Cyber Terrorism Is The Process Of Using Essay

PAGES
2
WORDS
678
Cite

Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across the world Verton, 2003. Therefore as a threat, cyber terrorism involves terrorists using information technology in order to further their evil causes. The present technological world offers terrorists the opportunity to use information technology to make electronic threats through hackings, introduction of viruses defacing websites and Denial-of-service attacks.

Evolution of cyber terrorism

The evolution of cyber terrorism has basically grown in tandem with the developments realized in information technology. The initial threats began in the 1980s and continue as terrorists gained much knowledge in the field. However, many developments in cyber terrorism were realized in the last decade as the fight against the vice led to many...

...

Cyber terrorism works on the premise that the present society is becoming more depended on information technology networks and therefore an attack on such networks can cripple human activities. Therefore the terrorists use complex processes to interfere with the workings of information infrastructures with ideological or political intentions. The present cyber-terrorism threat is mostly geared towards the United States which has a very technologically advanced society Elmusharaf, 2012.
The primary attack process involves bringing down the internet in order to cripple the flow of information across the world.

Forms of cyber terrorism

Normally cyber terrorism can take several forms which basically involve the use of information technology. It can be in the form of data theft which involves getting very secret and valuable government information and using such information for malicious purposes. Another form of cyber terrorism presently employed involves the demolition of e-government bases which subsequently cripples critical sectors of the government. Cyber terrorists may also use Distributed denial of services attacks…

Sources Used in Documents:

References

Alexander, Y., & Swetnam, M.S. (2001). Cyber terrorism and information warfare: threats and responses. Ardsley, NY: Transnational.

Elmusharaf, M.M. n. d. (2012). Cyber Terrorism: The new kind of Terrorism. Computer Crime Research Center - Daily news about computer crime, internet fraud and cyber terrorism. Retrieved May 29, 2012, from http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism

Taylor, R.W. (2006). Digital crime and digital terrorism. Upper Saddle River, N.J: Pearson/Prentice Hall.

Verton, D. (2003). Black Ice: the Invisible Threat of Cyber-Terrorism. New York: McGraw-Hill.


Cite this Document:

"Cyber Terrorism Is The Process Of Using" (2012, May 29) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/cyber-terrorism-is-the-process-of-using-80302

"Cyber Terrorism Is The Process Of Using" 29 May 2012. Web.24 April. 2024. <
https://www.paperdue.com/essay/cyber-terrorism-is-the-process-of-using-80302>

"Cyber Terrorism Is The Process Of Using", 29 May 2012, Accessed.24 April. 2024,
https://www.paperdue.com/essay/cyber-terrorism-is-the-process-of-using-80302

Related Documents
Cyber Terrorism
PAGES 13 WORDS 4455

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Terrorist Group's Use Of Cloud Technology After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of

FIGHT AGAINST TERRORISM A similar crime was witnessed on September 11, 2001. The United States of America saw the sad death of thousands of innocent people just because some people wanted to acquire their goals. This followed an economic crisis and many innocent civilians faced unnecessary loss of jobs. The political environment has ever since been changing constantly and the United States went into war against Afghanistan. After Afghanistan there was

goals of this study are to reveal some of the common and prevailing cyber security threats. Here we plan to explore the risk that is most difficult to defend: social engineering. We seek answers to the human elements and characteristics that contribute to the frauds and how they themselves unwittingly give out information that eventually leads to difficult situations. There are many ways in which the attackers 'phish' their