“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Â
Cyber Terrorism Essay
1. Cons Of Cyber Terrorism
Cyber terrorism is just as its name implies; it is the utilization of the internet for the purpose of
causing terror. Today's cyberterrorist have several methods available for achieving their goals.
The first of these is a general term known as "Hacking" which refers to anyone gaining access to a
computer or a network of computers to which they are not allowed. There are various forms by
which a hacker can gain this access. Hacking is comprised of five key methods utilized for the
purpose of gaining that access to a computer or computers whichever may be the case. A terrorist
could use hacking methods such as packet sniffing, Tempest, password cracking, or buffer overruns
to gain access to unauthorized computers for the purpose of stealing credit card or other financial
information. They can also use these tools for the purpose of gaining control of a specific computer
or network...show more content...
However, it is hard to imagine anything more damaging than computer viruses or more difficult to
prevent. The different forms of viruses are very effective in disrupting computer services, exposing
sensitive information, or making critical computer systems unavailable because of bombardment by
DoS attacks. The most damaging aspect of computer viruses comes in the human contact which
often creates the greatest threat to a computer or computer network. Their spread through email can
be facilitated by the person who carelessly opens an email from an unknown source because it has a
catchy subject line. Then there is the person who defies policy and brings in a flash drive from home
and unknowingly infects an entire organization's network of computers. The weakest link in
computer security is the human aspect, and it is also the hardest to defend against (Schmallenger &
Pittaro,
Get more content on HelpWriting.net
2. Cyber Terrorism
In 1999, Chinese hackers targeted United States government sites, after an accidental bombing of a
Chinese embassy in Belgrade. During this attack, government sites were hijacked and some sites
suffered a denial of service attack. Most recently, it was suspected that Bank of America was the
victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that
claim. Cyber terror attacks pose a threat against the national security of the United States. In order to
fully comprehend the threat that cyber terrorism poses, it is essential to understand the background,
the effects, the reality of the threat and the future of cyber terrorism. This assessment examines the
reality of the cyber terrorism threat, and...show more content...
Likewise, terrorists will strive to improve their cyber terror attack capabilities by keeping pace with
the emerging technologies and overcoming countermeasures.
Many computer security experts question the possibility that the Internet could be used to inflict
death on a large scale. Some precautions have been made. Systems have been established in the last
five years, which aim at preventing a possible cyber terrorism attack. "Air gapping" has been
established on all nuclear weapons, meaning the weapons are not connected to the Internet or any
open computer network and cannot be accessed by intruders or terrorists. Still, other areas of
concern include subways, gas lines, power grids and communication systems; which are owned
primarily by the private sector and are managed by Internet enabled computer systems.
Reality of a Cyber Terror Attack
Malicious cyber activity is occurring more frequently and with unexpected complexity. In
mid–December of 2009, Google experienced a highly sophisticated and targeted attack which
originated in China on its search engine infrastructure and e–mail, as well as on at least 20 other
companies.
Attacks are occurring within the United States, as well. Attacks on government networks are
omnipresent. In 2008, NASA and other departments of Defense, Homeland Security and Commerce
suffered major intrusions by "unknown foreign entities" which
Get more content on HelpWriting.net
3. Essay on Cyber Terrorism
Cyber Terrorism
Thus far we have scratched the surface of the ever–perplexing problem of terrorism. As it has
evolved those in the position of countering it have also gained some valuable experience. Even with
this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In
the recent past there has been an extra element added to this confusing and dangerous equation, the
Internet and other computer capabilities. Cyber–terrorism is a realistic possibility but is it as
detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the
implications of a cyber attack could be just as harmful.
Traditionally terrorist acts target a specific locale and are executed...show more content...
On the contrary, the only tools needed for cyber–terror are the proper knowledge and a powerful
computer.
One of the key elements of terrorism is the creation of mass fear. This takes little effort with the
use of computers. So many people are already intimidated by the efficacies of computers that the
simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As
soon as the word is out that a virus has been detected people take all possible actions to ensure that
their files and data are protected. Taking this action to a higher level, if someone were to put a virus
through a bank mainframe or something even bigger than that, then the general public would be
afraid to make transactions over the computer and would return to doing business in person. The
concern related to cyber–terrorism is warranted although we have been lucky thus far not to have
experienced firsthand anything devastating.
