SlideShare a Scribd company logo
1 of 9
Download to read offline
Cyber-Terrorism Essay
Cyber–Terrorism Cyber–Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people
find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to
contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a
multitude of viruses can lull us into complacency when none of them come to fruition. In all honesty if you have a top–level virus–scanning program
such as Norton, or McAfee your machine will be safe from most of the little viruses that you will come across. There is a propensity to copy...show
more content...
Such a virus could go undetected for hours, days or months as it worked its way throughout a particular system and then strike at a pre–selected time.
For the entire computer operated portions of American society this is a threat, this extends from mass transit to police and bank records and
correctional facilities. Massive destruction both physical and theoretic could easily occur and quite frankly September 11th could be seen as
precursor to the uniform and grave situation systematic mainframe crashes would cause. This would be a case of international espionage and would
be a drastic move from the normal programs the tech security groups deal with on a daily basis. This type of attack could slide under existing defense
and not be identified until it was too late thus rendering the attempts to defend helpless. A comparison would be the 9/11 attacks and how they were
almost indefensible because of the suicide bomber mentality of the attackers. Similarly, the new age Cyber–Terrorists would not want the viruses to be
detected and have no desire to impress their peers as is the case with their traditional counterparts. Since this is a new type of cyber warfare, there is
no consensus on how to deal with theses issues. In a story reported by PC Mag, the FBI has contacted many of the individuals who they have
identified as suspected hackers across America as well as a handful of those
Get more content on HelpWriting.net
Essay about CyberCrime and Terrorism
Throughout the years, there has been a steady increase in the amount of cyber crime committed. Technology is a constantly changing entity, constantly
evolving, always progressing. Naturally this can make it hard to stay on top of things. In turn, law enforcement runs into various issues regarding cyber
crime and cyber terrorism. Cyber crime and terrorism is so complex of a crime that it can be hard to break down the barriers that can lead to
justifying the action. Major issues that are prominent in cyber crime and terrorism are that laws vary greatly from country to country. There is also a
major lack of knowledge and equipment in many departments as well as training. On top of these major issues, there are also issues with reporting these
...show more content...
The fact that cyber crime can be committed from half way across the world is a huge burden on those whose job it is to apprehend the criminals.
The main problem that springs up, is the sheer fact that not every country has the same laws. One country may not have the same definition of cyber
crime as the United States, or even recognize the act as a criminal offense. This can cause major issues when the countries laws differ, or even if the
criminal is inside an unfriendly territory. This makes the process of apprehending a criminal extremely difficult and time consuming. Countries may
often refuse to extradite criminals when this occurs; causing a standstill in the apprehension progress, and once this occurs, the solution must be
purely diplomatic, and can be a long process. In addition to the major issue of distance, there is also an issue that is much more of an internal problem.
Since much of this technology is relatively new in the scheme of things, many of the law enforcement departments have a major lack of knowledge,
equipment and training to deal with cyber crime and cyber terrorism. This causes a major flaw in the defense of government entities because so few are
trained to actually understand the interworking of cyberspace and how to properly protect information, but just know basics about how to utilize
computer equipment. We
Get more content on HelpWriting.net
Essay on Cyber Terrorism
Cyber Terrorism
Thus far we have scratched the surface of the ever–perplexing problem of terrorism. As it has evolved those in the position of countering it have also
gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the
recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber
–terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the
implications of a cyber attack could be just as harmful.
Traditionally terrorist acts target a specific locale and are executed...show more content...
On the contrary, the only tools needed for cyber–terror are the proper knowledge and a powerful computer.
One of the key elements of terrorism is the creation of mass fear. This takes little effort with the use of computers. So many people are already
intimidated by the efficacies of computers that the simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As
soon as the word is out that a virus has been detected people take all possible actions to ensure that their files and data are protected. Taking this action
to a higher level, if someone were to put a virus through a bank mainframe or something even bigger than that, then the general public would be afraid
to make transactions over the computer and would return to doing business in person. The concern related to cyber–terrorism is warranted although we
have been lucky thus far not to have experienced firsthand anything devastating.
