Secondary Research blog

 Hey friends πŸ˜‰✌, we have come to the part of the blog where I show you my analysis of another blog to give an insight on the topic in question. 

In a modern world which is very dependent on technology and use of the internet, technology has been adapted for both good and bad purposes. The book I will be analysing in this blog explains the nature of cyberattacks(aim), gives real life situations and how we can prevent them. The book in question is called "Cybersecurity and cyberwar: What Everyone Needs to Know by P.W. Singer and Allan Friedman(2014)". 

It is very important for anyone who wants a basic understanding of cyberattacks and I can proudly say that I learned the following things from the journal article: 

1. Aim of cyberattacks: The primary aim of such dubious πŸ‘Ί operations is to steal or destroy delicate information either personal or financial for personal gain. 

2. Methods of cyberattacks: The main methods used are Ddos, phishing scams and malware attacks πŸ’£.

3. Motive behind it: It could either be for financial gain, acts of enmity or political issues.

4. Impact of cyberattacks: They affect whatever they impact heavily like business websites, government websites, banking websites and so on. 



Types of cyberattacks

Now, we can move on to what I am aiming to accomplish from my research. The purpose of this next section is to show the intended outcomes I hope to achieve from this research. The research for this section is from the book "Cyberattacks on critical infrastructure: An economic perspective. Economics and Business review,  5(2), 24-47". They are as follows:

1. New technological advancements : Getting an understanding on how emerging technology systems can help solve the current problems of cyberattacks, by reducing scams by increasing tightened security. 

2. Economical effects: Comprehending the fatal impact cybercrimes could have on multimillion dollar/pound companies which could lead to significant economic loss.

3. Implication of policies: Having some knowledge on the effects policies would have on the economy if put in place to guide certain laws. 



What can be learnt

References:

CERT-UK(2015). Common cyber attacks at-a-glance[Infographic]. Available at https://www.ncsc.gov.uk/content/files/protected_files/publications/cyber-risk-management-a-board-level-responsibility/common-cyber-attacks-summary

Invenia(2025) Types of Cyber Attacks. Available at: https://inveniatech.com/managed-services/closing-the-cybersecurity-skill-gap-with-managed-services/

 Singer, P.W. and Friedman, A., (2014). Cybersecurity and Cyberwar: What everyone needs to know

Lis, P. and Mendel, J. (2019). Cyberattacks on critical infrastructure: An economic perspective. Economics and Business review, 5(2), 24-27.


Comments

Popular posts from this blog

Evaluation Blog

Primary Research Blog