Effects Of Cyber Attacks

Read Complete Research Material



Effects of Cyber Attacks

[Name of the institute]Effects of Cyber Attacks

Introduction

Complex Adaptive System or CAS fall in the category of dynamic systems that have the potential to acclimatize in and grow in relevance to the changing environment. However, there is no unscrambling line between a system and its prevailing environment in the context of system that is always adapted to the changing environment. According to Oehl & Pfister (2010), there are possible changes that take place with time in such a way that imposes an increase in the chances of success. All the existing systems within their said environment as per the findings of Murray Gell-Mann change. With change in the environment, the system s may also need to change in order to produce the needed balance. Human scientific enterprise is the prime example of CAS. In this enterprise the schemata serve as theories that tend to render futuristic implications on the basis of cases which may not have been considered earlier. On the other hand, according to Griffin et al. (1998, 2003), CAS implies towards having a variety of meanings under the consideration of various researchers. The researchers like Holland (1995) and Gell-Mann (1994) have tried to explain the supposition with the non-recursive relationship between the perceived attacks, implementation of defense measures and successive changes while establishing interpretation of attacks encountered by defenders.

Discussion

The CAS Model came out of the scientific interpretation of complexity. According to Holland (1992), it has been applied to render explanation about complicated systems in the context of variety of fields. He believes that any complex system attempts to make decisions that not only have an impact on their own functionality but also affect the decisions by other agents. The theory advocates the idea regarding complexity of attacks that they are combined in the prevalence of their said dynamic nature. There are numerous reasons that lead to the attacks. The theory interacts with the organization's use of defenses in a certain way that measures the defense in order to result the required change in the nature of attacks encountered by the organizations. Similarly, there is inclusion of other forces like technological updates, change in business practices and change of motives of potential computer attackers. Moreover, the theory proposes that attacks are tailored to the use of defense, this later in turn prepare the counter attacks. The range of potential attacks, various potential defenses and hosts of other similar factors tend to make measurable addition to expanding the complexity of the system in two ways. They increase number of factors and dynamic nature of majority of the characteristics.

The various networks and information systems are being constructed today appear to be entirely multifaceted and adversary against cyber attack yet has become increasingly more complicated.

According to Straub and Welke (1998), the feedback loops in the security arena is a way for the organizations to become aware of the changing organization. There is a mere competition between the security specialists and the attackers. Once the specialists introduce some solution to ...