In the past, pirates were the group of people who carried out a variety of criminal activities on a boat or ship in the maritime area. For example, let's look at history: how we learn about cybersecurity from the history of real pirates. In 1522 three people from Cuba went to Spain. They loaded precious things like gold, pearls, Jews and so on onto their boat. The historical situation was that five distinguishable boats suddenly appeared in the area at the moment when travelers began their journey and the ships loaded with treasures could not escape. After a brief fight and the theft of the gold, this story inspires generations to come and launches what is known as the "Golden Age of Piracy." Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essayIn the past the sea was a domain containing commercial and communication content; however, nowadays the sea is a domain of information and the Internet. These types of pirates carry out various activities to harm cybersecurity, from theft and hacking, to trading and leaking (selling, sharing) economic information and military secrets, which cause huge unexpected damage. For example, during the War of 1812, American pirates took control of 517 ships (more than the US Navy's 23). Even if the end of the real war is that the English won; American private individuals have caused damaging damage to the British economy using information they have stolen. Let's examine the main challenges of modern cybersecurity to learn what the real hacker taught us. To summarize, the biggest challenge is that the “Internet pirate” can identify and move quickly, protected by third parties. Today, based on literature research, the maritime pirate still exists. There was a great example of how pirates helped the United States against the British in the year 1812-1861. President Lincoln stopped killing all the pirates and instead decided to use the power they had. Because the sea of cybersecurity is very similar to the real sea, the historic The idea has inspired the modern cybersecurity hacking defense. People have identified two main strategies to prevent massive cyber attacks. The first strategy is to shut down the pirate network by stopping bad behavior in the rigorous market, then in a private-friendly place the transactions will be killed. Therefore, without the support of networks, illegal actions will become increasingly difficult to practice. While doing so will make cybersecurity much safer, the ocean of cybersecurity would not be cleaned up. Here is the second solution, to establish a set of rules and regulations to allow trade on the open sea. This way, offshore commercial trade will be open and controlled. Establishing a norm can help two individual groups complete the task without building trust and deep relationships. Please note: this is just an example. Get a custom paper from our expert writers now. Get a Custom Essay The lesson here tells us that real historical pirates of the sea can be applied to cyber security pirates on the Internet. The idea that trade and communication secure and keep free-wheeling pirates and privateers under control is much better..
tags