In summary, cyber–terrorism opens opportunities for terrorists by expanding the arena and through the mass dependency on computers. So what leads
me to believe that a cyber– terrorist attack could be just as harmful as conventional terrorism? There are a few reasons which lead me to this conclusion.
First of all, other forms of terrorism have been seen often enough to determine to some extent what to expect. Granted there are no guaranteed results of
a conventional attack there are
Get more content on HelpWriting.net
Cyberterrorism
Cyberterrorism is the utilization of PC system instruments to hurt or close down basic national bases, e.g. transportation and government operations.
The reason of cyberterrorism is that as countries and basic base turned out to be more subject to PC systems for their operation, new vulnerabilities are
made. Cyberterrorism is an alluring alternative for cutting edge terrorists, who esteem its secrecy, its capability to exact gigantic harm, its mental effect,
and its media offer. The risk postured by cyberterrorism has gotten the consideration of the broad communications, thesecurity group, and the data
innovation (IT) industry. Columnists, lawmakers, and specialists in an assortment of fields have promoted a situation in which complex digital
terrorists electronically break into PCs that control dams or aviation authority frameworks, wreaking devastation and jeopardizing a large number of
lives as well as national security itself. But, in spite of all the bleak forecasts of a digital produced doomsday, no single occurrence of genuine
cyberterrorism has been recorded (Verton 129).
Since most basic base in Western social orders is arranged through PCs, the potential risk from cyberterrorism is, no doubt, extremely disturbing.
Programmers, despite...show more content...
Further, to qualify as cyberterrorism, an assault ought to bring about brutality against persons or property, or if nothing else cause enough mischief to
create dread. Assaults that prompt demise or substantial harm, blasts, or serious monetary misfortune would be cases. Genuine assaults against basic
foundations could be demonstrations of cyberterrorism, contingent upon their effect. Assaults that upset unimportant administrations or that are chiefly
an expensive aggravation would not (Janczewski
Get more content on HelpWriting.net
Terrorist Cyber Attacks
Terrorist cyber–attacks on national institutions will result in greater devastation than a cyber–crime directed against an individual. At the current rate
in which technology is increasing, establishments must constantly upgrade their system's security. If the national institutions fail to be vigilant to the
present day cyber threats, they will become victims of terrorist cyber–attacks. "Our nation's government, military, scientific, commercial and
entertainment sectors all operate on the same networks as our adversaries" (Alexander 18). A terrorist cyber–attack that is successful, has the potential
to put people at risk, by allowing sensitive information to get into the wrong hands, disrupting resources, or by altering system information in
corporations, to cause harm or confusion. Since a terroristic attack is focused on causing violence or chaos, the targets at risk would be "energy sources
and electric grids, water and sewer systems, manufacturing, banks, transportation and communication networks" (Brenner 15). The source of a terrorist
cyber–attack can be from a foreign government or criminal entities, as well as a disgruntle employee. An example of a disgruntle employee who...show
more content...
The United States remains in the forefront of cyber security. In my opinion, the government is capable of dealing with terroristic cyber–attacks and is
aware of the current technological advancements, which could compromise their defense. The Secretary of defense, in 2009, created the U.S. Cyber
Command department to assist in the defense of our nation (Alexander 21). A strong cyber defense provides the essential assurance for the government
and private sector to operate securely. The United States government is actively countering these cyber–attacks, since very few have been
Get more content on HelpWriting.net
Cyber Terrorism
In 1999, Chinese hackers targeted United States government sites, after an accidental bombing of a Chinese embassy in Belgrade. During this attack,
government sites were hijacked and some sites suffered a denial of service attack. Most recently, it was suspected that Bank of America was the victim
of a cyber terrorism attack; although no definitive evidence is available to substantiate that claim. Cyber terror attacks pose a threat against the national
security of the United States. In order to fully comprehend the threat that cyber terrorism poses, it is essential to understand the background, the effects,
the reality of the threat and the future of cyber terrorism. This assessment examines the reality of the cyber terrorism threat, and...show more content...
Likewise, terrorists will strive to improve their cyber terror attack capabilities by keeping pace with the emerging technologies and overcoming
countermeasures.
