Hello Class and Professor,
Cloud computing will assist managers in the future because of the availability to protect any organization or business from unauthorized access. The idea of cloud computing or cloud security is a businesses IT department whose focus is on the security of possible breaches or threats that can cripple a business. The past has shown us that even with an IT department, these security threats are still very possible. An article online from force point stated that “Cloud computing allows organizations to operate at scale, reduce technology cost, and use agile systems that give them the competitive edge.” (Forcepoint) When a business is just beginning or in the stages of a transition things like operating at scale and reducing technology cost are crucial in the growth aspect of a business. With that being said the future for security managers depends on the ability to cut cost and still have a secured network for the protection of the organization.
The concept of concentric layers and how they apply to the future design of access control and computers is a great way to make sure that the business is secured through different sectors of security. Three examples I would consider as a security feature would be a form of CCTV, my current job has a palm reader as well as physical security to even get to the area where you would need to access any type of computer and access control. Second, I like the idea of an ID card used to log in kind of like a common access card (CACcard) to even be able to log into a computer or be granted access to a specific entry point. Third, would easily be a password that requires multiple special characters for the prevention of hacking type threats. There are many different layers of security but they are all used as a prevention technique to keep your business secure as well as personal information protected.
-Josh Foster
(Forcepoint)- What is cloud security? Forcepoint. (2021, May 6). Retrieved November 23, 2021, from https://www.forcepoint.com/cyber-edu/cloud-security.
The concept of cloud computing can assist security managers in the future by shifting some of the risk associated with compliance regulations. Ultimately this may allow Information Technology (IT) departments within the company to focus their time on other possible threats and vulnerabilities, instead of rudimentary task like spam filtering. Furthermore, the use of cloud computing can potentially free up funding to be utilized for security programs, “without a doubt, cloud computing offers an opportunity for the IT departments to transfer security risks away from their budgets and to the budget of a vendor” (Fay, 2010, p. 319).
Concentric layering may be applied to future design and application of access control and computers by using countermeasures to deter, deny, and detect the unauthorized access to spaces or systems. John Fay Contemporary Security Management” touches on ways of keeping a company laptop safe. The laptop ...
Hello Class and Professor,Cloud computing will assist managers i
1. Hello Class and Professor,
Cloud computing will assist managers in the future because of
the availability to protect any organization or business from
unauthorized access. The idea of cloud computing or cloud
security is a businesses IT department whose focus is on the
security of possible breaches or threats that can cripple a
business. The past has shown us that even with an IT
department, these security threats are still very possible. An
article online from force point stated that “Cloud computing
allows organizations to operate at scale, reduce technology cost,
and use agile systems that give them the competitive edge.”
(Forcepoint) When a business is just beginning or in the stages
of a transition things like operating at scale and reducing
technology cost are crucial in the growth aspect of a business.
With that being said the future for security managers depends
on the ability to cut cost and still have a secured network for
the protection of the organization.
The concept of concentric layers and how they apply to the
future design of access control and computers is a great way to
make sure that the business is secured through different sectors
of security. Three examples I would consider as a security
feature would be a form of CCTV, my current job has a palm
reader as well as physical security to even get to the area where
you would need to access any type of computer and access
control. Second, I like the idea of an ID card used to log in kind
of like a common access card (CACcard) to even be able to log
into a computer or be granted access to a specific entry point.
Third, would easily be a password that requires multiple special
characters for the prevention of hacking type threats. There are
many different layers of security but they are all used as a
prevention technique to keep your business secure as well as
personal information protected.
-Josh Foster
(Forcepoint)- What is cloud security? Forcepoint. (2021, May
2. 6). Retrieved November 23, 2021, from
https://www.forcepoint.com/cyber-edu/cloud-security.
The concept of cloud computing can assist security managers in
the future by shifting some of the risk associated with
compliance regulations. Ultimately this may allow Information
Technology (IT) departments within the company to focus their
time on other possible threats and vulnerabilities, instead of
rudimentary task like spam filtering. Furthermore, the use of
cloud computing can potentially free up funding to be utilized
for security programs, “without a doubt, cloud computing offers
an opportunity for the IT departments to transfer security risks
away from their budgets and to the budget of a vendor” (Fay,
2010, p. 319).
