SlideShare a Scribd company logo
1 of 23
Hello Class and Professor,
Cloud computing will assist managers in the future because of
the availability to protect any organization or business from
unauthorized access. The idea of cloud computing or cloud
security is a businesses IT department whose focus is on the
security of possible breaches or threats that can cripple a
business. The past has shown us that even with an IT
department, these security threats are still very possible. An
article online from force point stated that “Cloud computing
allows organizations to operate at scale, reduce technology cost,
and use agile systems that give them the competitive edge.”
(Forcepoint) When a business is just beginning or in the stages
of a transition things like operating at scale and reducing
technology cost are crucial in the growth aspect of a business.
With that being said the future for security managers depends
on the ability to cut cost and still have a secured network for
the protection of the organization.
The concept of concentric layers and how they apply to the
future design of access control and computers is a great way to
make sure that the business is secured through different sectors
of security. Three examples I would consider as a security
feature would be a form of CCTV, my current job has a palm
reader as well as physical security to even get to the area where
you would need to access any type of computer and access
control. Second, I like the idea of an ID card used to log in kind
of like a common access card (CACcard) to even be able to log
into a computer or be granted access to a specific entry point.
Third, would easily be a password that requires multiple special
characters for the prevention of hacking type threats. There are
many different layers of security but they are all used as a
prevention technique to keep your business secure as well as
personal information protected.
-Josh Foster
(Forcepoint)- What is cloud security? Forcepoint. (2021, May
6). Retrieved November 23, 2021, from
https://www.forcepoint.com/cyber-edu/cloud-security.
The concept of cloud computing can assist security managers in
the future by shifting some of the risk associated with
compliance regulations. Ultimately this may allow Information
Technology (IT) departments within the company to focus their
time on other possible threats and vulnerabilities, instead of
rudimentary task like spam filtering. Furthermore, the use of
cloud computing can potentially free up funding to be utilized
for security programs, “without a doubt, cloud computing offers
an opportunity for the IT departments to transfer security risks
away from their budgets and to the budget of a vendor” (Fay,
2010, p. 319).
Concentric layering may be applied to future design and
application of access control and computers by using
countermeasures to deter, deny, and detect the unauthorized
access to spaces or systems. John Fay Contemporary Security
Management” touches on ways of keeping a company laptop
safe. The laptop can be maintained in a secure location that
requires a mechanical key to enter the space. Carefully placing
closed circuit televisions (CCTV) at the entry point for the
space and utilizing biometrics such as a retina scanner and palm
print scanner intensifies the security. The actual computer
containing sensitive company data will be kept inside of a
locked container that requires a combination lock code to
remove the device. The device shall require a strong password
consisting of alpha numeric and special characters that expires
routinely, complete with the ability to identify each user by
verified certificates embedded on their common access card.
System administration access should be controlled by the IT’s
preventing tampering to installed programs. Lastly all company
file folders will require two factor authentications.
References:
Fay, J. (2010). Contemporary security management. Elsevier
Science & Technology.
I found out that this was harder than I initially thought and that
this concept takes way more time to complete than just an 8
week period. This idea will carry on with me when I go to my
next classes that I will go through in the future. Especially
finding the concept that I want to talk about at the beginning of
the schooling and not towards the end, or start of the final class.
I hope that you all have had a great time in your path to where
you are today and continue on with your educational goals and
expectations.
Thanks
Harlan
CONCENTRIC RINGS OF SECURITYAmerican Public
University SystemAmerican Military UniversitySCMT
Undergraduate Capstone Proposal FormDate: November 25,
2021Harlan ChristensenSubmitted in partial fulfillment of the
degree requirements for the BA in Security Management
Concentric Rings of Security
American Public University System
American Military University
SCMT Undergraduate Capstone Proposal Form
Date: November 25, 2021
Harlan Christensen
Submitted in partial fulfillment of the degree requirements for
the
BA in Security Management
Abstract
Concentric rings of security and the processes that it brings
forward can be one of the best methods that any security
manager utilizes in their endeavors to provide the best security
for a given area and that is what the intentions of this paper are
to bring forward. Using this process can integrate many
different known principles and practices like CPTED and the
like, in order to make the process sounder tight in the
judgement of what it is that any security manager needs to use.
Reasons why people might commit a crime M.I.C.E.
M.I.C.E.
Money
Intelligence
Coercion
Ego
This Photo by Unknown Author is licensed under CC BY-NC-
ND
3
Routine Activity Theory (RAT)
4
Three Parts for a crime to happen
“Criminal
Target
Lack of heroic figure” (Orscheln, 2017)
Examples of RAT theory in real life
“George Floyd and other riots around the U.S.” (Orscheln,
Meyer, Center for public safety, 2020)
“Hurricane Katrina and the movement of persons to Houston
with higher crime rates after the displacement” (Hussey,
Kotarba, Swartz, Gelinas, Landry, 2014)
New York in the 90’s and prior
L.A. early 70’s and on
Routine Activity Theory (RAT)
What can be a lack of a heroic figure
“No Cameras or guards
No Police
Lack of Prosecution
Lack of city, state, or federal backing of leadership in the
prosecution of crimes” (Hussey, Kotarba, Swartz, Gelinas,
Landry, 2014)
Concentric Rings of Security
Objective/target Area
When in these restricted areas, the security controls should be
monitored by security personnel closely, and even more closely
when the time of personnel inside the areas. Some of the
policies commonly used in today’s environment in these areas
are things like;
Disallowance of personnel belongings other than what is worn
on the person. I.E., cell phones, computers, storage media,
cameras, etc.
An initial control to the area that is an entrance control. This
area is commonly not allowed to be visible by the general
public of those that work inside the company and do not need
access to such areas that maintain control needs.
Camera systems that have recognition software put on them to
allow for a continual check of the individuals in these areas
both inside the controlled access area and outside the controlled
access area.
The final line of entrance into the targeted object is usually
unseen to everyone that needs to not have access to this area.
This might be a specific coded section that cannot be seen or
known outside of such areas of control.
