Attack Prevention: Preventing Cyber Attacks Technology is everywhere, which is evident in the everyday products that we as a society use such as computers, cell phones, global positioning devices, and the Internet. As technology expands and grows, so does the reliance and dependence on these types of products. But reliance and dependence are not the only things that technology brings. Cyber attacks are a gradually increasing occurrence that is derived from technology; however, stopping these types of attacks before they occur is usually more difficult than can be expected, but is overall not impossible. The trick to averting such an attack lies in the programs and applications that one uses for defense that recognizes, detects and notifies the user that an attack is imminent. This can be something as simple as a malware and/or virus program to something more complex such as a firewall. The purpose of this paper is to discuss what constitutes a cyber attack, examine the steps involved in a cyber attack, and determine how to prevent them, which was discussed in the article by Tony M. Damico entitled Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack (2009) and other sources.
Cyber Attack: What It Is A cyber attack, also known as Cyber Warfare, is “an attempt to undermine or compromise the function of a computer-based system, or an attempt to track the online movements of individuals without their permission” (WiseGeek, 2011). To put it in simpler terms, a cyber attack is the targeting of something electronic to make them malfunction so that some type of reward can be collected. As mentioned in the first definition, cyber attacks fall into two basic categories: those acts that are intended to collect information and those that are intended to do harm. Cyber attacks that are specifically carried out for the sole purpose of
References: Apollo Group (2006). Kudler Fine Foods History. Retrieved November 28, 2009, from https:// ecampus.phoenix.edu/secure/aapd/cist/vop/Business/Kudler/KudlerHomes002.htm. Damico, T. M. (2010, November 13). Cyber Attack Prevention for the Home User: How to Prevent a Cyber Attack. Student Pulse website. Mah, P. (2010). The Anatomy of a Cyber Attack, Part 1. Retrieved January 15, 2011, from http://itbusinessedge.com/cm/blogs/mah/the-anatomy-of-a-cyber-attack-part-1/?cs=3. Mah, P. (2010). The Anatomy of a Cyber Attack, Part 2. Retrieved January 15, 2011, from http://itbusinessedge.com/cm/blogs/mah/the-anatomy-of-a-cyber-attack-part-2/?cs=3. Radenhausen, J. (n.d.). Ways to Prevent Cyber Identity Theft. Retrieved January 14, 2011, from http://www.ehow.com/print/way_5676604_ways-prevent-cyber-identity-theft.html. SANS (2009). Top Cyber Security Risks – Tutorial: HTTP Client-Side Exploit. Retrieved January 11, 2011, from http://www.sans.org/top-cyber-security-risks/tutorial.php. Waslik, D. & Teixeira, R. (2011). Five Ways Small Businesses Can Combat Cyber Crime. Retrieved January 13, 2011, from http://www.startupnation.com/NET_ROOT/print_ template/PrintContent.aspx?content_id=.