Concentric layering may be applied to future design and
application of access control and computers by using
countermeasures to deter, deny, and detect the unauthorized
access to spaces or systems. John Fay Contemporary Security
Management” touches on ways of keeping a company laptop
safe. The laptop can be maintained in a secure location that
requires a mechanical key to enter the space. Carefully placing
closed circuit televisions (CCTV) at the entry point for the
space and utilizing biometrics such as a retina scanner and palm
print scanner intensifies the security. The actual computer
containing sensitive company data will be kept inside of a
locked container that requires a combination lock code to
remove the device. The device shall require a strong password
consisting of alpha numeric and special characters that expires
routinely, complete with the ability to identify each user by
verified certificates embedded on their common access card.
System administration access should be controlled by the IT’s
preventing tampering to installed programs. Lastly all company
file folders will require two factor authentications.
3. References:
Fay, J. (2010). Contemporary security management. Elsevier
Science & Technology.
I found out that this was harder than I initially thought and that
this concept takes way more time to complete than just an 8
week period. This idea will carry on with me when I go to my
next classes that I will go through in the future. Especially
finding the concept that I want to talk about at the beginning of
the schooling and not towards the end, or start of the final class.
I hope that you all have had a great time in your path to where
you are today and continue on with your educational goals and
expectations.
Thanks
Harlan
CONCENTRIC RINGS OF SECURITYAmerican Public
University SystemAmerican Military UniversitySCMT
Undergraduate Capstone Proposal FormDate: November 25,
2021Harlan ChristensenSubmitted in partial fulfillment of the
degree requirements for the BA in Security Management
Concentric Rings of Security
American Public University System
American Military University
SCMT Undergraduate Capstone Proposal Form
Date: November 25, 2021
Harlan Christensen
Submitted in partial fulfillment of the degree requirements for
the
BA in Security Management
4. Abstract
Concentric rings of security and the processes that it brings
forward can be one of the best methods that any security
manager utilizes in their endeavors to provide the best security
for a given area and that is what the intentions of this paper are
to bring forward. Using this process can integrate many
different known principles and practices like CPTED and the
like, in order to make the process sounder tight in the
judgement of what it is that any security manager needs to use.
Reasons why people might commit a crime M.I.C.E.
M.I.C.E.
Money
Intelligence
Coercion
Ego
This Photo by Unknown Author is licensed under CC BY-NC-
ND
3
Routine Activity Theory (RAT)
4
5. Three Parts for a crime to happen
“Criminal
Target
Lack of heroic figure” (Orscheln, 2017)
Examples of RAT theory in real life
“George Floyd and other riots around the U.S.” (Orscheln,
Meyer, Center for public safety, 2020)
“Hurricane Katrina and the movement of persons to Houston
with higher crime rates after the displacement” (Hussey,
Kotarba, Swartz, Gelinas, Landry, 2014)
New York in the 90’s and prior
L.A. early 70’s and on
Routine Activity Theory (RAT)
What can be a lack of a heroic figure
“No Cameras or guards
No Police
6. Lack of Prosecution
Lack of city, state, or federal backing of leadership in the
prosecution of crimes” (Hussey, Kotarba, Swartz, Gelinas,
Landry, 2014)
Concentric Rings of Security
Objective/target Area
When in these restricted areas, the security controls should be
monitored by security personnel closely, and even more closely
when the time of personnel inside the areas. Some of the
policies commonly used in today’s environment in these areas
are things like;
Disallowance of personnel belongings other than what is worn
on the person. I.E., cell phones, computers, storage media,
cameras, etc.
An initial control to the area that is an entrance control. This
area is commonly not allowed to be visible by the general
public of those that work inside the company and do not need
access to such areas that maintain control needs.
Camera systems that have recognition software put on them to
allow for a continual check of the individuals in these areas
both inside the controlled access area and outside the controlled
access area.
The final line of entrance into the targeted object is usually
unseen to everyone that needs to not have access to this area.
This might be a specific coded section that cannot be seen or
known outside of such areas of control.
