SlideShare a Scribd company logo
1 of 3
PLEASE DESCRIBE FOUR EXAMPLES OF TERRORIST UTILIZING THE
INTERNET, AND EXPLAIN THE IMPACT IT HAS?
Cyberspace is an umbrella of various crimes that occur by terrorists using the internet. Those
crimes are categorized into four types: hacking, cybercrime, cyber terrorism, and cyber warfare.
Those are differentiated by the motivation of the terrorist and threat action used. Those crimes
could have a tremendous impact on the country. There are various examples of those crimes and
their impacts. For example, website disruption, hackers attacking computer servers, disruption of
critical infrastructure systems, and cyber espionage.
An example of these crimes is the disruption of websites. It occurs when terrorists disagree with a
website's content. The purpose of taking this action by them is to make the public uncomfortable
and get revenge on the website's controllers or the agency it controls them. A famous example is
when Sony company refused hackers' demand not to share "The Interview" movie, which depicts
North Korea's president, Kim Jong-un. The attack affected the economic company and caused the
unsuitability of workers there. Regarding economic impact, the company lost tens of dollars from
not releasing the movie. The unsuitability was when hackers found emails of unsuitable scenes
between executives and some actors. It was a significant loss for the company and forced the
government to interfere with those actions.
Hacking is one of the most common internet crimes that occur nowadays. It is an example of when
terrorists use the internet to find a breach to target a perpetrator's computer system, where they can
access personal information and steal them for different goals. For example, hacking passwords
has become vast recently. There are many techniques they apply to find the password. One of them
is guessing it using algorithms. From this action, they can gain some personal information which
they can use later on, to blackmail the person for the sake of money. Hackers could also find the
password of the victim's credit card. Therefore, they could steal money, collapse their credit rating,
or even make a purchase themselves.
Terrorists could cause a physical attack when they use the internet to attack a server that requires
a high-energy pulse. It causes the computer and other nearby electronics to be destroyed due to the
overload of energy. This attack is called an electromagnetic pulse (EMP). Although it rarely
occurs, the result of it is unbearable. For example, the software or memory could be disrupted, and
memory is emptied. The hardware per se could be damaged. Eventually, the entire system
collapsed. I could not imagine the consequences if this had happened to a Uranium factory.
Cyberinfrastructure is one of the most common attacks that the department of defense and
homeland security deals. It is one of the most malicious cyber-attacks as it can spread around the
entire computer chain, doubling its loss. Moreover, it deters an organization's computer operations.
For example, if this happened as a Stuxnet worm. It was planted inside USB, so when inserted in
the computer, the worm gets access to the computer and moves around other computers rapidly
and seamlessly. The intricate and most dangerous part is that the worm could also move around
all running windows.
All in all, the internet is substantial for all critical ministries and departments. It can be found
everywhere nowadays, and we rely on it daily. If a breach were found, it would have impactful
effects in all life's aspects, including and not restricted to economics, society, defense, Etc.
Therefore, it must maintain maximum security, and fast responses must be taken if any breaches
are found.
Word Count: 580 words
References:
What is hacking? And how to prevent it. (2022, July 1).
www.kaspersky.com. https://www.kaspersky.com/resource-
center/definitions/what-is-hacking

More Related Content

Similar to Four Examples of Terrorist Internet Crimes and Their Impacts

Similar to Four Examples of Terrorist Internet Crimes and Their Impacts (16)

document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
Hacking_ The Ultimate Hacking for Beginners_ How to Hack_ Hacking Intelligenc...
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
TC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbragaTC160_PowerPoint_presentation_gbraga
TC160_PowerPoint_presentation_gbraga
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber Essays
Cyber EssaysCyber Essays
Cyber Essays
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 

Recently uploaded

Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at workChristina Parmionova
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginningsinfo695895
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxtsionhagos36
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCongressional Budget Office
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Climate change and safety and health at work
Climate change and safety and health at workClimate change and safety and health at work
Climate change and safety and health at work
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
Expressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptxExpressive clarity oral presentation.pptx
Expressive clarity oral presentation.pptx
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Chakan ( 7001035870 ) HI-Fi Pune Escorts Service
 
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
(PRIYA) Call Girls Rajgurunagar ( 7001035870 ) HI-Fi Pune Escorts Service
 

Four Examples of Terrorist Internet Crimes and Their Impacts

  • 1. PLEASE DESCRIBE FOUR EXAMPLES OF TERRORIST UTILIZING THE INTERNET, AND EXPLAIN THE IMPACT IT HAS? Cyberspace is an umbrella of various crimes that occur by terrorists using the internet. Those crimes are categorized into four types: hacking, cybercrime, cyber terrorism, and cyber warfare. Those are differentiated by the motivation of the terrorist and threat action used. Those crimes could have a tremendous impact on the country. There are various examples of those crimes and their impacts. For example, website disruption, hackers attacking computer servers, disruption of critical infrastructure systems, and cyber espionage. An example of these crimes is the disruption of websites. It occurs when terrorists disagree with a website's content. The purpose of taking this action by them is to make the public uncomfortable and get revenge on the website's controllers or the agency it controls them. A famous example is when Sony company refused hackers' demand not to share "The Interview" movie, which depicts North Korea's president, Kim Jong-un. The attack affected the economic company and caused the unsuitability of workers there. Regarding economic impact, the company lost tens of dollars from not releasing the movie. The unsuitability was when hackers found emails of unsuitable scenes between executives and some actors. It was a significant loss for the company and forced the government to interfere with those actions. Hacking is one of the most common internet crimes that occur nowadays. It is an example of when terrorists use the internet to find a breach to target a perpetrator's computer system, where they can access personal information and steal them for different goals. For example, hacking passwords has become vast recently. There are many techniques they apply to find the password. One of them is guessing it using algorithms. From this action, they can gain some personal information which they can use later on, to blackmail the person for the sake of money. Hackers could also find the
  • 2. password of the victim's credit card. Therefore, they could steal money, collapse their credit rating, or even make a purchase themselves. Terrorists could cause a physical attack when they use the internet to attack a server that requires a high-energy pulse. It causes the computer and other nearby electronics to be destroyed due to the overload of energy. This attack is called an electromagnetic pulse (EMP). Although it rarely occurs, the result of it is unbearable. For example, the software or memory could be disrupted, and memory is emptied. The hardware per se could be damaged. Eventually, the entire system collapsed. I could not imagine the consequences if this had happened to a Uranium factory. Cyberinfrastructure is one of the most common attacks that the department of defense and homeland security deals. It is one of the most malicious cyber-attacks as it can spread around the entire computer chain, doubling its loss. Moreover, it deters an organization's computer operations. For example, if this happened as a Stuxnet worm. It was planted inside USB, so when inserted in the computer, the worm gets access to the computer and moves around other computers rapidly and seamlessly. The intricate and most dangerous part is that the worm could also move around all running windows. All in all, the internet is substantial for all critical ministries and departments. It can be found everywhere nowadays, and we rely on it daily. If a breach were found, it would have impactful effects in all life's aspects, including and not restricted to economics, society, defense, Etc. Therefore, it must maintain maximum security, and fast responses must be taken if any breaches are found. Word Count: 580 words
  • 3. References: What is hacking? And how to prevent it. (2022, July 1). www.kaspersky.com. https://www.kaspersky.com/resource- center/definitions/what-is-hacking