blog




  • Essay / Computer Sabotage: Enabled by Human Error

    When it comes to technology, there is always room for error, whether in the code that provides functionality to a system or in the tasks and operations entrusted to the system by the user. The military has a saying: "You have to be ten percent smarter than your equipment." The extra ten percent is to cover and work around any mistakes you might make yourself. Whenever errors are made, they are almost always called "operator error", attributing the incident directly to the person operating the system rather than to the system itself. While there is a little wiggle room here, since there is almost always room for improvement in any system, it is not far off. When we talk about computer sabotage, we are referring to the disruption, or destruction, of a system by malicious software. However, unlike electronic break-ins, where hackers gain unauthorized access to a system, computer sabotage almost always occurs due to "operator error", the user unknowingly welcoming malware in its own system. Computer sabotage often targets the weakest entry points into a system and relies on the user's ignorance to launch an attack. Therefore, proper user training and constant debugging and testing of security measures should be emphasized to ensure the highest level of defense against malicious attack. First, when discussing computer sabotage, it is important to track the actions that led to the incident to determine key areas that could be improved. One such incident is the relatively new crypto locker virus, which virtually holds a user's entire system ransom until a sum of money is paid. Now, one might think that this type of incident should justify an extreme form of attack, when in reality the victims of this attack were known...... middle of newspaper ......ted Press . Tulsa World. April 11, 2014. The web. April 16, 2014. Finkle, Jim. "'Heartbleed' Computer Bug Threat Spreads to Firewalls and Beyond". Reuters. April 10, 2014. The web. April 16, 2014.Giacomazzo, Bernadette R. “OpenSSL Heartbleed Computer Virus Fix and Security: How to Protect Yourself from the Latest Internet Bug.” Latin post. April 10, 2014. The web. April 16, 2014. McCann, Erin. "The computer virus at the heart of the Kaiser data breach". IT Health Government. April 7, 2014. The web. April 16, 2014.Dowling, Blake. “Biz Tech: Beware of the latest computer viruses”. Business technology. March 25, 2014. The web. April 16, 2014. “Avoiding IT Sabotage: IT Expert, Parasoft CEO, Offers Tips.” PR Newswire. Internet. April 16, 2014. Sinton, Peter. "10 Steps to Prevent Internet Sabotage". SF door. March 15, 2000. The web. April 16, 2014.Spinello, Richard A. CYBERETHICS. 5th ed. Burlington: Jones & Bartlett Learning, 2014. Print.