Only in the first half of 2002, more than 180,000 internet based attacks were taken in commercial area [7]. The well known attack in business happened in 2011 on Citigroup, one of the most famous credit card companies in the world, and through this issue thousands of customers lost their private information stored in company’s database including sensitive data such as e-mail addresses and postcode numbers, furthermore, these information losses would lead fraud risks for card users in the future [8]. Another example, eBay, one of the world biggest E-commerce companies, encountered a much more serious user data leakage including losing account passwords in 2013 and from eBay’s claim, 145 millions customers faced risks in their accounts, then, after this attack, eBay’s stock waved in one day from beginning decrease then back to normal finally [9]. Similarly, offline retailers could be hacked as well. Supervalu, US supermarket chain, lost its customer’s credit data after threaten in 2014. The reason of breach was still unknown and Supervalu’s stock in New York stock market fell down extremely due to data leakage.[10] Furthermore, in order to revenge, Iran attacked US banks in 2013. This threat targeted Citigroup as well and spread widely including HSBC, PNC and other big banks, as a result, all web stations they attacked collapsed [11]. Threats on business follow with information and …show more content…
For government, besides financial loss, when they are hacked, they suffered enormous damage both in facilities and in systems and their unbreakable expressions might be collapsed.And for business, as damages for their web stations, they need be rebuilt and repaired for a long time. In other words, both time and labor cost. In addition, for individuals, as their privacy are transparent without allowance, mental harm could not be ignored. Furthermore, hacking threats wastes world resources and slows down technology development. And it would lead the cyber wars in the future without controlling. Therefore, building a robust legislation system on computer security is on the timetable. Although several policies are put forward in recent years, completed and considerate regulations are needed. At last, because people need harmonious living and working surroundings, hidden harms should be forbidden and there need a proper method to use high