Cyber Security – Individual
Read the following articles – address some of the key issues related to the who, what when, where, why and how of information security.Do you think cyber-attacks are a real threat or just a prank?Discuss and justify your answer.
This assignment should be a minimum of 2 pages, in APA format with appropriate references and citations.
Coalson, R. (2009, March 6). Behind The Estonia Cyberattacks. InRadio Free Europe Radio Library. Retrieved November 2, 2012, fromhttp://www.rferl.org/content/Behind_The_Estonia_Cyberattacks/1505613.html
Davis, J. (2007, August 21). Hackers Take Down the Most Wired Country in Europe. InWired Magazine. Retrieved November 2, 2012, fromhttp://www.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all
Perlroth, N. (2012, September 30). Attacks on 6 Banks Frustrate Customers. InThe New York Times. Retrieved November 2, 2012, fromhttp://www.nytimes.com/2012/10/01/business/cyberattacks-on-6-american-banks-frustrate-customers.html