Main Campus Areas
Areas from building to targeted protected areas.
Measures for security that are common are items like:
Identification cards
Work or job related restrictions
Clean desk policies
Differentiation of items that need controlled access to
Escort procedures, training, and delineation of who can escort
Polices
CCTV camera systems
Etc..
Perimeter
This area consist of any road, parking lot entryways, and other
areas that allow flow to the building and the stretch of area
between such areas and the building perimeter.
Measures for security that are common are items like:
Bollards
Fences
Sensors such as motion detectors
Lighting
Security patrols
Territorial reenforcement
Assessment of security procedures
When assessing areas, one should look at each area in such a
way as to allow for a clear idea of how the security controls are
placed into the area.
Each new technology and procedure that is added an are will be
given a value of .5
An additional .5 will be given when there are policies and how
to implement use of the new control measures and technology
References:
Aasmae, K. (2018, October 28). Security: After Estonia's ID-
card train wreck this identity app is taking Baltics by storm.
ZDNet, p. 1. Retrieved from
https://www.zdnet.com/article/security-after-estonias-id-card-
train-wreck-this-identity-app-is-taking-baltics-by-storm/
Armitage, R. (2017, January 01). Burglars’ Take on Crime
Prevention through Environmental Design (CPTED): Retrieved
from
https://pure.hud.ac.uk/ws/portalfiles/portal/10967362/Burglars_
2527_Take_on_Crime_Prevention_through_Environmental_Desi
gn_Security_Journal_Title_255Bsubmitted_255D_281_29.pdf
Brumback, K. (2020, May 31). Atlanta protest scattered by tear
gas, heavy police presence. Associated Press, p. 1. Retrieved
from https://apnews.com/article/georgia-minnesota-riots-
ahmaud-arbery-atlanta-ef6f71dfe5dedcb2ec14e7d51f01ae42
Congress. (2020). recognizing law enforcement officers across
the country (Congressional Record Volume 166, Number 160).
Retrieved November 16, 2021, from The House of
Representatives, website:
https://www.govinfo.gov/content/pkg/CREC-2020-09-
16/html/CREC-2020-09-16-pt1-PgH4478.htm
Cregg, J. (2018, August 01). A Study of CPTED Principles and
their Relationship to Crime Risk in Beaumont, Texas. Texas
State University, p. 1-76. Retrieved from
https://digital.library.txstate.edu/bitstream/handle/10877/7705/C
regg-DRFinal.pdf?sequence=1&isAllowed=y
Department of Justice. (2020). 74 People Facing Federal
Charges for Crimes Committed During Portland
Demonstrations. Retrieved November 16, 2021, from US DOJ.,
website: https://www.justice.gov/usao-or/pr/74-people-facing-
federal-charges-crimes-committed-during-portland-
demonstrations
References:
Designing Out Opportunity and Fear. Center for Public Safety,
p. 1-6. Retrieved from
https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files/docs
/CRIM%20Resources/Crime%20Prevention%20Through%20Env
ironmental%20Design%20%5BCPTED%5D-
%20Designing%20Out%20Opportunity%20and%20Fear.pdf
Dienst, J. (2021, June 18). Most Riot, Looting Cases from Last
Year Dropped by NYC DAs. New York 4, p. 1. Retrieved from
https://www.nbcnewyork.com/news/local/crime-and-
courts/most-riot-looting-cases-from-last-year-dropped-by-nyc-
das/3114714/
Gelinas, N. (2006, January 04). Katrina Refugees Shoot Up
Houston. City Journal, p. 1. Retrieved from https://www.city-
journal.org/html/katrina-refugees-shoot-houston-10141.html
General Security Risk Assessment Guidelines. (2021). Retrieved
October 17, 2021, from
https://www.asisonline.org/publications--resources/standards--
guidelines/gsra/
Godown, J. (2013). The CompStat Process: Four Principles for
Managing Crime Reduction. The Police Chief Magazine, 1(1),
1. Retrieved from
https://www.iadlest.org/Portals/0/Files/Documents/DDACTS/Do
cs/The%20CompStat%20Process.pdf
Hussey, A. (2011, May 28). Crime Spillovers and Hurricane
Katrina. University of Memphis, p. 1-44. Retrieved from
file:///C:/Users/harla/AppData/Local/Temp/Crime_Spillovers_a
nd_Hurricane_Katrina.pdf.
Iboshi, K. (2021, March 02). Feds quietly dismiss dozens of
Portland protest cases. KGW8, p. 1. Retrieved from
https://www.kgw.com/article/news/investiga tions/portland-
protest-cases-dismissed-feds/283-002f01d2-3217-4b12-8725-
3fda2cad119f
Kotarba, Fackler, J., Johnson, B. D., & Dunlap, E. (2010). The
Melding of Drug Markets in Houston After Katrina: Dealer and
User Perspectives. Substance Use & Misuse, 45(9), 1390–1405.
https://doi.org/10.3109/10826081003682917
References:
Landry, R. (2014, January 01). Violent Crime Rates in Houston
Before and After. Retrieved from
https://swer.wtamu.edu/sites/default/files/Data/SER_RN-2008-
Landry_Rankin-Violent%20Crime.pdf
Litke, E. (2020, September 18). Fact check: Nearly all arrests in
Kenosha protests were from the area. USA Today, p. 1.
Retrieved from
https://www.usatoday.com/story/news/factcheck/2020/09/18/fac
t-check-nearly-all-arrests-kenosha-protests-were-
area/3492839001/
Macano, K. (2018, January 01). Crime Prevention Through
Environmental Design [CPTED]:
Designing Out Opportunity and Fear. Center for Public Safety,
p. 1-6. Retrieved from
https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files/docs
/CRIM%20Resources/Crime%20Prevention%20Through%20Env
ironmental%20Design%20%5BCPTED%5D-
%20Designing%20Out%20Opportunity%20and%20Fear.pdf
Mackay, R. (2017). Lessons from Manchester and Paris:
Physical Security for the Entertainment Industry and Executive
Protection: Iconic entertainers will remain attractive targets for
terrorist attacks because they attract substantial crowds and
promote social norms and values that conflict with terrorists'
worldviews. Security, 54(9), 54-. Retrieved from https://www-
proquest-
com.ezproxy1.apus.edu/docview/2108801853/9B8E4B406BC44
126PQ/1?accountid=8289
Management System for Quality of Private Security Company
Operations-Requirements with Guidance. (2021). Retrieved
October 17, 2021, from
https://www.asisonline.org/publications--resources/standards--
guidelines/psc1/
Meyer, C. (2020, October). At Rest, At Risk. Security
Management, 20(10), 30-37.
Orscheln, A. (2017, April 12). Routine Activity Theory at the
Census Tract-Level. University of Missouri, p. 1-41. Retrieved
from
https://irl.umsl.edu/cgi/viewcontent.cgi?article=1294&context=t
hesis.
16
References:
Practice Profile: Closed Circuit Television (CCTV)
Surveillance. (2020). Retrieved September 12, 2021. Retrieved
from https://crimesolutions.ojp.gov/ratedpractices/25#pd
Raible, S. (2020, June 18). Dozens of protesters arrested by
Seattle police may never be prosecuted. KIRO7, p. 1. Retrieved
from https://www.kiro7.com/news/local/dozens-protesters-
arrested-by-seattle-police-may-never-be-
prosecuted/TQMXRMHYXBFZ5KZVTMEDU2S4IE/
Ramey, D. (2020, July 21). Protests in downtown Boise wind
down after a largely peaceful night. KTVB7, p. 1. Retrieved
from https://www.ktvb.com/article/news/local/live-at-330-pm-
boise-police-chief-lee-to-brief-the-public-about-tonights-
protests/277-6b85a246-f71c-4c06-9a40-d4603023d295
Schaffner, D. (2014, March 14). Information Thieves: Using
Industrial Espionage to Examine the Development of the
Information Economy. University of Boston Massachusetts, p.
1-55. Retrieved from
https://scholarworks.umb.edu/cgi/viewcontent.cgi?article=1004
&context=honors_theses
Swartz, M. (2008, October 01). The Year of Living
Dangerously. Texas Monthly, p. 1. Retrieved from
https://www.texasmonthly.com/articles/the-year-of-living-
dangerously/.
