Secondary Research blog
Hey friends π✌, we have come to the part of the blog where I show you my analysis of another blog to give an insight on the topic in question.
In a modern world which is very dependent on technology and use of the internet, technology has been adapted for both good and bad purposes. The book I will be analysing in this blog explains the nature of cyberattacks(aim), gives real life situations and how we can prevent them. The book in question is called "Cybersecurity and cyberwar: What Everyone Needs to Know by P.W. Singer and Allan Friedman(2014)".
It is very important for anyone who wants a basic understanding of cyberattacks and I can proudly say that I learned the following things from the journal article:
1. Aim of cyberattacks: The primary aim of such dubious πΊ operations is to steal or destroy delicate information either personal or financial for personal gain.
2. Methods of cyberattacks: The main methods used are Ddos, phishing scams and malware attacks π£.
3. Motive behind it: It could either be for financial gain, acts of enmity or political issues.
4. Impact of cyberattacks: They affect whatever they impact heavily like business websites, government websites, banking websites and so on.
Now, we can move on to what I am aiming to accomplish from my research. The purpose of this next section is to show the intended outcomes I hope to achieve from this research. The research for this section is from the book "Cyberattacks on critical infrastructure: An economic perspective. Economics and Business review, 5(2), 24-47". They are as follows:
1. New technological advancements : Getting an understanding on how emerging technology systems can help solve the current problems of cyberattacks, by reducing scams by increasing tightened security.
2. Economical effects: Comprehending the fatal impact cybercrimes could have on multimillion dollar/pound companies which could lead to significant economic loss.
3. Implication of policies: Having some knowledge on the effects policies would have on the economy if put in place to guide certain laws.
References:
CERT-UK(2015). Common cyber attacks at-a-glance[Infographic]. Available at https://www.ncsc.gov.uk/content/files/protected_files/publications/cyber-risk-management-a-board-level-responsibility/common-cyber-attacks-summary
Invenia(2025) Types of Cyber Attacks. Available at: https://inveniatech.com/managed-services/closing-the-cybersecurity-skill-gap-with-managed-services/
Singer, P.W. and Friedman, A., (2014). Cybersecurity and Cyberwar: What everyone needs to know
Lis, P. and Mendel, J. (2019). Cyberattacks on critical infrastructure: An economic perspective. Economics and Business review, 5(2), 24-27.


Comments
Post a Comment