SlideShare a Scribd company logo
1 of 1
Download to read offline
Essay on Cyber Terrorism
Cyber Terrorism
Thus far we have scratched the surface of the ever–perplexing problem of terrorism. As it has
evolved those in the position of countering it have also gained some valuable experience. Even with
this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In
the recent past there has been an extra element added to this confusing and dangerous equation, the
Internet and other computer capabilities. Cyber–terrorism is a realistic possibility but is it as
detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the
implications of a cyber attack could be just as harmful.
Traditionally terrorist acts target a specific locale and are executed...show more content...
On the contrary, the only tools needed for cyber–terror are the proper knowledge and a powerful
computer.
One of the key elements of terrorism is the creation of mass fear. This takes little effort with the
use of computers. So many people are already intimidated by the efficacies of computers that the
simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As
soon as the word is out that a virus has been detected people take all possible actions to ensure that
their files and data are protected. Taking this action to a higher level, if someone were to put a virus
through a bank mainframe or something even bigger than that, then the general public would be
afraid to make transactions over the computer and would return to doing business in person. The
concern related to cyber–terrorism is warranted although we have been lucky thus far not to have
experienced firsthand anything devastating.
In summary, cyber–terrorism opens opportunities for terrorists by expanding the arena and through
the mass dependency on computers. So what leads me to believe that a cyber– terrorist attack could
be just as harmful as conventional terrorism? There are a few reasons which lead me to this
conclusion.
First of all, other forms of terrorism have been seen often enough to determine to some extent what
to expect. Granted there are no guaranteed results of a conventional attack there are
Get more content on HelpWriting.net

More Related Content

Similar to Essay On Cyber Terrorism (9)

Introduction To Cybercrime.pptx
Introduction To Cybercrime.pptxIntroduction To Cybercrime.pptx
Introduction To Cybercrime.pptx
 
Introduction To Cybercrime.pptx
Introduction To Cybercrime.pptxIntroduction To Cybercrime.pptx
Introduction To Cybercrime.pptx
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security, Why It's important To You
Cyber Security, Why It's important To YouCyber Security, Why It's important To You
Cyber Security, Why It's important To You
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

More from Buying Papers Simi Valley

John S. Furnivall Melting Pot
John S. Furnivall Melting PotJohn S. Furnivall Melting Pot
John S. Furnivall Melting Pot
Buying Papers Simi Valley
 
Culturally Responsive Classroom
Culturally Responsive ClassroomCulturally Responsive Classroom
Culturally Responsive Classroom
Buying Papers Simi Valley
 
Nursing Leadership Style Essay
Nursing Leadership Style EssayNursing Leadership Style Essay
Nursing Leadership Style Essay
Buying Papers Simi Valley
 
Grading System Rationale
Grading System RationaleGrading System Rationale
Grading System Rationale
Buying Papers Simi Valley
 
Teacher Expectations
Teacher ExpectationsTeacher Expectations
Teacher Expectations
Buying Papers Simi Valley
 
Essay On Vark Learning Styles
Essay On Vark Learning StylesEssay On Vark Learning Styles
Essay On Vark Learning Styles
Buying Papers Simi Valley
 
The Search Essay
The Search EssayThe Search Essay
The Search Essay
Buying Papers Simi Valley
 
Literary Devices
Literary DevicesLiterary Devices
Literary Devices
Buying Papers Simi Valley
 
Essay About Business Communication
Essay About Business CommunicationEssay About Business Communication
Essay About Business Communication
Buying Papers Simi Valley
 
Qualitative Research Papers
Qualitative Research PapersQualitative Research Papers
Qualitative Research Papers
Buying Papers Simi Valley
 
Court Case Report Sample
Court Case Report SampleCourt Case Report Sample
Court Case Report Sample
Buying Papers Simi Valley
 
Juvenile Delinquency Essay Examples
Juvenile Delinquency Essay ExamplesJuvenile Delinquency Essay Examples
Juvenile Delinquency Essay Examples
Buying Papers Simi Valley
 