Many computer security experts question the possibility that the Internet could be used to inflict death on a large scale. Some precautions have been
made. Systems have been established in the last five years, which aim at preventing a possible cyber terrorism attack. "Air gapping" has been
established on all nuclear weapons, meaning the weapons are not connected to the Internet or any open computer network and cannot be accessed by
intruders or terrorists. Still, other areas of concern include subways, gas lines, power grids and communication systems; which are owned primarily by
the private sector and are managed by Internet enabled computer systems.
Reality of a Cyber Terror Attack
Malicious cyber activity is occurring more frequently and with unexpected complexity. In mid–December of 2009, Google experienced a highly
sophisticated and targeted attack which originated in China on its search engine infrastructure and e–mail, as well as on at least 20 other companies.
Attacks are occurring within the United States, as well. Attacks on government networks are omnipresent. In 2008, NASA and other departments of
Defense, Homeland Security and Commerce suffered major intrusions by "unknown foreign entities" which
Get more content on HelpWriting.net
Cyberterrorism Essays
Cyberterrorism
Introduction
Cyberterrorism is the convergence of terrorism and cyberspace. It is generally
understood to mean unlawful attacks and threats of attack against computers,
networks, and the information stored therein. Possibly to intimidate, influence a
government or its people to further political or social gain. To qualify as
cyberterrorism, an attack should result in violence against persons or property, or
generate fear. Attacks that lead to death or bodily injury, explosions, plane
crashes, water contamination, or severe economic loss would be examples, serious
attacks against important infrastructures could be acts of cyberterrorism,
depending on their impact. This essay will...show more content...
Individual protection
Currently there are no foolproof ways to protect a system. The completely secure system can never be accessed by anyone. Most government and
militarie classified information is kept on machines with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation,
the most common method of protection is encryption. The wide spread use of encryption is inhibited by the governments ban on its exportation, so
intercontinental communication is left relatively insecure. The
American president administration team and the FBI oppose the export of encryption in favour of a system where by the government can gain the key
to an encrypted system after gaining a court order to do so. Encryption's draw back is that it does not protect the entire system, an attack designed to
cripple the whole system, such as a virus, is unaffected by encryption. Others promote the use of firewalls to screen all communications to a system,
including e–mail messages, which may carry logic bombs or email bombs. Firewall is a relatively generic term for methods of filtering access to a
network. They may come in the form of a computer, router other communications device or in the form of a network configuration. Firewalls serve to
define the services and access that are permitted to each user. One method is to screen
user
Get more content on HelpWriting.net

More Related Content

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cyber-Terrorism Essay

  • 1. Cyber-Terrorism Essay Cyber–Terrorism Cyber–Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacency when none of them come to fruition. In all honesty if you have a top–level virus–scanning program such as Norton, or McAfee your machine will be safe from most of the little viruses that you will come across. There is a propensity to copy...show more content... Such a virus could go undetected for hours, days or months as it worked its way throughout a particular system and then strike at a pre–selected time. For the entire computer operated portions of American society this is a threat, this extends from mass transit to police and bank records and correctional facilities. Massive destruction both physical and theoretic could easily occur and quite frankly September 11th could be seen as precursor to the uniform and grave situation systematic mainframe crashes would cause. This would be a case of international espionage and would be a drastic move from the normal programs the tech security groups deal with on a daily basis. This type of attack could slide under existing defense and not be identified until it was too late thus rendering the attempts to defend helpless. A comparison would be the 9/11 attacks and how they were almost indefensible because of the suicide bomber mentality of the attackers. Similarly, the new age Cyber–Terrorists would not want the viruses to be detected and have no desire to impress their peers as is the case with their traditional counterparts. Since this is a new type of cyber warfare, there is no consensus on how to deal with theses issues. In a story reported by PC Mag, the FBI has contacted many of the individuals who they have identified as suspected hackers across America as well as a handful of those Get more content on HelpWriting.net
