has been under a lot of speculation and has torn the population of the country in half. Some believe the status is a symbol of Soviet,
formerly Nazi, while some see this statue as symbol of Soviet victory over the Nazis and Russian claims Estonia. When the government decided to
relocate the statue to Estonia's capital, the worst riots the country has ever seen took place and this started vicious cyber–attacks (Jenik). One may
...show more content...
These attacks did not target one organization either, as the attacks focused on parliaments, banks, ministries, newspapers, and broadcasters.
The next characteristic of cyber war is anonymity. With the Estonia case nobody was sure who did the attacking and who to blame. At first Estonian
Foreign Minister Urmas Paet accused Kremlin of the attacks but then retracted this statement because of lack of evidence. NATO nor European
Commission experts were able to find any involvement of the Russian government in these attacks. These attacks were determined to be one of the
"zombie" computers used in the attack. The only person ever arrested for the attacks was an ethnic Russian "hacketivist" living in Estonia
(Denial–of–Service).
Fast –15 minutes to breakdown a society is another factor of cyber war. In such a short amount of time the infrastructure of Estonia went down. The
internet played a crucial part of their country because of how people use the internet to pay for street parking and banking transactions. By shutting
down these key components of their country society is broken down and halted. International web traffic was also blocked to assist in stopping these
attacks.
By looking at the characteristics of cyber war from our lecture slides we can see that since all these components satisfy the definition, we can view the
Estonia case as a cyber–war. The broader definition is that the use of computers
Get more content on HelpWriting.net
Cyber Bullying Essay example
Social Networking has taken bullying to the extreme. Before advanced technology, children and teenagers were troubled by school bullies. Today,
they are targeted by bullies via internet. Most people undergo some form of bullying in life. Growing up, I experienced the typical name calling and
spiteful comments. I also dealt with minor cases of virtual bullies. These bullies are known as cyber bullies. I find this topic compelling because it's a
matter that has spiraled out of control. "Cyber bullying is defined as using the computer or other electronic devices to intimidate, threaten or humiliate
another individual," Admin October 13th, 2008. As the
Hartman 2 internet continues growing more popular with the youth, so do potential...show more content...
This makes the bully feel more powerful.
Hartman 3
There's not a legitimate reason for cyber bullying. Many perpetrators bully just to get a reaction. It's common for them to bully another just to boost
their ego. It makes the tormentor feel in charge. Some may think it's humorous to tease and make fun of others and that it's not harmful in any way.
The reality is being bullied can cause many problems for children and teenagers.
Many negative effects are outcomes of cyber bullies. The impact cyber bullying has on kids is detrimental. Victims can develop psychological
problems. For example, victims begin having anxiety, lower self–esteem, and frustration. They may also be diagnosed with depression. It's tough to
ignore cyber bullying. Compared to school bullies, internet bullies cause their victim more emotional pain. Children and teenagers are able to escape
school bullies when they return home. However targets of cyber bullying don't have that advantage.
There is no argument as to if cyber bullying is good or bad. However is social networking to blame? Or is lack of parent monitoring the problem? It's
true that adolescents are often given too much technology independence. I believe parents should fully acknowledge what websites their children are
visiting and what they are posting. On the contrary, I feel there is no excuse for child or teenager to feel the urge to emotionally attack
Get more content on HelpWriting.net
Cyber Crime Speech
Hello everyone. First of all I would like to thank Madam Munirah for giving me the opportunity to be here today. So, before I proceed with my
speech, let me introduce myself first. The name's given is Nur Syifa and I am 20 years old. The topic of today's speech is "Internet: how wild can it
be?" As all of us aware, internet is one of the best inventions for us and importance of the internet is huge in our lives. It has become the best source to
get information about everything. With internet we can stay updated with the latest happenings in the world, stay connected with people and many
more. But as you know, nothing comes with "benefit". Everything has its negative points as well as the internet. The question might have hit your mind
that what are the bad sides of the internet, right? The first point that we're going to discuss is about how easily inappropriate materials can be found on
the internet. There are many things available on the...show more content...
The dependency over internet has led to increase in cyber crime. Some criminals use the internet for spreading computer viruses and also fraud. Cyber
crime is a new type of crime that occurs in this Science and Technology years. There are a lot of definitions for cyber crime. According to
Wikipedia.com cyber crime is known as computer crime that refers to any crime that involves a computer and a network. Besides that, cyber crime is
also defined as crimes committed on the internet using the computer as either a tool or a targeted victim. One of the cyber crime is the internet fraud.
The most severe form of internet fraud involves identity theft, which is illegally getting a hold of someone's personal information in some way that uses
fraud or deception and is used for financial gain. One method of getting people's bank account details is the money transfer email scam. People receive
emails requesting help with transferring funds from another
Get more content on HelpWriting.net