7. Main Campus Areas
Areas from building to targeted protected areas.
Measures for security that are common are items like:
Identification cards
Work or job related restrictions
Clean desk policies
Differentiation of items that need controlled access to
Escort procedures, training, and delineation of who can escort
Polices
CCTV camera systems
Etc..
Perimeter
This area consist of any road, parking lot entryways, and other
areas that allow flow to the building and the stretch of area
between such areas and the building perimeter.
Measures for security that are common are items like:
Bollards
Fences
Sensors such as motion detectors
Lighting
Security patrols
Territorial reenforcement
Assessment of security procedures
When assessing areas, one should look at each area in such a
way as to allow for a clear idea of how the security controls are
placed into the area.
Each new technology and procedure that is added an are will be
given a value of .5
8. An additional .5 will be given when there are policies and how
to implement use of the new control measures and technology
References:
Aasmae, K. (2018, October 28). Security: After Estonia's ID-
card train wreck this identity app is taking Baltics by storm.
ZDNet, p. 1. Retrieved from
https://www.zdnet.com/article/security-after-estonias-id-card-
train-wreck-this-identity-app-is-taking-baltics-by-storm/
Armitage, R. (2017, January 01). Burglars’ Take on Crime
Prevention through Environmental Design (CPTED): Retrieved
from
https://pure.hud.ac.uk/ws/portalfiles/portal/10967362/Burglars_
2527_Take_on_Crime_Prevention_through_Environmental_Desi
gn_Security_Journal_Title_255Bsubmitted_255D_281_29.pdf
Brumback, K. (2020, May 31). Atlanta protest scattered by tear
9. gas, heavy police presence. Associated Press, p. 1. Retrieved
from https://apnews.com/article/georgia-minnesota-riots-
ahmaud-arbery-atlanta-ef6f71dfe5dedcb2ec14e7d51f01ae42
Congress. (2020). recognizing law enforcement officers across
the country (Congressional Record Volume 166, Number 160).
Retrieved November 16, 2021, from The House of
Representatives, website:
https://www.govinfo.gov/content/pkg/CREC-2020-09-
16/html/CREC-2020-09-16-pt1-PgH4478.htm
Cregg, J. (2018, August 01). A Study of CPTED Principles and
their Relationship to Crime Risk in Beaumont, Texas. Texas
State University, p. 1-76. Retrieved from
https://digital.library.txstate.edu/bitstream/handle/10877/7705/C
regg-DRFinal.pdf?sequence=1&isAllowed=y
Department of Justice. (2020). 74 People Facing Federal
Charges for Crimes Committed During Portland
Demonstrations. Retrieved November 16, 2021, from US DOJ.,
website: https://www.justice.gov/usao-or/pr/74-people-facing-
federal-charges-crimes-committed-during-portland-
demonstrations
References:
Designing Out Opportunity and Fear. Center for Public Safety,
p. 1-6. Retrieved from
https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files/docs
/CRIM%20Resources/Crime%20Prevention%20Through%20Env
ironmental%20Design%20%5BCPTED%5D-
%20Designing%20Out%20Opportunity%20and%20Fear.pdf
Dienst, J. (2021, June 18). Most Riot, Looting Cases from Last
Year Dropped by NYC DAs. New York 4, p. 1. Retrieved from
10. https://www.nbcnewyork.com/news/local/crime-and-
courts/most-riot-looting-cases-from-last-year-dropped-by-nyc-
das/3114714/
Gelinas, N. (2006, January 04). Katrina Refugees Shoot Up
Houston. City Journal, p. 1. Retrieved from https://www.city-
journal.org/html/katrina-refugees-shoot-houston-10141.html
General Security Risk Assessment Guidelines. (2021). Retrieved
October 17, 2021, from
https://www.asisonline.org/publications--resources/standards--
guidelines/gsra/
Godown, J. (2013). The CompStat Process: Four Principles for
Managing Crime Reduction. The Police Chief Magazine, 1(1),
1. Retrieved from
https://www.iadlest.org/Portals/0/Files/Documents/DDACTS/Do
cs/The%20CompStat%20Process.pdf
Hussey, A. (2011, May 28). Crime Spillovers and Hurricane
Katrina. University of Memphis, p. 1-44. Retrieved from
file:///C:/Users/harla/AppData/Local/Temp/Crime_Spillovers_a
nd_Hurricane_Katrina.pdf.