U.S. Marshals Office, n. DOJ. (1995). Vulnerability Assessment
of Federal Facilities (156412 C.2). Retrieved August 29, 2021,
from DOJ, website:
https://www.ojp.gov/pdffiles1/Digitization/156412NCJRS.pdf
Hello class,
We made it. Congrats to everyone and thank you instructor for
an interesting class.
Student Name: Ryan TrineDate: 11/22/2021
Cyber Terrorism and Cybersecurity
Student Name: Ryan Trine
Date: 11/22/2021
Abstract
cyberspace is a potent tool for terrorist activities and that there
is a vast extent of vulnerability for individuals, organizations,
and countries. This study adopts a qualitative methodology to
analyze the concept of cyberterrorism and the reality of the
threat in the world today. The findings indicate that cyberspace
is an appropriate medium for terrorist activities. There is a need
for proper nomenclature by which the scope of cyberterrorism
can be effectively understood. This will form a basis for
formulating cybersecurity measures that do not infringe on
human rights, such as freedom of speech or expression.
InTRO
Technology is one of the fastest-growing and most
transformative single factors in the world today. Technology
affects many aspects of people’s lives, including
communication, learning, and thinking (Mickeel, 2019). There
are positive and negative effects of technology, but we are
living in a world where technology is an integral part. Also,
these are advances keep touching on more aspects of our daily
lives. As a result, people are becoming more dependent on
technology for personal life matters and even for work. As
technology becomes more invaluable in our lives, people
become more dependent on it, and this brings about a unique
level of vulnerability.
Continued
It is generally agreed that digital life has negatives in as much
as there are positive outcomes associated with technology.
According to Anderson and Rainie (2018), fifty percent of the
individuals in the study had a substantial agreement that the
positives of digital life outweigh the negatives. However, this
just signifies that an equal proportion believes in the negative
effects of digital life. In a third of the respondents, there is an
explicit belief that harms are likely to outweigh the benefits of
digital life (Anderson and Rainie, 2018). It is a common
consensus that there are deep concerns over the well-being of
the people in a technological world. With advances in
technology, people have become exposed to fears which could
have only qualified in science fiction novels half a century ago
(Anderson and Rainie, 2018). Therefore, even as technology
advances and people become more dependent on it, it is
essential to be wary of the negative effects that come about with
technology.
Cyberterrorism
Cyber terrorism is one of the negative effects that are potent in
the digital world. This is a broad term encompassing any
malicious effort perpetrated through computers or using
information technology that is intended to cause disruption or
fear on an individual or entity in the community.
Cyberterrorism refers to any range of illegal activities
conducted through technological and digital devices and
techniques (Al Mazari et al., 2018). The use of the prefix
“cyber” is aimed at emphasizing the medium on which these
activities are propagated (Mayer Lux, 2018). Therefore,
cyberterrorism refers to a wide range of malicious activities that
take place over cyberspace. Cyberspace can be defined as the
system of interconnected infrastructures for digital information
and communication that spans the globe (Mayer Lux, 2018).
These activities can range from simple actions such as
spreading propaganda online, destruction of critical information
and even perpetrating terrorist attacks over computer systems
(Mayer Lux, 2018). Therefore, understanding cyberterrorism
requires a focus on what terrorism is and then putting it in the
context of cyberspace which is just a new medium through
which these efforts can be propagated.
Problem Statement
Cyberterrorism is an issue of concern today because of the
complexity and severity of the issue. It is complex because
cyberspace is an infinite place and lacks the confines of a
physical world, which suffice for terrorist events perpetrated
outside the digital space. In addition, cyberterrorism is a
relatively new concept brought about by advances in
technology. Also, there is a great dependence on technology
that makes cyberterrorism a concern on very many levels. It is
an issue within the domestic setting and the personal lives of
individuals. It is an issue within organizations where there is
the vulnerability of the information systems relied on by a
majority of firms today. Also, it is a concern for countries that
can be subject to various types of terrorism attacks through
cyberspace. Therefore, cybersecurity concerns become
applicable in every level of life, especially in the modern world.
Why is cybersecurity important?
Cybersecurity is made necessary by the prevalence of
cyberterrorism, especially in a world where people are heavily
invested in and dependent on digital technologies. Mayer Lux
(2018) proposes an analysis of cyberterrorism using the harm
principle, which determines that terrorism does not attack
individual interests but rather a collective interest. Terrorism is
an issue in the real world that is intended at hijacking the
constitutional order of society. Therefore, it is no surprise that
as the world becomes more digital, there is a replication of the
same level of terrorist activities online. Therefore,
cyberterrorism is a replication of the malicious actions that take
place in the real world online due to the potency of online
platforms and the awareness by the perpetrators of its
effectiveness. Therefore, cybersecurity is an issue that is
brought about by the increased use and dependence on
technology.
PURPOSE STATEMENT
This research is focused on gaining an appreciation of the threat
of cyberterrorism and the applicable cybersecurity measures
that can overcome the issues. Past literature has ascertained the
potency of cyberterrorism has been ascertained by past
literature, which examines the severity of the threat and the
need to put up prevention measures. For example, in a special
report by Gabriel Weimann in 2004, there is a candid
explanation of the “realness” of the cyberterrorism threat. The
news headlines of the issues of cyberterrorism can inspire fear
in anyone who is in possession of any smart device. While these
pictures might be exaggerated, there is a great potential for
cyberspace to be used as a hub for terrorist activities. The threat
in cyberspace is undeniable and has been on an upward path
proportional to the extent of use of these platforms. It is an
attractive option in the modern-day, particularly owing to its
anonymity, the potential to inflict massive damage, and other
appeals over the conventional perpetration of crime in the
physical world.
CONTINUED
Therefore, even in areas where cyberterrorism has not been
experienced to the severity indicated in the headlines and some
scholars, the threat is real and has great potency. For this
reason, this research is conducted to assess the security
measures that can be put in place at the individual level,
organizational level, and national level to keep systems
protected from outside intruders. The aim is to formulate a
knowledge base that can be used to create awareness of
cyberterrorism and possible measures to prevent or mitigate the
effects of cybersecurity.
RESEARCH QUESTION
