blog




  • Essay / Cybersecurity Hackers on the Internet

    Previously, hackers were a group of people who carried out a series of criminal activities on a boat or ship above the sea area. For example, let's look at history: how we learn cybersecurity from the real story of hackers. In 1522, three Cubans traveled to Spain. They loaded precious items like gold, pearls, jewels, etc. on their boat. The historical situation was that five distinctive boats suddenly appeared in the area as travelers began their journey and the treasure-laden ships could not escape. After a short fight and the theft of the gold, this story inspires generations to come and launches what is known as the "Golden Age of Piracy". Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get an original essayIn the past, the sea was an area containing commerce and communication; however, the sea today is a domain of information and the Internet. These types of hackers carry out various activities to harm cybersecurity, ranging from theft and hacking to trading and leaking (selling, sharing) economic information and military secrets, causing enormous unexpected damage. For example, during the War of 1812, American pirates seized 517 ships (more than the U.S. Navy's 23). Even if the end of the real war was the one the British won; The American private sector caused harmful damage to the British economy using the information it stole. Let's look at the main challenges of modern cybersecurity to learn what we learned from the real hacker. In summary, the biggest challenge is that the "Internet hacker" can quickly be identified and moved, protected by a third party. Today, according to documentary research, the maritime pirate still exists. There was a great example that pirates helped the United States against the British between 1812 and 1861. President Lincoln stopped killing all the pirates and instead decided to use the power they had. Since the cybersecurity sea is very similar to the real sea, the historical This idea inspired the modern defense of cybersecurity hacking. People have proposed two main strategies to prevent massive cyberattacks. The first strategy is to shut down the pirate network by interrupting bad behavior in the strict market, then in a private sector friendly place, transactions will be interrupted. Thus, without the support of networks, illegal actions will become increasingly difficult to implement. Although doing so will make cybersecurity much safer, the ocean of cybersecurity will not be cleaned up. Here is the second solution, establishing a set of rules and standards to allow trade on the high seas. In doing so, trade on the high seas will be open and regulated. Establishing norms can help two individual groups accomplish a task without establishing deep trust or rapport. Keep in mind: this is just a sample. Get a personalized article from our expert writers now. Get a Custom Essay The lesson here tells us that real historical sea pirates can be applied to cyber security hackers on the Internet. It is much better for trade and communication to keep pirates and privateers safe..