Iboshi, K. (2021, March 02). Feds quietly dismiss dozens of
Portland protest cases. KGW8, p. 1. Retrieved from
https://www.kgw.com/article/news/investiga tions/portland-
protest-cases-dismissed-feds/283-002f01d2-3217-4b12-8725-
3fda2cad119f
Kotarba, Fackler, J., Johnson, B. D., & Dunlap, E. (2010). The
Melding of Drug Markets in Houston After Katrina: Dealer and
User Perspectives. Substance Use & Misuse, 45(9), 1390–1405.
https://doi.org/10.3109/10826081003682917
11. References:
Landry, R. (2014, January 01). Violent Crime Rates in Houston
Before and After. Retrieved from
https://swer.wtamu.edu/sites/default/files/Data/SER_RN-2008-
Landry_Rankin-Violent%20Crime.pdf
Litke, E. (2020, September 18). Fact check: Nearly all arrests in
Kenosha protests were from the area. USA Today, p. 1.
Retrieved from
https://www.usatoday.com/story/news/factcheck/2020/09/18/fac
t-check-nearly-all-arrests-kenosha-protests-were-
area/3492839001/
Macano, K. (2018, January 01). Crime Prevention Through
Environmental Design [CPTED]:
Designing Out Opportunity and Fear. Center for Public Safety,
p. 1-6. Retrieved from
https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files/docs
/CRIM%20Resources/Crime%20Prevention%20Through%20Env
ironmental%20Design%20%5BCPTED%5D-
%20Designing%20Out%20Opportunity%20and%20Fear.pdf
Mackay, R. (2017). Lessons from Manchester and Paris:
Physical Security for the Entertainment Industry and Executive
Protection: Iconic entertainers will remain attractive targets for
terrorist attacks because they attract substantial crowds and
promote social norms and values that conflict with terrorists'
worldviews. Security, 54(9), 54-. Retrieved from https://www-
proquest-
com.ezproxy1.apus.edu/docview/2108801853/9B8E4B406BC44
126PQ/1?accountid=8289
Management System for Quality of Private Security Company
Operations-Requirements with Guidance. (2021). Retrieved
October 17, 2021, from
12. https://www.asisonline.org/publications--resources/standards--
guidelines/psc1/
Meyer, C. (2020, October). At Rest, At Risk. Security
Management, 20(10), 30-37.
Orscheln, A. (2017, April 12). Routine Activity Theory at the
Census Tract-Level. University of Missouri, p. 1-41. Retrieved
from
https://irl.umsl.edu/cgi/viewcontent.cgi?article=1294&context=t
hesis.
16
References:
Practice Profile: Closed Circuit Television (CCTV)
Surveillance. (2020). Retrieved September 12, 2021. Retrieved
from https://crimesolutions.ojp.gov/ratedpractices/25#pd
Raible, S. (2020, June 18). Dozens of protesters arrested by
Seattle police may never be prosecuted. KIRO7, p. 1. Retrieved
from https://www.kiro7.com/news/local/dozens-protesters-
arrested-by-seattle-police-may-never-be-
prosecuted/TQMXRMHYXBFZ5KZVTMEDU2S4IE/
Ramey, D. (2020, July 21). Protests in downtown Boise wind
down after a largely peaceful night. KTVB7, p. 1. Retrieved
from https://www.ktvb.com/article/news/local/live-at-330-pm-
boise-police-chief-lee-to-brief-the-public-about-tonights-
protests/277-6b85a246-f71c-4c06-9a40-d4603023d295
Schaffner, D. (2014, March 14). Information Thieves: Using
Industrial Espionage to Examine the Development of the
Information Economy. University of Boston Massachusetts, p.
13. 1-55. Retrieved from
https://scholarworks.umb.edu/cgi/viewcontent.cgi?article=1004
&context=honors_theses
Swartz, M. (2008, October 01). The Year of Living
Dangerously. Texas Monthly, p. 1. Retrieved from
https://www.texasmonthly.com/articles/the-year-of-living-
dangerously/.