  • 2. Essay about CyberCrime and Terrorism Throughout the years, there has been a steady increase in the amount of cyber crime committed. Technology is a constantly changing entity, constantly evolving, always progressing. Naturally this can make it hard to stay on top of things. In turn, law enforcement runs into various issues regarding cyber crime and cyber terrorism. Cyber crime and terrorism is so complex of a crime that it can be hard to break down the barriers that can lead to justifying the action. Major issues that are prominent in cyber crime and terrorism are that laws vary greatly from country to country. There is also a major lack of knowledge and equipment in many departments as well as training. On top of these major issues, there are also issues with reporting these ...show more content... The fact that cyber crime can be committed from half way across the world is a huge burden on those whose job it is to apprehend the criminals. The main problem that springs up, is the sheer fact that not every country has the same laws. One country may not have the same definition of cyber crime as the United States, or even recognize the act as a criminal offense. This can cause major issues when the countries laws differ, or even if the criminal is inside an unfriendly territory. This makes the process of apprehending a criminal extremely difficult and time consuming. Countries may often refuse to extradite criminals when this occurs; causing a standstill in the apprehension progress, and once this occurs, the solution must be purely diplomatic, and can be a long process. In addition to the major issue of distance, there is also an issue that is much more of an internal problem. Since much of this technology is relatively new in the scheme of things, many of the law enforcement departments have a major lack of knowledge, equipment and training to deal with cyber crime and cyber terrorism. This causes a major flaw in the defense of government entities because so few are trained to actually understand the interworking of cyberspace and how to properly protect information, but just know basics about how to utilize computer equipment. We Get more content on HelpWriting.net
  • 3. Essay on Cyber Terrorism Cyber Terrorism Thus far we have scratched the surface of the ever–perplexing problem of terrorism. As it has evolved those in the position of countering it have also gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber –terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the implications of a cyber attack could be just as harmful. Traditionally terrorist acts target a specific locale and are executed...show more content... On the contrary, the only tools needed for cyber–terror are the proper knowledge and a powerful computer. One of the key elements of terrorism is the creation of mass fear. This takes little effort with the use of computers. So many people are already intimidated by the efficacies of computers that the simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As soon as the word is out that a virus has been detected people take all possible actions to ensure that their files and data are protected. Taking this action to a higher level, if someone were to put a virus through a bank mainframe or something even bigger than that, then the general public would be afraid to make transactions over the computer and would return to doing business in person. The concern related to cyber–terrorism is warranted although we have been lucky thus far not to have experienced firsthand anything devastating. In summary, cyber–terrorism opens opportunities for terrorists by expanding the arena and through the mass dependency on computers. So what leads me to believe that a cyber– terrorist attack could be just as harmful as conventional terrorism? There are a few reasons which lead me to this conclusion. First of all, other forms of terrorism have been seen often enough to determine to some extent what to expect. Granted there are no guaranteed results of a conventional attack there are
  • 4. Get more content on HelpWriting.net
  • 5. Cyberterrorism Cyberterrorism is the utilization of PC system instruments to hurt or close down basic national bases, e.g. transportation and government operations. The reason of cyberterrorism is that as countries and basic base turned out to be more subject to PC systems for their operation, new vulnerabilities are made. Cyberterrorism is an alluring alternative for cutting edge terrorists, who esteem its secrecy, its capability to exact gigantic harm, its mental effect, and its media offer. The risk postured by cyberterrorism has gotten the consideration of the broad communications, thesecurity group, and the data innovation (IT) industry. Columnists, lawmakers, and specialists in an assortment of fields have promoted a situation in which complex digital terrorists electronically break into PCs that control dams or aviation authority frameworks, wreaking devastation and jeopardizing a large number of lives as well as national security itself. But, in spite of all the bleak forecasts of a digital produced doomsday, no single occurrence of genuine cyberterrorism has been recorded (Verton 129). Since most basic base in Western social orders is arranged through PCs, the potential risk from cyberterrorism is, no doubt, extremely disturbing. Programmers, despite...show more content... Further, to qualify as cyberterrorism, an assault ought to bring about brutality against persons or property, or if nothing else cause enough mischief to create dread. Assaults that prompt demise or substantial harm, blasts, or serious monetary misfortune would be cases. Genuine assaults against basic foundations could be demonstrations of cyberterrorism, contingent upon their effect. Assaults that upset unimportant administrations or that are chiefly an expensive aggravation would not (Janczewski Get more content on HelpWriting.net