What is the potency of the cyberterrorism threat to the
individual, organization, or nation, and ways to develop
cybersecurity to curb them?
Key Points Addressed
The concept of cyberterrorism and why it is an issue in modern
society.
The various ways in which cyberterrorism is a threat to
individuals, organizations, and countries.
Policy formulation to counter cyberterrorism.
PROPOSED METHODOLOGY/RESEARCH STRATEGY
The proposed methodology for this study is a qualitative
research strategy. Non-numerical data is collected, analyzed,
and interpreted in this strategy. This research strategy is
effective in the topic of cyberterrorism and cybersecurity
because it will be based on the subjective perception of this
topic, which I consider to be a social reality (Mcleod, 2019).
There are aspects of interpretation and a naturalistic approach to
the subject matter associated with the qualitative technique
(Mcleod, 2019). This means that it is possible to investigate
items within the natural setting, make sense of issues, interpret
them, and derive the meanings of the phenomenon to the
affected individuals (Mcleod, 2019). Therefore, I find the
research strategy effective for this topic hence the preferred
option to conduct this study.
Qualitive research
The qualitative research methodology is effective in
circumstances where the intention is to gain an in-depth
appreciation and understanding of a certain phenomenon or
situation (Jaferian et al., 2011). In this case, the phenomenon of
interest is cyberterrorism and cybersecurity. Since the research
will focus on gaining more details, the qualitative study design
becomes an effective methodology. Qualitative research is
mainly an exploratory research technique, wherein in our
current study, the focus will be on examining details of
cyberterrorism. Qualitative research is considered an
interpretive form of research because it provides a platform for
discovering new ideas and revealing unforeseen occurrences
(Yunos and Sulaman, 2017). Qualitative research involves the
analysis of content from written or recorded material that can be
the output of participant responses or observations and reviews
of various literature. It is also a relevant technique for small -
scale studies (Yunos and Sulaman, 2017). It is an applicable
technique in collecting data through interviews, participant
observation, and focus groups.
Current research
In this current research, the focus is on cyberterrorism and the
attributes of cyberterrorism with the intention to generate useful
suggestions for the improvement of cybersecurity. Therefore,
the research will adopt the research framework comprising of
interviews and meta-analysis. This framework will align with
the research objective that intends to identify and construct the
phenomenon’s attributes and develop a model that
comprehensively outlines the phenomenon (Yunos and Sulaman,
2017). Therefore, a sample of individuals will be interviewed on
cybersecurity, the interviews transcribed, and interpretations
made from the responses that will furnish the research question
with answers.
It is the assumption in this research that there is up-to-date
literature on the subject that will form a conceptual basis and
also provide insights that can answer the research questions.
The research study will also seek the opinion of individuals who
are expected to have a piece of working knowledge on
cyberterrorism. It is expected that these sources of information
are credible and valid to provide the information being sought.
Also, it is an assumption that the data can be obtained
conveniently and with ease
Findings / conclusion
The concept of cyberterrorism is elusive. In terms of definition,
they vary from politically motivated and violent acts or threats
conducted through the internet to preparatory and supporting
activities for terrorism acts done through or on the internet
(Broeders et al., 2021). These activities range from recruitment,
liaison, and financing of terrorist acts. While the concern of
governments is usually on violent terrorist acts, it is evident
that pure cyberterrorism is yet to be experienced in the world
today (Broeders et al., 2021). Terrorism is of the nature of “low
probability, high impact,” which calls for careful attention to
even activities that can appear harmless (Ruggiero and Vos,
2013). This is particularly so in the wake of the 9/11 attacks
and the subsequent position of war against terror.
The digital domain has become a part of modern-day life. This
digital life comes with cyber terrorism and threats of
cyberterrorism that target individuals, organizations, and
nations. Consequently, cyber counterterrorism has become an
integral component of national security and law enforcement
(White, 2016). For instance, the Federal Bureau of Investigation
has a straightforward concept of cyberterrorism and has efforts
intended to curb such activities
Continued
The digital domain has become a part of modern-day life. This
digital life comes with cyber terrorism and threats of
cyberterrorism that target individuals, organizations, and
nations. Consequently, cyber counterterrorism has become an
integral component of national security and law enforcement
(White, 2016). For instance, the Federal Bureau of Investigation
has a straightforward concept of cyberterrorism and has efforts
intended to curb such activities
Digital technologies bring about endless possibilities, but while
this benefits many spheres of human life, it highlights the
similarly endless potential threats. According to the National
Research Council (2004), we are much more vulnerable than our
capacity to survive. There have been past incidences of attacks
on cyber financial systems, but the scope has remained
undisclosed to preserve an image of integrity (National
Research Council, 2004). There have been attacks on the
military, and similarly, these attacks have not been fully
disclosed for security reasons. It is, however, reported that over
sixty percent of computers used by the United States military
have been compromised due to cyber-attacks (National Research
Council, 2004). It is known that the computer systems and
networks used by the public and the same used by the national
defense systems; hence they are vulnerable to the same kinds of
attacks. Therefore, an intruder will conveniently seek to attack
the military systems, which are more critical in achieving the
intended objective.
Conclusion
cyberterrorism is a real threat in the world today owing to the
evolution of digital technologies and human dependence on
them. Digitalism is one of the most transformative factors in the
modern world, and with its endless possibilities, there comes
vulnerability related to its potential use for terrorist activities.
There is a major challenge with understanding the concept
hence difficulty in formulating appropriate policies to counter
its effects. This paper considers that the concept needs to be
analyzed in separation with political influences, economic
influences, and media sensationalization. An accurate definition
of cyberterrorism will lay a proper basis for formulating
appropriate policies without infringing on the rights of the
people. There is a fine line between cybersecurity measures and
censoring, which could have implications for human rights. In
this paper, an operational definition of cyberterrorism, its
nature, and its effects is put forth as a basis to formulate
cybersecurity measures to protect individuals, organizations,
and countries.

