Unanswered [0]
  

Home / Writing Feedback % width   Posts: 2


Essay about the rise in Cyberwarfare and ransomware and the solutions



EHernandez97 1 / -  
Mar 29, 2025   #1
I am looking to get insight on what are 3 main weakness of my rough draft so that I can make adjustment for the final draft. Thank you!

The Escalating Threat of Cyberwarfare and Ransomware

In an era that promotes technological innovation, cyberwarfare is advancing at an alarming pace. Cyberattacks are becoming more common and dangerous, affecting individuals and at times entire nations. Governments, corporations, and individuals are targeted by cybercriminals who hack into systems to steal data, place viruses, and demand a ransom. Infamous breaches, like the MOVEit and Equifax hack, have exposed millions of individuals personal information, which proves that no one is safe. The number of attacks has doubled recently, partly because of more people having to work at home and companies' weak security systems. Yet, many people still do not understand the serious threat that cyber attacks can bring nor how much damage it causes.

These attacks have more impactful effects than just personal data, like shutting down businesses, weakening economies, and even threatening national security. Cybercriminals can break into financial systems in minutes and in severe cases go on without detection for months. Defenseless companies pay these ransoms to get their data or system back, however this only encourages more attacks. Basic antivirus software and security measures are not enough to stop these cybercriminals and do not address the root of the issue. The right people in place for cybersecurity departments are indispensable. The rise in cyberwarfare and ransomware creates a need for global policies, investment in a skilled cybersecurity workforce, and greater public awareness.

Despite countless cyberattacks, major incidents emphasize the growing threat of cyberwarfare in national security. In these hackings, critical infrastructure and large organizations were targeted. The MOVEit breach in 2023 hackers exploited a vulnerability in the company's Transfer software. This resulted in compromising over 2,700 organizations worldwide and leaking 60 million of individuals sensitive information (Amin and Leese). According to Irini Miyashiro's case study, in 2017, hackers took advantage of a flaw in Equifax's web application framework thus leading to one of the largest data breaches in history and affected 147 million Americans (Miyashiro). Since the Covid-19 pandemic, the number of cyberattacks has increased mainly due to people having to work from home where there are more relaxed security protocols. Data from the International Monetary Fund shows the difference between the year 2004 and 2023, which displayed the rise in cyberattacks (International Monetary Fund, "Global Number of Cyber Incidents"). The sharp rise in these attacks over the past decades emphasizes the growing vulnerability for global infrastructure. The outcomes of these attacks left companies paying to settle lawsuits and tarnishing their reputation. Consider the impact on the customers.
This is what most Americans do not know, the severity of cyberattacks and the financial consequences. With just a laptop, Cybercriminals can infiltrate network systems at an alarming speed. In a test conducted by Kaspersky Lab Cybersecurity company, Brian Fung discovered employees were able to hack into the private New York finance company within ten minutes (Fung). Fortunately, this helped the company implement better security protocols, however the repercussion in a real scenario is immense. An example, Equifax had to pay a grand total of $700 million dollars in settlements (Miyashiro). In hand with conducting attacks swiftly, it can also happen with little to no knowledge at all. According to Tima Schindler's research, successful breaches can remain undetected on average at 146 days. In the case of phishing attacks, victims are sent an email that is deceiving or false advertisement and containing a virus that will upload malware if open. By crafting emails that create a sense of urgency-such as warning about compromised accounts or missed payment-it puts pressure on victims into acting hastily, ultimately allowing the hacker to infiltrate the system. It's essential to educate Americans to empower them to recognize and protect themselves from cybercriminals from these types of terror attacks. When hackers successfully compromise the account of a key individual within a company, the consequences escalate, affecting a larger number of people.