U.S. Marshals Office, n. DOJ. (1995). Vulnerability Assessment
of Federal Facilities (156412 C.2). Retrieved August 29, 2021,
from DOJ, website:
https://www.ojp.gov/pdffiles1/Digitization/156412NCJRS.pdf
Hello class,
We made it. Congrats to everyone and thank you instructor for
an interesting class.
Student Name: Ryan TrineDate: 11/22/2021
Cyber Terrorism and Cybersecurity
Student Name: Ryan Trine
Date: 11/22/2021
14. Abstract
cyberspace is a potent tool for terrorist activities and that there
is a vast extent of vulnerability for individuals, organizations,
and countries. This study adopts a qualitative methodology to
analyze the concept of cyberterrorism and the reality of the
threat in the world today. The findings indicate that cyberspace
is an appropriate medium for terrorist activities. There is a need
for proper nomenclature by which the scope of cyberterrorism
can be effectively understood. This will form a basis for
formulating cybersecurity measures that do not infringe on
human rights, such as freedom of speech or expression.
InTRO
Technology is one of the fastest-growing and most
transformative single factors in the world today. Technology
affects many aspects of people’s lives, including
communication, learning, and thinking (Mickeel, 2019). There
are positive and negative effects of technology, but we are
living in a world where technology is an integral part. Also,
these are advances keep touching on more aspects of our daily
lives. As a result, people are becoming more dependent on
technology for personal life matters and even for work. As
technology becomes more invaluable in our lives, people
become more dependent on it, and this brings about a unique
level of vulnerability.
Continued
It is generally agreed that digital life has negatives in as much
15. as there are positive outcomes associated with technology.
According to Anderson and Rainie (2018), fifty percent of the
individuals in the study had a substantial agreement that the
positives of digital life outweigh the negatives. However, this
just signifies that an equal proportion believes in the negative
effects of digital life. In a third of the respondents, there is an
explicit belief that harms are likely to outweigh the benefits of
digital life (Anderson and Rainie, 2018). It is a common
consensus that there are deep concerns over the well-being of
the people in a technological world. With advances in
technology, people have become exposed to fears which could
have only qualified in science fiction novels half a century ago
(Anderson and Rainie, 2018). Therefore, even as technology
advances and people become more dependent on it, it is
essential to be wary of the negative effects that come about with
technology.
Cyberterrorism
Cyber terrorism is one of the negative effects that are potent in
the digital world. This is a broad term encompassing any
malicious effort perpetrated through computers or using
information technology that is intended to cause disruption or
fear on an individual or entity in the community.
Cyberterrorism refers to any range of illegal activities
conducted through technological and digital devices and
techniques (Al Mazari et al., 2018). The use of the prefix
“cyber” is aimed at emphasizing the medium on which these
activities are propagated (Mayer Lux, 2018). Therefore,
cyberterrorism refers to a wide range of malicious activities that
take place over cyberspace. Cyberspace can be defined as the
system of interconnected infrastructures for digital information
and communication that spans the globe (Mayer Lux, 2018).
These activities can range from simple actions such as
16. spreading propaganda online, destruction of critical information
and even perpetrating terrorist attacks over computer systems
(Mayer Lux, 2018). Therefore, understanding cyberterrorism
requires a focus on what terrorism is and then putting it in the
context of cyberspace which is just a new medium through
which these efforts can be propagated.
Problem Statement
Cyberterrorism is an issue of concern today because of the
complexity and severity of the issue. It is complex because
cyberspace is an infinite place and lacks the confines of a
physical world, which suffice for terrorist events perpetrated
outside the digital space. In addition, cyberterrorism is a
relatively new concept brought about by advances in
technology. Also, there is a great dependence on technology
that makes cyberterrorism a concern on very many levels. It is
an issue within the domestic setting and the personal lives of
individuals. It is an issue within organizations where there is
the vulnerability of the information systems relied on by a
majority of firms today. Also, it is a concern for countries that
can be subject to various types of terrorism attacks through
cyberspace. Therefore, cybersecurity concerns become
applicable in every level of life, especially in the modern world.