More Related Content

Similar to Hello Class and Professor,Cloud computing will assist managers i

Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inmaribethy2y
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCSantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCAbbyWhyte974
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructureAnton Chuvakin
 
CIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docxCIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docxmccormicknadine86
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxsusanschei
 
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIJCSEA Journal
 

Similar to Hello Class and Professor,Cloud computing will assist managers i (10)

Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
CIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docxCIS502 discussion post responses.Respond to the colleagues posts.docx
CIS502 discussion post responses.Respond to the colleagues posts.docx
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Running head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docxRunning head CHALLENGES OF CYBER SECURITY9.docx
Running head CHALLENGES OF CYBER SECURITY9.docx
 
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAMIT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
 

More from SusanaFurman449

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxSusanaFurman449
 
PLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxPLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxSusanaFurman449
 
Please reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxPlease reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxSusanaFurman449
 
Please read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxPlease read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxSusanaFurman449
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxSusanaFurman449
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docxSusanaFurman449
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxSusanaFurman449
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docxSusanaFurman449
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docxSusanaFurman449
 
Need help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxNeed help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxSusanaFurman449
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxSusanaFurman449
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxSusanaFurman449
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxSusanaFurman449
 
In this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxIn this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxSusanaFurman449
 
In the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxIn the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxSusanaFurman449
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxSusanaFurman449
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxSusanaFurman449
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxSusanaFurman449
 
In studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxIn studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxSusanaFurman449
 
I need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxI need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxSusanaFurman449
 

More from SusanaFurman449 (20)

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docx
 
PLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxPLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docx
 
Please reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxPlease reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docx
 
Please read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxPlease read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docx
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docx
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docx
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docx
 
Need help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxNeed help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docx
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
 
In this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxIn this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docx
 
In the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxIn the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docx
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docx
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docx
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docx
 
In studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxIn studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docx
 
I need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxI need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 