In summary, cyber–terrorism opens opportunities for terrorists by expanding the arena and through
the mass dependency on computers. So what leads me to believe that a cyber– terrorist attack could
be just as harmful as conventional terrorism? There are a few reasons which lead me to this
conclusion.
First of all, other forms of terrorism have been seen often enough to determine to some extent what
to expect. Granted there are no guaranteed results of a conventional attack there are
Get more content on HelpWriting.net
4. Essay about CyberCrime and Terrorism
Throughout the years, there has been a steady increase in the amount of cyber crime committed.
Technology is a constantly changing entity, constantly evolving, always progressing. Naturally this
can make it hard to stay on top of things. In turn, law enforcement runs into various issues regarding
cyber crime and cyber terrorism. Cyber crime and terrorism is so complex of a crime that it can be
hard to break down the barriers that can lead to justifying the action. Major issues that are
prominent in cyber crime and terrorism are that laws vary greatly from country to country. There is
also a major lack of knowledge and equipment in many departments as well as training. On top of
these major issues, there are also issues with reporting these...show more content...
The fact that cyber crime can be committed from half way across the world is a huge burden on
those whose job it is to apprehend the criminals. The main problem that springs up, is the sheer
fact that not every country has the same laws. One country may not have the same definition of
cyber crime as the United States, or even recognize the act as a criminal offense. This can cause
major issues when the countries laws differ, or even if the criminal is inside an unfriendly territory.
This makes the process of apprehending a criminal extremely difficult and time consuming.
Countries may often refuse to extradite criminals when this occurs; causing a standstill in the
apprehension progress, and once this occurs, the solution must be purely diplomatic, and can be a
long process. In addition to the major issue of distance, there is also an issue that is much more of
an internal problem. Since much of this technology is relatively new in the scheme of things, many
of the law enforcement departments have a major lack of knowledge, equipment and training to deal
with cyber crime and cyber terrorism. This causes a major flaw in the defense of government entities
because so few are trained to actually understand the interworking of cyberspace and how to properly
protect information, but just know basics about how to utilize computer equipment. We
Get more content on HelpWriting.net
5. Terrorist Cyber Attacks
Terrorist cyber–attacks on national institutions will result in greater devastation than a cyber–crime
directed against an individual. At the current rate in which technology is increasing, establishments
must constantly upgrade their system's security. If the national institutions fail to be vigilant to the
present day cyber threats, they will become victims of terrorist cyber–attacks. "Our nation's
government, military, scientific, commercial and entertainment sectors all operate on the same
networks as our adversaries" (Alexander 18). A terrorist cyber–attack that is successful, has the
potential to put people at risk, by allowing sensitive information to get into the wrong hands,
disrupting resources, or by altering system information in corporations, to cause harm or confusion.
Since a terroristic attack is focused on causing violence or chaos, the targets at risk would be "energy
sources and electric grids, water and sewer systems, manufacturing, banks, transportation and
communication networks" (Brenner 15). The source of a terrorist cyber–attack can be from a
foreign government or criminal entities, as well as a disgruntle employee. An example of a
disgruntle employee who...show more content...
The United States remains in the forefront of cyber security. In my opinion, the government is
capable of dealing with terroristic cyber–attacks and is aware of the current technological
advancements, which could compromise their defense. The Secretary of defense, in 2009, created
the U.S. Cyber Command department to assist in the defense of our nation (Alexander 21). A strong
cyber defense provides the essential assurance for the government and private sector to operate
securely. The United States government is actively countering these cyber–attacks, since very few
have been
Get more content on HelpWriting.net
6. Cyberterrorism
Cyberterrorism is the utilization of PC system instruments to hurt or close down basic national bases,
e.g. transportation and government operations. The reason of cyberterrorism is that as countries and
basic base turned out to be more subject to PC systems for their operation, new vulnerabilities are
made. Cyberterrorism is an alluring alternative for cutting edge terrorists, who esteem its secrecy, its
capability to exact gigantic harm, its mental effect, and its media offer. The risk postured by
cyberterrorism has gotten the consideration of the broad communications, the security group, and the
data innovation (IT) industry. Columnists, lawmakers, and specialists in an assortment of fields have
promoted a situation in which complex digital terrorists electronically break into PCs that control
dams or aviation authority frameworks, wreaking devastation and jeopardizing a large number of
lives as well as national security itself. But, in spite of all the bleak forecasts of a digital produced
doomsday, no single occurrence of genuine cyberterrorism has been recorded (Verton 129).
