The use of computing resources to intimidate, coerce or harm people , places or systems we depend upon.
Amalgamation of Cyberspace and Terrorism.
Leveraging of a target's computers and information technology, particularly via the Internet, to cause physical, real-world harm or severe disruption with the aim of advancing the attacker's own political or religious goals.
DIFFERENCE B/W CYBER TERRORISM AND REAL WORLD, PHYSICAL TERRORISM
Why would a terrorist decide to use the Internet, rather than using the usual methods of assassination, hostage taking and guerrilla warfare?
Crackers -A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security.
White Hat Hackers – Hackers who break into computers. They have no right to access but they often report the security leaks to the victims.
Script bunnies - People who would like to be hackers but don’t have much technical expertise. They download click-and-point software that automatically does the hacking for them.
Minor attacks come in the form of " data diddling ", where information in the computer is changed. This may involve changing medical or financial records or stealing of passwords . Hackers may even prevent users who should have access from gaining access to the machine.
Ethical issues in this case include things like invasion of privacy and ownership conflicts .
Credit Card Number Theft
People are using credit cards for more and more of their purchases as time goes on.. Credit cards are especially easy to use fraudulently, because they require no extra identification number to use.
All that a thief needs is pure information-they don't need the card, but just the number on the card . Recently, with people spending more on purchases transacted over the internet, credit card fraud is becoming easier.
More than 40 million credit card numbers belonging to U.S. consumers were accessed by a computer hacker in the year 2005 according to MasterCard International Inc.
We are already well on the way to a cash-free society. People now use ATM cards, credit cards, and check-cards for a large percentage of their purchasing. As we move further from a paper-money society, to a purely electronic economy, new types of crime will emerge as accessing these is quite easier.
All we can be sure of, is that criminals of tomorrow, like those of last century and those of today, will keep on innovating.
This is because, as a system advances, so does the criminals .
Hacking is basically knowing programmable systems and how they work.
How can hacking be helpful ?
Some agencies hire hackers to show them the downfalls in their security system so they can improve it against hackers that want information or access into the computer for other reasons.
Hacking is a form of art for some people .
But generally , it is being used adversely.
One of the popular terror act is to threaten a large bank.
In 2001 , 12 billion dollars in losses due to security breaches, virus attacks and hacked network
The NIMDA virus alone accounted for 2 billion dollars in losses
The Mydoom virus sent 100 million infected e-mails in the first 36 hours, and accounted for roughly a quarter of global e-mail traffic on Jan. 26, 2004.
The pessimists claim that cyber attacks cost $10-$15 billion per year and would cost tens of billions more to fix, the optimists claim that all cyber crime over a five year period cumulatively cost only $1 billion and fixing the current vulnerabilities would only cost $4-$5 billion more.
As the Cyberspace continues to expand, and systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat.