blog




  • Essay / How the digital world can lead to a new type of terrorism

    Table of contentsIntroductionGlobal perspectiveNational perspectivePersonal perspectiveHow to solve this problem?IntroductionI love technology, especially digital technology, because it is everywhere on our phones, laptops, tablets, computers, etc. But is it too good to be true or, like most things, there are negatives and positives? The positives are the connectivity, you can talk over the sea, talk to people you could never have found, learn new and exciting things with the click of a button or just by asking Siri, you entertain and much more. Unfortunately, the negative aspects are much worse than the positive aspects: there is cyberbullying, viruses, etc. But the worst thing by far is piracy. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get an original essay This is going to be the major point that I will talk about. Hacking is probably the worst thing you can do on the Internet. You can log into other people's social media accounts and disrupt their online lives, you can lock someone's location by hacking and know where they are at any time, this could hack your computer and know everything your history or even lock your computer and charge you for it and that's probably the lowest of the low that a person could go for as well. Global Perspective Hacking can affect people on a global scale as it can be used to scam people, game businesses, and even give the US military something to worry about. It doesn't help that the US military uses Mac and Windows. Macs are used on DoD networks. DISA (Defense Information Systems Agency) has developed a STIG for OS X as well as for Windows and Linux. Macs are not uncommon at Beltway military installations. However, you won't find Macs on the battlefield, 99% of deployable computers run Windows. What if someone hacks the US military database and finds top secret information and sells it to another country, it could start another world war. But that would be very difficult because the US military has a group of people who stop hackers like this and have to stop about two thousand hackers a month. Sometimes it might just be small spam emails, but there have been times where they've made mistakes, so that's the case. always dangerous. A 25-year-old living in the UK hacked the US military for fun. A British hacker who allegedly hacked into a U.S. Department of Defense satellite system in 2014 and accessed the personal information of hundreds of service members pleaded guilty Thursday. Sean Caffrey, a 25-year-old resident of Sutton Coldfield in the West Midlands, admitted breaking into a US military communications system in June 2014 and stealing the usernames and email addresses of more than 800 employees as well as data from 30,000 satellite phones, the United Kingdom's National Crime Agency announced Thursday. a hacker hacked Donald Trump's Twitter account by posting a video of adults who still loved my little pony and did this to make Donald Trump look like a fool in front of the world, even though it was a childish prank made by an American, what if some do this with even more evil intentions and becomes the catalyst for a war between North Korea and America that could have a devastating effect on the world. It is also feared thathackers can attack banks and destroy countries' currencies. All of this is possible and must be stopped by the online police. There is also another problem if the Internet is controlled by the online police, it would change it significantly and destroy the freedom of the Internet. This is a big problem because it would limit web designers who help people and economies, for example Google It. it helps give work to people around the world, that's good, but with an online font it would discourage people. It would also make the web less private, especially since this is a problem because large online companies can buy this information and sell it. Then the cycle starts again because hackers can use that same information against you. National Perspective Piracy would really impact Nigeria, it can help corrupt politicians and people in similar jobs to steal in Nigeria, help people steal without being seen, it's terrible because it's a big problem for Nigerians because it destroys the economy. Which would affect public schools, roads, hospitals, etc. This can be stopped by asking the online police to make traps so that when someone steals money online it will raise an alarm, the corrupt individual will be arrested and tried in the Nigerian court. the law this would seriously help, but if someone was able to break the system that means they would be able to hide the money in the cloud as credit, this would be incredibly hard to find. It's a problem, but it's bigger than hacking. Corruption is the problem, but hacking is the fuel that fuels the negative things. Hacking Incidents in NigeriaNigerian hackers and cybercriminals are accused of orchestrating a billion-dollar theft of information and money globally. According to experts, Nigerians are able to carry out this heist by sending phishing emails to commercial organizations and industrial companies, which they then steal out of pocket. The FBI estimates that these phishing attacks have cost businesses more than $3 billion. The number of affected companies exceeds 22,143. Kaspersky Labs, an Internet security company, said it had discovered more than 500 companies attacked in at least 50 countries. Those attacked are mainly industrial companies and large transport and logistics companies based in Germany, the United Arab Emirates, Russia and India. In a blog post, Kaspersky said cybercriminals managed to steal technical drawings, floor plans and diagrams showing the structure of electrical and information networks. The researchers said all indications were that these were business email compromise (BEC) attacks that took place and were associated with Nigerian cybercriminals. The emails victims received seemed authentic enough to fool people. Some had attachments with names like “Energy & Industrial Solutions WLL_pdf,” “Woodeck Specifications best prices Quote.uue,” and “Saudi Aramco Quotation Request for October 2016.” These are well-crafted emails that appear legitimate and are designed to trick the victim into opening the malicious attachment. The emails ask recipients to check the information as soon as possible, clarify product prices or receive the goods specified in the attached delivery note. The malicious attachments contain RTF files with an exploit for the CVE-2015-1641 vulnerability. They can also.