Why is cybersecurity important?
Cybersecurity is made necessary by the prevalence of
cyberterrorism, especially in a world where people are heavily
invested in and dependent on digital technologies. Mayer Lux
17. (2018) proposes an analysis of cyberterrorism using the harm
principle, which determines that terrorism does not attack
individual interests but rather a collective interest. Terrorism is
an issue in the real world that is intended at hijacking the
constitutional order of society. Therefore, it is no surprise that
as the world becomes more digital, there is a replication of the
same level of terrorist activities online. Therefore,
cyberterrorism is a replication of the malicious actions that take
place in the real world online due to the potency of online
platforms and the awareness by the perpetrators of its
effectiveness. Therefore, cybersecurity is an issue that is
brought about by the increased use and dependence on
technology.
PURPOSE STATEMENT
This research is focused on gaining an appreciation of the threat
of cyberterrorism and the applicable cybersecurity measures
that can overcome the issues. Past literature has ascertained the
potency of cyberterrorism has been ascertained by past
literature, which examines the severity of the threat and the
need to put up prevention measures. For example, in a special
report by Gabriel Weimann in 2004, there is a candid
explanation of the “realness” of the cyberterrorism threat. The
news headlines of the issues of cyberterrorism can inspire fear
in anyone who is in possession of any smart device. While these
pictures might be exaggerated, there is a great potential for
cyberspace to be used as a hub for terrorist activities. The threat
in cyberspace is undeniable and has been on an upward path
proportional to the extent of use of these platforms. It is an
attractive option in the modern-day, particularly owing to its
anonymity, the potential to inflict massive damage, and other
appeals over the conventional perpetration of crime in the
physical world.
18. CONTINUED
Therefore, even in areas where cyberterrorism has not been
experienced to the severity indicated in the headlines and some
scholars, the threat is real and has great potency. For this
reason, this research is conducted to assess the security
measures that can be put in place at the individual level,
organizational level, and national level to keep systems
protected from outside intruders. The aim is to formulate a
knowledge base that can be used to create awareness of
cyberterrorism and possible measures to prevent or mitigate the
effects of cybersecurity.
RESEARCH QUESTION
What is the potency of the cyberterrorism threat to the
individual, organization, or nation, and ways to develop
cybersecurity to curb them?
Key Points Addressed
The concept of cyberterrorism and why it is an issue in modern
society.
The various ways in which cyberterrorism is a threat to
individuals, organizations, and countries.
Policy formulation to counter cyberterrorism.
PROPOSED METHODOLOGY/RESEARCH STRATEGY
19. The proposed methodology for this study is a qualitative
research strategy. Non-numerical data is collected, analyzed,
and interpreted in this strategy. This research strategy is
effective in the topic of cyberterrorism and cybersecurity
because it will be based on the subjective perception of this
topic, which I consider to be a social reality (Mcleod, 2019).
There are aspects of interpretation and a naturalistic approach to
the subject matter associated with the qualitative technique
(Mcleod, 2019). This means that it is possible to investigate
items within the natural setting, make sense of issues, interpret
them, and derive the meanings of the phenomenon to the
affected individuals (Mcleod, 2019). Therefore, I find the
research strategy effective for this topic hence the preferred
option to conduct this study.
Qualitive research
The qualitative research methodology is effective in
circumstances where the intention is to gain an in-depth
appreciation and understanding of a certain phenomenon or
situation (Jaferian et al., 2011). In this case, the phenomenon of
interest is cyberterrorism and cybersecurity. Since the research
will focus on gaining more details, the qualitative study design
becomes an effective methodology. Qualitative research is
mainly an exploratory research technique, wherein in our
current study, the focus will be on examining details of
cyberterrorism. Qualitative research is considered an
interpretive form of research because it provides a platform for
discovering new ideas and revealing unforeseen occurrences
(Yunos and Sulaman, 2017). Qualitative research involves the
analysis of content from written or recorded material that can be
the output of participant responses or observations and reviews
of various literature. It is also a relevant technique for small -
20. scale studies (Yunos and Sulaman, 2017). It is an applicable
technique in collecting data through interviews, participant
observation, and focus groups.