Hello Class and Professor,Cloud computing will assist managers i

  • 1. Hello Class and Professor, Cloud computing will assist managers in the future because of the availability to protect any organization or business from unauthorized access. The idea of cloud computing or cloud security is a businesses IT department whose focus is on the security of possible breaches or threats that can cripple a business. The past has shown us that even with an IT department, these security threats are still very possible. An article online from force point stated that “Cloud computing allows organizations to operate at scale, reduce technology cost, and use agile systems that give them the competitive edge.” (Forcepoint) When a business is just beginning or in the stages of a transition things like operating at scale and reducing technology cost are crucial in the growth aspect of a business. With that being said the future for security managers depends on the ability to cut cost and still have a secured network for the protection of the organization. The concept of concentric layers and how they apply to the future design of access control and computers is a great way to make sure that the business is secured through different sectors of security. Three examples I would consider as a security feature would be a form of CCTV, my current job has a palm reader as well as physical security to even get to the area where you would need to access any type of computer and access control. Second, I like the idea of an ID card used to log in kind of like a common access card (CACcard) to even be able to log into a computer or be granted access to a specific entry point. Third, would easily be a password that requires multiple special characters for the prevention of hacking type threats. There are many different layers of security but they are all used as a prevention technique to keep your business secure as well as personal information protected. -Josh Foster (Forcepoint)- What is cloud security? Forcepoint. (2021, May
  • 2. 6). Retrieved November 23, 2021, from https://www.forcepoint.com/cyber-edu/cloud-security. The concept of cloud computing can assist security managers in the future by shifting some of the risk associated with compliance regulations. Ultimately this may allow Information Technology (IT) departments within the company to focus their time on other possible threats and vulnerabilities, instead of rudimentary task like spam filtering. Furthermore, the use of cloud computing can potentially free up funding to be utilized for security programs, “without a doubt, cloud computing offers an opportunity for the IT departments to transfer security risks away from their budgets and to the budget of a vendor” (Fay, 2010, p. 319). Concentric layering may be applied to future design and application of access control and computers by using countermeasures to deter, deny, and detect the unauthorized access to spaces or systems. John Fay Contemporary Security Management” touches on ways of keeping a company laptop safe. The laptop can be maintained in a secure location that requires a mechanical key to enter the space. Carefully placing closed circuit televisions (CCTV) at the entry point for the space and utilizing biometrics such as a retina scanner and palm print scanner intensifies the security. The actual computer containing sensitive company data will be kept inside of a locked container that requires a combination lock code to remove the device. The device shall require a strong password consisting of alpha numeric and special characters that expires routinely, complete with the ability to identify each user by verified certificates embedded on their common access card. System administration access should be controlled by the IT’s preventing tampering to installed programs. Lastly all company file folders will require two factor authentications.
  • 3. References: Fay, J. (2010). Contemporary security management. Elsevier Science & Technology. I found out that this was harder than I initially thought and that this concept takes way more time to complete than just an 8 week period. This idea will carry on with me when I go to my next classes that I will go through in the future. Especially finding the concept that I want to talk about at the beginning of the schooling and not towards the end, or start of the final class. I hope that you all have had a great time in your path to where you are today and continue on with your educational goals and expectations. Thanks Harlan CONCENTRIC RINGS OF SECURITYAmerican Public University SystemAmerican Military UniversitySCMT Undergraduate Capstone Proposal FormDate: November 25, 2021Harlan ChristensenSubmitted in partial fulfillment of the degree requirements for the BA in Security Management Concentric Rings of Security American Public University System American Military University SCMT Undergraduate Capstone Proposal Form Date: November 25, 2021 Harlan Christensen Submitted in partial fulfillment of the degree requirements for the BA in Security Management
  • 4. Abstract Concentric rings of security and the processes that it brings forward can be one of the best methods that any security manager utilizes in their endeavors to provide the best security for a given area and that is what the intentions of this paper are to bring forward. Using this process can integrate many different known principles and practices like CPTED and the like, in order to make the process sounder tight in the judgement of what it is that any security manager needs to use. Reasons why people might commit a crime M.I.C.E. M.I.C.E. Money Intelligence Coercion Ego This Photo by Unknown Author is licensed under CC BY-NC- ND 3 Routine Activity Theory (RAT) 4
  • 5. Three Parts for a crime to happen “Criminal Target Lack of heroic figure” (Orscheln, 2017) Examples of RAT theory in real life “George Floyd and other riots around the U.S.” (Orscheln, Meyer, Center for public safety, 2020) “Hurricane Katrina and the movement of persons to Houston with higher crime rates after the displacement” (Hussey, Kotarba, Swartz, Gelinas, Landry, 2014) New York in the 90’s and prior L.A. early 70’s and on Routine Activity Theory (RAT) What can be a lack of a heroic figure “No Cameras or guards No Police
  • 6. Lack of Prosecution Lack of city, state, or federal backing of leadership in the prosecution of crimes” (Hussey, Kotarba, Swartz, Gelinas, Landry, 2014) Concentric Rings of Security Objective/target Area When in these restricted areas, the security controls should be monitored by security personnel closely, and even more closely when the time of personnel inside the areas. Some of the policies commonly used in today’s environment in these areas are things like; Disallowance of personnel belongings other than what is worn on the person. I.E., cell phones, computers, storage media, cameras, etc. An initial control to the area that is an entrance control. This area is commonly not allowed to be visible by the general public of those that work inside the company and do not need access to such areas that maintain control needs. Camera systems that have recognition software put on them to allow for a continual check of the individuals in these areas both inside the controlled access area and outside the controlled access area. The final line of entrance into the targeted object is usually unseen to everyone that needs to not have access to this area. This might be a specific coded section that cannot be seen or known outside of such areas of control.
  • 7. Main Campus Areas Areas from building to targeted protected areas. Measures for security that are common are items like: Identification cards Work or job related restrictions Clean desk policies Differentiation of items that need controlled access to Escort procedures, training, and delineation of who can escort Polices CCTV camera systems Etc.. Perimeter This area consist of any road, parking lot entryways, and other areas that allow flow to the building and the stretch of area between such areas and the building perimeter. Measures for security that are common are items like: Bollards Fences Sensors such as motion detectors Lighting Security patrols Territorial reenforcement Assessment of security procedures When assessing areas, one should look at each area in such a way as to allow for a clear idea of how the security controls are placed into the area. Each new technology and procedure that is added an are will be given a value of .5
  • 8. An additional .5 will be given when there are policies and how to implement use of the new control measures and technology References: Aasmae, K. (2018, October 28). Security: After Estonia's ID- card train wreck this identity app is taking Baltics by storm. ZDNet, p. 1. Retrieved from https://www.zdnet.com/article/security-after-estonias-id-card- train-wreck-this-identity-app-is-taking-baltics-by-storm/ Armitage, R. (2017, January 01). Burglars’ Take on Crime Prevention through Environmental Design (CPTED): Retrieved from https://pure.hud.ac.uk/ws/portalfiles/portal/10967362/Burglars_ 2527_Take_on_Crime_Prevention_through_Environmental_Desi gn_Security_Journal_Title_255Bsubmitted_255D_281_29.pdf Brumback, K. (2020, May 31). Atlanta protest scattered by tear
  • 9. gas, heavy police presence. Associated Press, p. 1. Retrieved from https://apnews.com/article/georgia-minnesota-riots- ahmaud-arbery-atlanta-ef6f71dfe5dedcb2ec14e7d51f01ae42 Congress. (2020). recognizing law enforcement officers across the country (Congressional Record Volume 166, Number 160). Retrieved November 16, 2021, from The House of Representatives, website: https://www.govinfo.gov/content/pkg/CREC-2020-09- 16/html/CREC-2020-09-16-pt1-PgH4478.htm Cregg, J. (2018, August 01). A Study of CPTED Principles and their Relationship to Crime Risk in Beaumont, Texas. Texas State University, p. 1-76. Retrieved from https://digital.library.txstate.edu/bitstream/handle/10877/7705/C regg-DRFinal.pdf?sequence=1&isAllowed=y Department of Justice. (2020). 74 People Facing Federal Charges for Crimes Committed During Portland Demonstrations. Retrieved November 16, 2021, from US DOJ., website: https://www.justice.gov/usao-or/pr/74-people-facing- federal-charges-crimes-committed-during-portland- demonstrations References: Designing Out Opportunity and Fear. Center for Public Safety, p. 1-6. Retrieved from https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files/docs /CRIM%20Resources/Crime%20Prevention%20Through%20Env ironmental%20Design%20%5BCPTED%5D- %20Designing%20Out%20Opportunity%20and%20Fear.pdf Dienst, J. (2021, June 18). Most Riot, Looting Cases from Last Year Dropped by NYC DAs. New York 4, p. 1. Retrieved from