Since most basic base in Western social orders is arranged through PCs, the potential risk from
cyberterrorism is, no doubt, extremely disturbing. Programmers, despite...show more content...
Further, to qualify as cyberterrorism, an assault ought to bring about brutality against persons or
property, or if nothing else cause enough mischief to create dread. Assaults that prompt demise or
substantial harm, blasts, or serious monetary misfortune would be cases. Genuine assaults against
basic foundations could be demonstrations of cyberterrorism, contingent upon their effect. Assaults
that upset unimportant administrations or that are chiefly an expensive aggravation would not
(Janczewski
Get more content on HelpWriting.net
7. Cyberterrorism Essays
Cyberterrorism
Introduction
Cyberterrorism is the convergence of terrorism and cyberspace. It is generally
understood to mean unlawful attacks and threats of attack against computers,
networks, and the information stored therein. Possibly to intimidate, influence a
government or its people to further political or social gain. To qualify as
cyberterrorism, an attack should result in violence against persons or property, or
generate fear. Attacks that lead to death or bodily injury, explosions, plane
crashes, water contamination, or severe economic loss would be examples, serious
attacks against important infrastructures could be acts of cyberterrorism,
depending on their impact. This essay will...show more content...
Individual protection
Currently there are no foolproof ways to protect a system. The completely secure system can never
be accessed by anyone. Most government and militarie classified information is kept on machines
with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation, the
most common method of protection is encryption. The wide spread use of encryption is inhibited by
the governments ban on its exportation, so intercontinental communication is left relatively insecure.
The
American president administration team and the FBI oppose the export of encryption in favour of
a system where by the government can gain the key to an encrypted system after gaining a court
order to do so. Encryption's draw back is that it does not protect the entire system, an attack
designed to cripple the whole system, such as a virus, is unaffected by encryption. Others promote
the use of firewalls to screen all communications to a system, including e–mail messages, which may
carry logic bombs or email bombs. Firewall is a relatively generic term for methods of filtering
access to a network. They may come in the form of a computer, router other communications device
or in the form of a network configuration. Firewalls serve to define the services and access that are
permitted to each user. One method is to screen
user
9. Cyber-Terrorism Essay
Cyber–Terrorism Cyber–Terrorism is a reality in the modern age of rapid technological
advancement. As fast as new technology is established, people find ways to hack and corrupt it.
Many times there is malicious intent behind such actions. These acts can include everything from
computer viruses to contraband network servers to pirated IP addresses and credit account fraud.
All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us
into complacency when none of them come to fruition. In all honesty if you have a top–level
virus–scanning program such as Norton, or McAfee your machine will be safe from most of the
little viruses that you will come across. There is a propensity to copy...show more content...
Such a virus could go undetected for hours, days or months as it worked its way throughout a
particular system and then strike at a pre–selected time. For the entire computer operated portions of
American society this is a threat, this extends from mass transit to police and bank records and
correctional facilities. Massive destruction both physical and theoretic could easily occur and quite
frankly September 11th could be seen as precursor to the uniform and grave situation systematic
mainframe crashes would cause. This would be a case of international espionage and would be a
drastic move from the normal programs the tech security groups deal with on a daily basis. This
type of attack could slide under existing defense and not be identified until it was too late thus
rendering the attempts to defend helpless. A comparison would be the 9/11 attacks and how they
were almost indefensible because of the suicide bomber mentality of the attackers. Similarly, the new
age Cyber–Terrorists would not want the viruses to be detected and have no desire to impress
their peers as is the case with their traditional counterparts. Since this is a new type of cyber
warfare, there is no consensus on how to deal with theses issues. In a story reported by PC Mag,
the FBI has contacted many of the individuals who they have identified as suspected hackers across
America as well as a handful of those
Get more content on HelpWriting.net