Current research
In this current research, the focus is on cyberterrorism and the
attributes of cyberterrorism with the intention to generate useful
suggestions for the improvement of cybersecurity. Therefore,
the research will adopt the research framework comprising of
interviews and meta-analysis. This framework will align with
the research objective that intends to identify and construct the
phenomenon’s attributes and develop a model that
comprehensively outlines the phenomenon (Yunos and Sulaman,
2017). Therefore, a sample of individuals will be interviewed on
cybersecurity, the interviews transcribed, and interpretations
made from the responses that will furnish the research question
with answers.
It is the assumption in this research that there is up-to-date
literature on the subject that will form a conceptual basis and
also provide insights that can answer the research questions.
The research study will also seek the opinion of individuals who
are expected to have a piece of working knowledge on
cyberterrorism. It is expected that these sources of information
are credible and valid to provide the information being sought.
Also, it is an assumption that the data can be obtained
conveniently and with ease
Findings / conclusion
The concept of cyberterrorism is elusive. In terms of definition,
21. they vary from politically motivated and violent acts or threats
conducted through the internet to preparatory and supporting
activities for terrorism acts done through or on the internet
(Broeders et al., 2021). These activities range from recruitment,
liaison, and financing of terrorist acts. While the concern of
governments is usually on violent terrorist acts, it is evident
that pure cyberterrorism is yet to be experienced in the world
today (Broeders et al., 2021). Terrorism is of the nature of “low
probability, high impact,” which calls for careful attention to
even activities that can appear harmless (Ruggiero and Vos,
2013). This is particularly so in the wake of the 9/11 attacks
and the subsequent position of war against terror.
The digital domain has become a part of modern-day life. This
digital life comes with cyber terrorism and threats of
cyberterrorism that target individuals, organizations, and
nations. Consequently, cyber counterterrorism has become an
integral component of national security and law enforcement
(White, 2016). For instance, the Federal Bureau of Investigation
has a straightforward concept of cyberterrorism and has efforts
intended to curb such activities
Continued
The digital domain has become a part of modern-day life. This
digital life comes with cyber terrorism and threats of
cyberterrorism that target individuals, organizations, and
nations. Consequently, cyber counterterrorism has become an
integral component of national security and law enforcement
(White, 2016). For instance, the Federal Bureau of Investigation
has a straightforward concept of cyberterrorism and has efforts
intended to curb such activities
Digital technologies bring about endless possibilities, but while
this benefits many spheres of human life, it highlights the
similarly endless potential threats. According to the National
22. Research Council (2004), we are much more vulnerable than our
capacity to survive. There have been past incidences of attacks
on cyber financial systems, but the scope has remained
undisclosed to preserve an image of integrity (National
Research Council, 2004). There have been attacks on the
military, and similarly, these attacks have not been fully
disclosed for security reasons. It is, however, reported that over
sixty percent of computers used by the United States military
have been compromised due to cyber-attacks (National Research
Council, 2004). It is known that the computer systems and
networks used by the public and the same used by the national
defense systems; hence they are vulnerable to the same kinds of
attacks. Therefore, an intruder will conveniently seek to attack
the military systems, which are more critical in achieving the
intended objective.
Conclusion
cyberterrorism is a real threat in the world today owing to the
evolution of digital technologies and human dependence on
them. Digitalism is one of the most transformative factors in the
modern world, and with its endless possibilities, there comes
vulnerability related to its potential use for terrorist activities.
There is a major challenge with understanding the concept
hence difficulty in formulating appropriate policies to counter
its effects. This paper considers that the concept needs to be
analyzed in separation with political influences, economic
influences, and media sensationalization. An accurate definition
of cyberterrorism will lay a proper basis for formulating
appropriate policies without infringing on the rights of the
people. There is a fine line between cybersecurity measures and
censoring, which could have implications for human rights. In
this paper, an operational definition of cyberterrorism, its
23. nature, and its effects is put forth as a basis to formulate
cybersecurity measures to protect individuals, organizations,
and countries.