close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Internet Cyber Security Pirates

downloadDownload printPrint

In old days, pirates were the group of people who perform series of criminal activities on a boat or ship over the sea area. For instance, let’s look at the history: how we learn cyber security from the real pirates story. In 1522, three people from Cuba went to Spain. They loaded precious stuff like gold, pearls, Jewries and so on onto their boat. The historical situation was that five distinguishable boats appear suddenly in the area at the moment the travelers started their trip and the treasure-loaded ships couldn’t escape. After a short fight and stealing gold, this story inspires generations to come and launch what is known as the “Golden Age of Piracy.”

Are you Looking For A Custom Essay about “Internet Cyber Security Pirates” NOW? You Found It!

Professional Writers that Guarantee an On-time Delivery

writers

experts online

In the past the sea was a domain contains commercial and communication; however, these days the sea is a domain with information and Internet. These types of pirates do various activities to damage cyber secure, from stealing and hacking, to trade and to leak (sell, share) economic information and military secrets, which causes unexpected huge damage. For instance, in 1812 war period, the American pirates took over 517 ships (more than) U.S. Navy’s 23. Even though the end of the real war is that British won; the private American caused harmful damage to the British economy using the information they stole.

Let’s look into the main challenges of the modern cyber security in order to learn what we have learned from the real pirate has taught us. To sum up, the biggest challenge is that “internet pirate” can quickly identify and relocate, shielded by the third party.

Nowadays, based on literature search, maritime pirate is still existing. There was a great example that pirates helped US against British back in to the year 1812 1861. President Lincoln stopped killing all the pirates instead he decided to utilized the power they owed.

Since the cyber security sea is much like the real sea, the historical idea inspired the modern cyber security piracy defending. People came up two main strategies to prevent massive cyber attack. The first strategy is to shut down the pirate network by interrupting bad behavior in strict market, then in the private-friendly place the transactions will be killed. Hence, without the support of networks, illegal actions will become more and more difficult to practice. Although by doing this the cyber security will be much safer, the cyber security sea would not be cleaned. Here comes the second solution, establishing a serious of rules and norm to allow open sea trade. By doing this, the open sea commercial trade will be open and supervised. Setting norm can help two individual group complete task without building deep trust and relationship.

Get a Personal "Internet Cyber Security Pirates" Tailored Essay For You in 3 Hours!

100% Customized to Your Need with Expert Writers

clock-banner

The lesson here tells us that the historical real sea pirates can be applied in internet cyber security pirates. It is a definitely better idea that commerce and communication make safe and freewheeling pirates and privateers brought under control.

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

121 writers online

blank-ico

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Internet Cyber Security Pirates. (2018, December 11). GradesFixer. Retrieved May 28, 2023, from https://gradesfixer.com/free-essay-examples/internet-cyber-security-pirates/
“Internet Cyber Security Pirates.” GradesFixer, 11 Dec. 2018, gradesfixer.com/free-essay-examples/internet-cyber-security-pirates/
Internet Cyber Security Pirates. [online]. Available at: <https://gradesfixer.com/free-essay-examples/internet-cyber-security-pirates/> [Accessed 28 May 2023].
Internet Cyber Security Pirates [Internet]. GradesFixer. 2018 Dec 11 [cited 2023 May 28]. Available from: https://gradesfixer.com/free-essay-examples/internet-cyber-security-pirates/
copy to clipboard
close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your Personalized Essay in 3 Hours or Less!

    exit-popup-close

    We can help you get a better grade and deliver your task on time!

    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now