1. Essay on Cyber Attacks
On April 27, 2007 cyber–attacks began crippling key infrastructures of banks, ministries, and newspapers. These attacks took place, in part, because of
a statue. This statue is not just a two–meter tall man holding a helmet; this individual represents and symbolizes the lives lost in the Second WorldWar.
The statue has been under a lot of speculation and has torn the population of the country in half. Some believe the status is a symbol of Soviet,
formerly Nazi, while some see this statue as symbol of Soviet victory over the Nazis and Russian claims Estonia. When the government decided to
relocate the statue to Estonia's capital, the worst riots the country has ever seen took place and this started vicious cyber–attacks (Jenik). One may
...show more content...
These attacks did not target one organization either, as the attacks focused on parliaments, banks, ministries, newspapers, and broadcasters.
The next characteristic of cyber war is anonymity. With the Estonia case nobody was sure who did the attacking and who to blame. At first Estonian
Foreign Minister Urmas Paet accused Kremlin of the attacks but then retracted this statement because of lack of evidence. NATO nor European
Commission experts were able to find any involvement of the Russian government in these attacks. These attacks were determined to be one of the
"zombie" computers used in the attack. The only person ever arrested for the attacks was an ethnic Russian "hacketivist" living in Estonia
(Denial–of–Service).
Fast –15 minutes to breakdown a society is another factor of cyber war. In such a short amount of time the infrastructure of Estonia went down. The
internet played a crucial part of their country because of how people use the internet to pay for street parking and banking transactions. By shutting
down these key components of their country society is broken down and halted. International web traffic was also blocked to assist in stopping these
attacks.
By looking at the characteristics of cyber war from our lecture slides we can see that since all these components satisfy the definition, we can view the
Estonia case as a cyber–war. The broader definition is that the use of computers
Get more content on HelpWriting.net
2. Cyber Bullying Essay example
Social Networking has taken bullying to the extreme. Before advanced technology, children and teenagers were troubled by school bullies. Today,
they are targeted by bullies via internet. Most people undergo some form of bullying in life. Growing up, I experienced the typical name calling and
spiteful comments. I also dealt with minor cases of virtual bullies. These bullies are known as cyber bullies. I find this topic compelling because it's a
matter that has spiraled out of control. "Cyber bullying is defined as using the computer or other electronic devices to intimidate, threaten or humiliate
another individual," Admin October 13th, 2008. As the
Hartman 2 internet continues growing more popular with the youth, so do potential...show more content...
This makes the bully feel more powerful.
Hartman 3
There's not a legitimate reason for cyber bullying. Many perpetrators bully just to get a reaction. It's common for them to bully another just to boost
their ego. It makes the tormentor feel in charge. Some may think it's humorous to tease and make fun of others and that it's not harmful in any way.
The reality is being bullied can cause many problems for children and teenagers.
Many negative effects are outcomes of cyber bullies. The impact cyber bullying has on kids is detrimental. Victims can develop psychological
problems. For example, victims begin having anxiety, lower self–esteem, and frustration. They may also be diagnosed with depression. It's tough to
ignore cyber bullying. Compared to school bullies, internet bullies cause their victim more emotional pain. Children and teenagers are able to escape
school bullies when they return home. However targets of cyber bullying don't have that advantage.
There is no argument as to if cyber bullying is good or bad. However is social networking to blame? Or is lack of parent monitoring the problem? It's
true that adolescents are often given too much technology independence. I believe parents should fully acknowledge what websites their children are
visiting and what they are posting. On the contrary, I feel there is no excuse for child or teenager to feel the urge to emotionally attack
Get more content on HelpWriting.net
3. Cyber Crime Speech
Hello everyone. First of all I would like to thank Madam Munirah for giving me the opportunity to be here today. So, before I proceed with my
speech, let me introduce myself first. The name's given is Nur Syifa and I am 20 years old. The topic of today's speech is "Internet: how wild can it
be?" As all of us aware, internet is one of the best inventions for us and importance of the internet is huge in our lives. It has become the best source to
get information about everything. With internet we can stay updated with the latest happenings in the world, stay connected with people and many
more. But as you know, nothing comes with "benefit". Everything has its negative points as well as the internet. The question might have hit your mind
that what are the bad sides of the internet, right? The first point that we're going to discuss is about how easily inappropriate materials can be found on
the internet. There are many things available on the...show more content...
The dependency over internet has led to increase in cyber crime. Some criminals use the internet for spreading computer viruses and also fraud. Cyber
crime is a new type of crime that occurs in this Science and Technology years. There are a lot of definitions for cyber crime. According to
Wikipedia.com cyber crime is known as computer crime that refers to any crime that involves a computer and a network. Besides that, cyber crime is
also defined as crimes committed on the internet using the computer as either a tool or a targeted victim. One of the cyber crime is the internet fraud.
The most severe form of internet fraud involves identity theft, which is illegally getting a hold of someone's personal information in some way that uses
fraud or deception and is used for financial gain. One method of getting people's bank account details is the money transfer email scam. People receive
emails requesting help with transferring funds from another
Get more content on HelpWriting.net