  • 6. Terrorist Cyber Attacks Terrorist cyber–attacks on national institutions will result in greater devastation than a cyber–crime directed against an individual. At the current rate in which technology is increasing, establishments must constantly upgrade their system's security. If the national institutions fail to be vigilant to the present day cyber threats, they will become victims of terrorist cyber–attacks. "Our nation's government, military, scientific, commercial and entertainment sectors all operate on the same networks as our adversaries" (Alexander 18). A terrorist cyber–attack that is successful, has the potential to put people at risk, by allowing sensitive information to get into the wrong hands, disrupting resources, or by altering system information in corporations, to cause harm or confusion. Since a terroristic attack is focused on causing violence or chaos, the targets at risk would be "energy sources and electric grids, water and sewer systems, manufacturing, banks, transportation and communication networks" (Brenner 15). The source of a terrorist cyber–attack can be from a foreign government or criminal entities, as well as a disgruntle employee. An example of a disgruntle employee who...show more content... The United States remains in the forefront of cyber security. In my opinion, the government is capable of dealing with terroristic cyber–attacks and is aware of the current technological advancements, which could compromise their defense. The Secretary of defense, in 2009, created the U.S. Cyber Command department to assist in the defense of our nation (Alexander 21). A strong cyber defense provides the essential assurance for the government and private sector to operate securely. The United States government is actively countering these cyber–attacks, since very few have been Get more content on HelpWriting.net
  • 7. Cyber Terrorism In 1999, Chinese hackers targeted United States government sites, after an accidental bombing of a Chinese embassy in Belgrade. During this attack, government sites were hijacked and some sites suffered a denial of service attack. Most recently, it was suspected that Bank of America was the victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that claim. Cyber terror attacks pose a threat against the national security of the United States. In order to fully comprehend the threat that cyber terrorism poses, it is essential to understand the background, the effects, the reality of the threat and the future of cyber terrorism. This assessment examines the reality of the cyber terrorism threat, and...show more content... Likewise, terrorists will strive to improve their cyber terror attack capabilities by keeping pace with the emerging technologies and overcoming countermeasures. Many computer security experts question the possibility that the Internet could be used to inflict death on a large scale. Some precautions have been made. Systems have been established in the last five years, which aim at preventing a possible cyber terrorism attack. "Air gapping" has been established on all nuclear weapons, meaning the weapons are not connected to the Internet or any open computer network and cannot be accessed by intruders or terrorists. Still, other areas of concern include subways, gas lines, power grids and communication systems; which are owned primarily by the private sector and are managed by Internet enabled computer systems. Reality of a Cyber Terror Attack Malicious cyber activity is occurring more frequently and with unexpected complexity. In mid–December of 2009, Google experienced a highly sophisticated and targeted attack which originated in China on its search engine infrastructure and e–mail, as well as on at least 20 other companies. Attacks are occurring within the United States, as well. Attacks on government networks are omnipresent. In 2008, NASA and other departments of Defense, Homeland Security and Commerce suffered major intrusions by "unknown foreign entities" which Get more content on HelpWriting.net
  • 8. Cyberterrorism Essays Cyberterrorism Introduction Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein. Possibly to intimidate, influence a government or its people to further political or social gain. To qualify as cyberterrorism, an attack should result in violence against persons or property, or generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples, serious attacks against important infrastructures could be acts of cyberterrorism, depending on their impact. This essay will...show more content... Individual protection Currently there are no foolproof ways to protect a system. The completely secure system can never be accessed by anyone. Most government and militarie classified information is kept on machines with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation, the most common method of protection is encryption. The wide spread use of encryption is inhibited by the governments ban on its exportation, so intercontinental communication is left relatively insecure. The
  • 9. American president administration team and the FBI oppose the export of encryption in favour of a system where by the government can gain the key to an encrypted system after gaining a court order to do so. Encryption's draw back is that it does not protect the entire system, an attack designed to cripple the whole system, such as a virus, is unaffected by encryption. Others promote the use of firewalls to screen all communications to a system, including e–mail messages, which may carry logic bombs or email bombs. Firewall is a relatively generic term for methods of filtering access to a network. They may come in the form of a computer, router other communications device or in the form of a network configuration. Firewalls serve to define the services and access that are permitted to each user. One method is to screen user Get more content on HelpWriting.net