  • 10. https://www.nbcnewyork.com/news/local/crime-and- courts/most-riot-looting-cases-from-last-year-dropped-by-nyc- das/3114714/ Gelinas, N. (2006, January 04). Katrina Refugees Shoot Up Houston. City Journal, p. 1. Retrieved from https://www.city- journal.org/html/katrina-refugees-shoot-houston-10141.html General Security Risk Assessment Guidelines. (2021). Retrieved October 17, 2021, from https://www.asisonline.org/publications--resources/standards-- guidelines/gsra/ Godown, J. (2013). The CompStat Process: Four Principles for Managing Crime Reduction. The Police Chief Magazine, 1(1), 1. Retrieved from https://www.iadlest.org/Portals/0/Files/Documents/DDACTS/Do cs/The%20CompStat%20Process.pdf Hussey, A. (2011, May 28). Crime Spillovers and Hurricane Katrina. University of Memphis, p. 1-44. Retrieved from file:///C:/Users/harla/AppData/Local/Temp/Crime_Spillovers_a nd_Hurricane_Katrina.pdf. Iboshi, K. (2021, March 02). Feds quietly dismiss dozens of Portland protest cases. KGW8, p. 1. Retrieved from https://www.kgw.com/article/news/investiga tions/portland- protest-cases-dismissed-feds/283-002f01d2-3217-4b12-8725- 3fda2cad119f Kotarba, Fackler, J., Johnson, B. D., & Dunlap, E. (2010). The Melding of Drug Markets in Houston After Katrina: Dealer and User Perspectives. Substance Use & Misuse, 45(9), 1390–1405. https://doi.org/10.3109/10826081003682917
  • 11. References: Landry, R. (2014, January 01). Violent Crime Rates in Houston Before and After. Retrieved from https://swer.wtamu.edu/sites/default/files/Data/SER_RN-2008- Landry_Rankin-Violent%20Crime.pdf Litke, E. (2020, September 18). Fact check: Nearly all arrests in Kenosha protests were from the area. USA Today, p. 1. Retrieved from https://www.usatoday.com/story/news/factcheck/2020/09/18/fac t-check-nearly-all-arrests-kenosha-protests-were- area/3492839001/ Macano, K. (2018, January 01). Crime Prevention Through Environmental Design [CPTED]: Designing Out Opportunity and Fear. Center for Public Safety, p. 1-6. Retrieved from https://www.rit.edu/liberalarts/sites/rit.edu.liberalarts/files/docs /CRIM%20Resources/Crime%20Prevention%20Through%20Env ironmental%20Design%20%5BCPTED%5D- %20Designing%20Out%20Opportunity%20and%20Fear.pdf Mackay, R. (2017). Lessons from Manchester and Paris: Physical Security for the Entertainment Industry and Executive Protection: Iconic entertainers will remain attractive targets for terrorist attacks because they attract substantial crowds and promote social norms and values that conflict with terrorists' worldviews. Security, 54(9), 54-. Retrieved from https://www- proquest- com.ezproxy1.apus.edu/docview/2108801853/9B8E4B406BC44 126PQ/1?accountid=8289 Management System for Quality of Private Security Company Operations-Requirements with Guidance. (2021). Retrieved October 17, 2021, from
  • 12. https://www.asisonline.org/publications--resources/standards-- guidelines/psc1/ Meyer, C. (2020, October). At Rest, At Risk. Security Management, 20(10), 30-37. Orscheln, A. (2017, April 12). Routine Activity Theory at the Census Tract-Level. University of Missouri, p. 1-41. Retrieved from https://irl.umsl.edu/cgi/viewcontent.cgi?article=1294&context=t hesis. 16 References: Practice Profile: Closed Circuit Television (CCTV) Surveillance. (2020). Retrieved September 12, 2021. Retrieved from https://crimesolutions.ojp.gov/ratedpractices/25#pd Raible, S. (2020, June 18). Dozens of protesters arrested by Seattle police may never be prosecuted. KIRO7, p. 1. Retrieved from https://www.kiro7.com/news/local/dozens-protesters- arrested-by-seattle-police-may-never-be- prosecuted/TQMXRMHYXBFZ5KZVTMEDU2S4IE/ Ramey, D. (2020, July 21). Protests in downtown Boise wind down after a largely peaceful night. KTVB7, p. 1. Retrieved from https://www.ktvb.com/article/news/local/live-at-330-pm- boise-police-chief-lee-to-brief-the-public-about-tonights- protests/277-6b85a246-f71c-4c06-9a40-d4603023d295 Schaffner, D. (2014, March 14). Information Thieves: Using Industrial Espionage to Examine the Development of the Information Economy. University of Boston Massachusetts, p.
  • 13. 1-55. Retrieved from https://scholarworks.umb.edu/cgi/viewcontent.cgi?article=1004 &context=honors_theses Swartz, M. (2008, October 01). The Year of Living Dangerously. Texas Monthly, p. 1. Retrieved from https://www.texasmonthly.com/articles/the-year-of-living- dangerously/. U.S. Marshals Office, n. DOJ. (1995). Vulnerability Assessment of Federal Facilities (156412 C.2). Retrieved August 29, 2021, from DOJ, website: https://www.ojp.gov/pdffiles1/Digitization/156412NCJRS.pdf Hello class, We made it. Congrats to everyone and thank you instructor for an interesting class. Student Name: Ryan TrineDate: 11/22/2021 Cyber Terrorism and Cybersecurity Student Name: Ryan Trine Date: 11/22/2021
  • 14. Abstract cyberspace is a potent tool for terrorist activities and that there is a vast extent of vulnerability for individuals, organizations, and countries. This study adopts a qualitative methodology to analyze the concept of cyberterrorism and the reality of the threat in the world today. The findings indicate that cyberspace is an appropriate medium for terrorist activities. There is a need for proper nomenclature by which the scope of cyberterrorism can be effectively understood. This will form a basis for formulating cybersecurity measures that do not infringe on human rights, such as freedom of speech or expression. InTRO Technology is one of the fastest-growing and most transformative single factors in the world today. Technology affects many aspects of people’s lives, including communication, learning, and thinking (Mickeel, 2019). There are positive and negative effects of technology, but we are living in a world where technology is an integral part. Also, these are advances keep touching on more aspects of our daily lives. As a result, people are becoming more dependent on technology for personal life matters and even for work. As technology becomes more invaluable in our lives, people become more dependent on it, and this brings about a unique level of vulnerability. Continued It is generally agreed that digital life has negatives in as much
  • 15. as there are positive outcomes associated with technology. According to Anderson and Rainie (2018), fifty percent of the individuals in the study had a substantial agreement that the positives of digital life outweigh the negatives. However, this just signifies that an equal proportion believes in the negative effects of digital life. In a third of the respondents, there is an explicit belief that harms are likely to outweigh the benefits of digital life (Anderson and Rainie, 2018). It is a common consensus that there are deep concerns over the well-being of the people in a technological world. With advances in technology, people have become exposed to fears which could have only qualified in science fiction novels half a century ago (Anderson and Rainie, 2018). Therefore, even as technology advances and people become more dependent on it, it is essential to be wary of the negative effects that come about with technology. Cyberterrorism Cyber terrorism is one of the negative effects that are potent in the digital world. This is a broad term encompassing any malicious effort perpetrated through computers or using information technology that is intended to cause disruption or fear on an individual or entity in the community. Cyberterrorism refers to any range of illegal activities conducted through technological and digital devices and techniques (Al Mazari et al., 2018). The use of the prefix “cyber” is aimed at emphasizing the medium on which these activities are propagated (Mayer Lux, 2018). Therefore, cyberterrorism refers to a wide range of malicious activities that take place over cyberspace. Cyberspace can be defined as the system of interconnected infrastructures for digital information and communication that spans the globe (Mayer Lux, 2018). These activities can range from simple actions such as
  • 16. spreading propaganda online, destruction of critical information and even perpetrating terrorist attacks over computer systems (Mayer Lux, 2018). Therefore, understanding cyberterrorism requires a focus on what terrorism is and then putting it in the context of cyberspace which is just a new medium through which these efforts can be propagated. Problem Statement Cyberterrorism is an issue of concern today because of the complexity and severity of the issue. It is complex because cyberspace is an infinite place and lacks the confines of a physical world, which suffice for terrorist events perpetrated outside the digital space. In addition, cyberterrorism is a relatively new concept brought about by advances in technology. Also, there is a great dependence on technology that makes cyberterrorism a concern on very many levels. It is an issue within the domestic setting and the personal lives of individuals. It is an issue within organizations where there is the vulnerability of the information systems relied on by a majority of firms today. Also, it is a concern for countries that can be subject to various types of terrorism attacks through cyberspace. Therefore, cybersecurity concerns become applicable in every level of life, especially in the modern world. Why is cybersecurity important? Cybersecurity is made necessary by the prevalence of cyberterrorism, especially in a world where people are heavily invested in and dependent on digital technologies. Mayer Lux