Inferno Research Paper
Inferno Research PaperInferno Research Paper
Inferno Research Paper
Buying Papers Simi Valley
 

More from Buying Papers Simi Valley (20)

How Is Desdemona Honest
How Is Desdemona HonestHow Is Desdemona Honest
How Is Desdemona Honest
 
Romeo And Juliet
Romeo And JulietRomeo And Juliet
Romeo And Juliet
 
Essay On Juvenile Offenders
Essay On Juvenile OffendersEssay On Juvenile Offenders
Essay On Juvenile Offenders
 
Poetry Analysis
Poetry AnalysisPoetry Analysis
Poetry Analysis
 
Speech On Farewell Speech
Speech On Farewell SpeechSpeech On Farewell Speech
Speech On Farewell Speech
 
Essay Job Description
Essay Job DescriptionEssay Job Description
Essay Job Description
 
Spanish Inquisition Dbq
Spanish Inquisition DbqSpanish Inquisition Dbq
Spanish Inquisition Dbq
 
John S. Furnivall Melting Pot
John S. Furnivall Melting PotJohn S. Furnivall Melting Pot
John S. Furnivall Melting Pot
 
Culturally Responsive Classroom
Culturally Responsive ClassroomCulturally Responsive Classroom
Culturally Responsive Classroom
 
Nursing Leadership Style Essay
Nursing Leadership Style EssayNursing Leadership Style Essay
Nursing Leadership Style Essay
 
Grading System Rationale
Grading System RationaleGrading System Rationale
Grading System Rationale
 
Teacher Expectations
Teacher ExpectationsTeacher Expectations
Teacher Expectations
 
Essay On Vark Learning Styles
Essay On Vark Learning StylesEssay On Vark Learning Styles
Essay On Vark Learning Styles
 
The Search Essay
The Search EssayThe Search Essay
The Search Essay
 
Literary Devices
Literary DevicesLiterary Devices
Literary Devices
 
Essay About Business Communication
Essay About Business CommunicationEssay About Business Communication
Essay About Business Communication
 
Qualitative Research Papers
Qualitative Research PapersQualitative Research Papers
Qualitative Research Papers
 
Court Case Report Sample
Court Case Report SampleCourt Case Report Sample
Court Case Report Sample
 
Juvenile Delinquency Essay Examples
Juvenile Delinquency Essay ExamplesJuvenile Delinquency Essay Examples
Juvenile Delinquency Essay Examples
 
Inferno Research Paper
Inferno Research PaperInferno Research Paper
Inferno Research Paper
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Essay On Cyber Terrorism

  • 1. Essay on Cyber Terrorism Cyber Terrorism Thus far we have scratched the surface of the ever–perplexing problem of terrorism. As it has evolved those in the position of countering it have also gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber–terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the implications of a cyber attack could be just as harmful. Traditionally terrorist acts target a specific locale and are executed...show more content... On the contrary, the only tools needed for cyber–terror are the proper knowledge and a powerful computer. One of the key elements of terrorism is the creation of mass fear. This takes little effort with the use of computers. So many people are already intimidated by the efficacies of computers that the simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As soon as the word is out that a virus has been detected people take all possible actions to ensure that their files and data are protected. Taking this action to a higher level, if someone were to put a virus through a bank mainframe or something even bigger than that, then the general public would be afraid to make transactions over the computer and would return to doing business in person. The concern related to cyber–terrorism is warranted although we have been lucky thus far not to have experienced firsthand anything devastating. In summary, cyber–terrorism opens opportunities for terrorists by expanding the arena and through the mass dependency on computers. So what leads me to believe that a cyber– terrorist attack could be just as harmful as conventional terrorism? There are a few reasons which lead me to this conclusion. First of all, other forms of terrorism have been seen often enough to determine to some extent what to expect. Granted there are no guaranteed results of a conventional attack there are Get more content on HelpWriting.net