Increasingly aggressive attacks have the potential to disrupt economies and national security. On a global scale, companies in the financial sector will pose as a greater target to cybercriminals because it is more lucrative, however the results can lead to direct or indirect economic effects overall. First, cyberattack impose direct costs on companies, including repair expenses, legal settlement fees, and harm to their reputation. Subsequently, these attacks also lower the company's market value and cause disruptions to the supply chain (Fotis). This will trigger investors to be hesitant to purchase the company's stock due to the lack of trust. Interfering with the supply chain can prevent consumers from receiving essential items they need. Cybercriminals with a different narrative will target national security.
When employed as a weapon, cyberwarfare undermines national security and threatens the sense of security. Kenneth Geers, a communications analyst, highlights how a California electrical power grid test network was hacked into and to this day they have yet to be discovered. Critical infrastructures have becoming largely connected to the Internet, with the U.S becoming more dependent on electronic banking and the Global Positioning System (Geers). It is apparent that the potential sabotage cyberattack can bring to national security is advancing with modern technology. This demands stronger cybersecurity measures to protect significant networks.

While relying on basic antivirus software (AVS) and paying off ransom offers an immediate solution, these approaches fail to address the root causes of cyber crime and ultimately do little to prevent future attacks or reduce the overall threat. According to a case study by Kamran Shaukat, cybersecurity is always changing, so are the techniques that hackers develop to bypass antivirus defenses. The author argues that AVS serves as a foundation for security strategies but is insufficient for sophisticated malware and advanced hacking tactics. Relying on a single form of protection is insufficient; implementing a comprehensive cybersecurity strategy is far more effective than depending on just one program. Understanding coding is not necessary for stronger defense. Implementing practices such as multi-factor authentication, staying up to date with software updates, and for companies, providing more cybersecurity employee training can significantly enhance protection against threats. If an attack has already occurred, paying the ransom does not resolve the issue; instead, it perpetuates cybercrime and encourages further attacks.
By paying a ransom, victims not only fail to resolve the attack but also incentivize cybercriminals with turning hacking into a form of profitable 'business' and encourage more individuals to engage in cybercrime. In their Journal of National Security Law & Policy, authors Zachary Goldman and Damon McCoy state, "financially motivated cyberattacks... constitute a substantial portion of attacks and represent a significant drag on economic activity" (Goldman and McCoy). The illicit profits that hackers can make have driven more people to pursue unethical hacking as a means of making money and at times substantial amounts. The consequences for these criminals must be escalated, and the budgets for ransoms must be diminished through regulations and other strategies aimed at eliminating the market for stolen data and making cybercrime more expensive to carry out (Goldman and McCoy). To effectively combat ransomware, it is essential to establish comprehensive rules and regulations along with placing stronger preventive measures. To make these efforts even more impactful, government, as key influencers, play a crucial role in enacting policies that generate change.

To effectively mitigate the growing cyber threats, it is crucial to institute stricter polices, alongside a dramatic rise in the number of skilled cybersecurity professionals who can address and fight against these evolving risks. Government policies must enforce more rigorous cybersecurity standards and create comprehensive frameworks that address emerging threats, thereby protecting critical infrastructure, organizations, and individuals from cyber-attacks. Dr Andre Slonopas, who is an AI-driven enthusiast states, "Laws and other regulations are key for protecting infrastructure, national security, and modern economies" (Slonopas). This reinforces the idea that the government must take a more proactive role in developing policies aimed at enhancing protection. Like imprisonment and fines, hard legal consequences can serve as a deterrent to cybercriminal activity. In addition to government involvement critical infrastructures must also employ highly trained cybersecurity professionals to strengthen their defenses.

Investing in the right cybersecurity professionals is crucial for strengthening a company's defenses and safeguarding both the organization and its clients. Research identifies three critical cognitive processes for cybersecurity professionals: "unconscious monitoring for anomalies and potential threats, deliberate investigating of systems to identify security flaws, and evaluating the relative risks of those flaws once discovered" (Schoenmakers). This quote highlights the importance of both actively and passively monitoring cyber traits. Overall, this approach shows how constant monitoring and careful evaluation are essential for prevention. It's beneficial for these companies to recognize the individuals who possess a security-oriented mindset. Cybersecurity is necessary across all industries, as every sector relies-either directly or indirectly-on the expertise. However, the demand presents a problem of a shortage of skilled professionals in the field (Furnell). The shortage is ominous and only raises the risk of cyber threats for organizations but also places additional pressure on existing professionals to manage growing security demands with possible limited resources. Therefore, addressing this gap is not only vital for the security of public or private organizations but also for the broader stability of industries and the protection of data.
To conclude, the seriousness of a cyberattack can ruin one individual's life or an entire nation. Major incidents like the MOVEit and Equifax breach have exposed millions of individuals to the risk of identity theft and ruin the notable reputation of these companies. These breaches highlight how vulnerable personal data can become when organizations are targeted by cybercriminals looking to exploit sensitive information for financial gain. These events will be likely to persist, as proven during the pandemic years, when attack rates doubled. This increase can be attributed in part to the surge in remote work and a lack of attention to proper security protocols. To the surprise of most Americans, the speed at which cyberattacks can take place are almost unbelievable. A real-world test conducted by a cybersecurity team revealed that attacks can unfold within just ten minutes of a targeted organization. Even more frightening is that in advanced attacks, they can remain undetected for extended periods of time. Phishing emails can catch people off guard and make it much easier for hackers to infiltrate a network. The destruction and aftermath can lead to costly repairs and supply chain disruptions. The reason why organizations and victims are susceptible to attacks is because of the reliance on the internet. The situation of these attacks demands a fundamental shift in the approach of defense, requiring better tactics and policies.

Organizations and individuals are failing to create long-term solutions, instead they will rely on basic software protection and pay off ransoms as their primary means of defense. There is no need to become an expert in computers, but there is simple, yet effective practices people can adopt, such as enabling multi-factor authentication, regularly updating software, and for organization, offering cybersecurity training to employees. The problem with just paying off the ransom is that it indirectly creates a more incentive opportunity for cybercriminals. Which has been found that they make up a large proportion of attacks. This is where government intervention becomes crucial, with the need for police that mandate companies to implement proper procedures to defend themselves. Also, to transform the consequences of committing a cybercrime to extensive repercussion rather than small fines and short jail time. Organizations also need to find the right people who possess a security-oriented mindset. Investing in both employees and the overall cybersecurity department enhances the ability to defend against attack. Without an investment, current employees will struggle under pressure and will only have limited resources, leading to weakening the organization's defense. The concerning growth in cyberwarfare and ransomware brings to light the urgent need for government-issued polices, greater public awareness, and significant investment in skilled cybersecurity workforce. Only through coordinated efforts at the governmental, corporate, and individual levels can there be a chance to combat these evolving threats and protect the digital future.
Holt  Educational Consultant - / 15606  
Apr 1, 2025   #2
I believe that you could offer more of a background regarding the history and evolution of cyber attacks. What were the technological forms of computer based attacks that preceded it? What made those effective in attacking institutions? Was BBS ever involved in such attacks? The evolution of attacks will help the reader understand how technological developments made cyber attacking the next logical step in digital warfare.

Try to include specific examples of successful cyber attacks in your presentation. Discuss these alongside the theories and information that you managed to research. That way you will create a paper that is easier for the lay reader to understand. Your paper will not always be presented to industry experts so keeping it simple would be beneficial to your presentation.


Home / Writing Feedback / Essay about the rise in Cyberwarfare and ransomware and the solutions
ⓘ Need Writing or Editing Help?
Fill out one of these forms for professional help:

Best Writing Service:
CustomPapers form ◳

Graduate Writing / Editing:
GraduateWriter form ◳

Excellence in Editing:
Rose Editing ◳

AI-Paper Rewriting:
Robot Rewrite ◳