More Related Content

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Featured

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Essay On Cyber Attacks

  • 1. Essay on Cyber Attacks On April 27, 2007 cyber–attacks began crippling key infrastructures of banks, ministries, and newspapers. These attacks took place, in part, because of a statue. This statue is not just a two–meter tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second WorldWar. The statue has been under a lot of speculation and has torn the population of the country in half. Some believe the status is a symbol of Soviet, formerly Nazi, while some see this statue as symbol of Soviet victory over the Nazis and Russian claims Estonia. When the government decided to relocate the statue to Estonia's capital, the worst riots the country has ever seen took place and this started vicious cyber–attacks (Jenik). One may ...show more content... These attacks did not target one organization either, as the attacks focused on parliaments, banks, ministries, newspapers, and broadcasters. The next characteristic of cyber war is anonymity. With the Estonia case nobody was sure who did the attacking and who to blame. At first Estonian Foreign Minister Urmas Paet accused Kremlin of the attacks but then retracted this statement because of lack of evidence. NATO nor European Commission experts were able to find any involvement of the Russian government in these attacks. These attacks were determined to be one of the "zombie" computers used in the attack. The only person ever arrested for the attacks was an ethnic Russian "hacketivist" living in Estonia (Denial–of–Service). Fast –15 minutes to breakdown a society is another factor of cyber war. In such a short amount of time the infrastructure of Estonia went down. The internet played a crucial part of their country because of how people use the internet to pay for street parking and banking transactions. By shutting down these key components of their country society is broken down and halted. International web traffic was also blocked to assist in stopping these attacks. By looking at the characteristics of cyber war from our lecture slides we can see that since all these components satisfy the definition, we can view the Estonia case as a cyber–war. The broader definition is that the use of computers Get more content on HelpWriting.net
  • 2. Cyber Bullying Essay example Social Networking has taken bullying to the extreme. Before advanced technology, children and teenagers were troubled by school bullies. Today, they are targeted by bullies via internet. Most people undergo some form of bullying in life. Growing up, I experienced the typical name calling and spiteful comments. I also dealt with minor cases of virtual bullies. These bullies are known as cyber bullies. I find this topic compelling because it's a matter that has spiraled out of control. "Cyber bullying is defined as using the computer or other electronic devices to intimidate, threaten or humiliate another individual," Admin October 13th, 2008. As the Hartman 2 internet continues growing more popular with the youth, so do potential...show more content... This makes the bully feel more powerful. Hartman 3 There's not a legitimate reason for cyber bullying. Many perpetrators bully just to get a reaction. It's common for them to bully another just to boost their ego. It makes the tormentor feel in charge. Some may think it's humorous to tease and make fun of others and that it's not harmful in any way. The reality is being bullied can cause many problems for children and teenagers. Many negative effects are outcomes of cyber bullies. The impact cyber bullying has on kids is detrimental. Victims can develop psychological problems. For example, victims begin having anxiety, lower self–esteem, and frustration. They may also be diagnosed with depression. It's tough to ignore cyber bullying. Compared to school bullies, internet bullies cause their victim more emotional pain. Children and teenagers are able to escape school bullies when they return home. However targets of cyber bullying don't have that advantage. There is no argument as to if cyber bullying is good or bad. However is social networking to blame? Or is lack of parent monitoring the problem? It's true that adolescents are often given too much technology independence. I believe parents should fully acknowledge what websites their children are visiting and what they are posting. On the contrary, I feel there is no excuse for child or teenager to feel the urge to emotionally attack Get more content on HelpWriting.net
  • 3. Cyber Crime Speech Hello everyone. First of all I would like to thank Madam Munirah for giving me the opportunity to be here today. So, before I proceed with my speech, let me introduce myself first. The name's given is Nur Syifa and I am 20 years old. The topic of today's speech is "Internet: how wild can it be?" As all of us aware, internet is one of the best inventions for us and importance of the internet is huge in our lives. It has become the best source to get information about everything. With internet we can stay updated with the latest happenings in the world, stay connected with people and many more. But as you know, nothing comes with "benefit". Everything has its negative points as well as the internet. The question might have hit your mind that what are the bad sides of the internet, right? The first point that we're going to discuss is about how easily inappropriate materials can be found on the internet. There are many things available on the...show more content... The dependency over internet has led to increase in cyber crime. Some criminals use the internet for spreading computer viruses and also fraud. Cyber crime is a new type of crime that occurs in this Science and Technology years. There are a lot of definitions for cyber crime. According to Wikipedia.com cyber crime is known as computer crime that refers to any crime that involves a computer and a network. Besides that, cyber crime is also defined as crimes committed on the internet using the computer as either a tool or a targeted victim. One of the cyber crime is the internet fraud. The most severe form of internet fraud involves identity theft, which is illegally getting a hold of someone's personal information in some way that uses fraud or deception and is used for financial gain. One method of getting people's bank account details is the money transfer email scam. People receive emails requesting help with transferring funds from another Get more content on HelpWriting.net