  • 17. (2018) proposes an analysis of cyberterrorism using the harm principle, which determines that terrorism does not attack individual interests but rather a collective interest. Terrorism is an issue in the real world that is intended at hijacking the constitutional order of society. Therefore, it is no surprise that as the world becomes more digital, there is a replication of the same level of terrorist activities online. Therefore, cyberterrorism is a replication of the malicious actions that take place in the real world online due to the potency of online platforms and the awareness by the perpetrators of its effectiveness. Therefore, cybersecurity is an issue that is brought about by the increased use and dependence on technology. PURPOSE STATEMENT This research is focused on gaining an appreciation of the threat of cyberterrorism and the applicable cybersecurity measures that can overcome the issues. Past literature has ascertained the potency of cyberterrorism has been ascertained by past literature, which examines the severity of the threat and the need to put up prevention measures. For example, in a special report by Gabriel Weimann in 2004, there is a candid explanation of the “realness” of the cyberterrorism threat. The news headlines of the issues of cyberterrorism can inspire fear in anyone who is in possession of any smart device. While these pictures might be exaggerated, there is a great potential for cyberspace to be used as a hub for terrorist activities. The threat in cyberspace is undeniable and has been on an upward path proportional to the extent of use of these platforms. It is an attractive option in the modern-day, particularly owing to its anonymity, the potential to inflict massive damage, and other appeals over the conventional perpetration of crime in the physical world.
  • 18. CONTINUED Therefore, even in areas where cyberterrorism has not been experienced to the severity indicated in the headlines and some scholars, the threat is real and has great potency. For this reason, this research is conducted to assess the security measures that can be put in place at the individual level, organizational level, and national level to keep systems protected from outside intruders. The aim is to formulate a knowledge base that can be used to create awareness of cyberterrorism and possible measures to prevent or mitigate the effects of cybersecurity. RESEARCH QUESTION What is the potency of the cyberterrorism threat to the individual, organization, or nation, and ways to develop cybersecurity to curb them? Key Points Addressed The concept of cyberterrorism and why it is an issue in modern society. The various ways in which cyberterrorism is a threat to individuals, organizations, and countries. Policy formulation to counter cyberterrorism. PROPOSED METHODOLOGY/RESEARCH STRATEGY
  • 19. The proposed methodology for this study is a qualitative research strategy. Non-numerical data is collected, analyzed, and interpreted in this strategy. This research strategy is effective in the topic of cyberterrorism and cybersecurity because it will be based on the subjective perception of this topic, which I consider to be a social reality (Mcleod, 2019). There are aspects of interpretation and a naturalistic approach to the subject matter associated with the qualitative technique (Mcleod, 2019). This means that it is possible to investigate items within the natural setting, make sense of issues, interpret them, and derive the meanings of the phenomenon to the affected individuals (Mcleod, 2019). Therefore, I find the research strategy effective for this topic hence the preferred option to conduct this study. Qualitive research The qualitative research methodology is effective in circumstances where the intention is to gain an in-depth appreciation and understanding of a certain phenomenon or situation (Jaferian et al., 2011). In this case, the phenomenon of interest is cyberterrorism and cybersecurity. Since the research will focus on gaining more details, the qualitative study design becomes an effective methodology. Qualitative research is mainly an exploratory research technique, wherein in our current study, the focus will be on examining details of cyberterrorism. Qualitative research is considered an interpretive form of research because it provides a platform for discovering new ideas and revealing unforeseen occurrences (Yunos and Sulaman, 2017). Qualitative research involves the analysis of content from written or recorded material that can be the output of participant responses or observations and reviews of various literature. It is also a relevant technique for small -
  • 20. scale studies (Yunos and Sulaman, 2017). It is an applicable technique in collecting data through interviews, participant observation, and focus groups. Current research In this current research, the focus is on cyberterrorism and the attributes of cyberterrorism with the intention to generate useful suggestions for the improvement of cybersecurity. Therefore, the research will adopt the research framework comprising of interviews and meta-analysis. This framework will align with the research objective that intends to identify and construct the phenomenon’s attributes and develop a model that comprehensively outlines the phenomenon (Yunos and Sulaman, 2017). Therefore, a sample of individuals will be interviewed on cybersecurity, the interviews transcribed, and interpretations made from the responses that will furnish the research question with answers. It is the assumption in this research that there is up-to-date literature on the subject that will form a conceptual basis and also provide insights that can answer the research questions. The research study will also seek the opinion of individuals who are expected to have a piece of working knowledge on cyberterrorism. It is expected that these sources of information are credible and valid to provide the information being sought. Also, it is an assumption that the data can be obtained conveniently and with ease Findings / conclusion The concept of cyberterrorism is elusive. In terms of definition,
  • 21. they vary from politically motivated and violent acts or threats conducted through the internet to preparatory and supporting activities for terrorism acts done through or on the internet (Broeders et al., 2021). These activities range from recruitment, liaison, and financing of terrorist acts. While the concern of governments is usually on violent terrorist acts, it is evident that pure cyberterrorism is yet to be experienced in the world today (Broeders et al., 2021). Terrorism is of the nature of “low probability, high impact,” which calls for careful attention to even activities that can appear harmless (Ruggiero and Vos, 2013). This is particularly so in the wake of the 9/11 attacks and the subsequent position of war against terror. The digital domain has become a part of modern-day life. This digital life comes with cyber terrorism and threats of cyberterrorism that target individuals, organizations, and nations. Consequently, cyber counterterrorism has become an integral component of national security and law enforcement (White, 2016). For instance, the Federal Bureau of Investigation has a straightforward concept of cyberterrorism and has efforts intended to curb such activities Continued The digital domain has become a part of modern-day life. This digital life comes with cyber terrorism and threats of cyberterrorism that target individuals, organizations, and nations. Consequently, cyber counterterrorism has become an integral component of national security and law enforcement (White, 2016). For instance, the Federal Bureau of Investigation has a straightforward concept of cyberterrorism and has efforts intended to curb such activities Digital technologies bring about endless possibilities, but while this benefits many spheres of human life, it highlights the similarly endless potential threats. According to the National
  • 22. Research Council (2004), we are much more vulnerable than our capacity to survive. There have been past incidences of attacks on cyber financial systems, but the scope has remained undisclosed to preserve an image of integrity (National Research Council, 2004). There have been attacks on the military, and similarly, these attacks have not been fully disclosed for security reasons. It is, however, reported that over sixty percent of computers used by the United States military have been compromised due to cyber-attacks (National Research Council, 2004). It is known that the computer systems and networks used by the public and the same used by the national defense systems; hence they are vulnerable to the same kinds of attacks. Therefore, an intruder will conveniently seek to attack the military systems, which are more critical in achieving the intended objective. Conclusion cyberterrorism is a real threat in the world today owing to the evolution of digital technologies and human dependence on them. Digitalism is one of the most transformative factors in the modern world, and with its endless possibilities, there comes vulnerability related to its potential use for terrorist activities. There is a major challenge with understanding the concept hence difficulty in formulating appropriate policies to counter its effects. This paper considers that the concept needs to be analyzed in separation with political influences, economic influences, and media sensationalization. An accurate definition of cyberterrorism will lay a proper basis for formulating appropriate policies without infringing on the rights of the people. There is a fine line between cybersecurity measures and censoring, which could have implications for human rights. In this paper, an operational definition of cyberterrorism, its
  • 23. nature, and its effects is put forth as a basis to formulate cybersecurity measures to protect individuals, organizations, and countries.