Cyberterrorism What Is Cyberterrorism Cyberterrorism Is Characterized Essay

PAGES
2
WORDS
692
Cite
Related Topics:

Cyberterrorism What is Cyberterrorism?

Cyberterrorism is characterized by the fusing of terrorism and technology; it has made it such that guarding against terrorism necessitates careful use of computers and technology, and constant awareness of one's software and security systems. According to Gordon and Ford (2002), cyberterrorism has greatly expanded the scope and procedures used for terrorism, and have made acts of terrorism more difficult to police. Because of the technological component, it is most often directed at the workplace, where computers are prevalent and important files (often involving vast sums of money) are housed and protected (Matchulat,, J.J., 2006). While terrorism has always resulted in tragic consequences, it was previously much easier to identify since it was characterized by more overt acts of violence. However, cyberterrorism makes it such that one could be a victim of a terrorist attack and not even be aware of the terrorist act.

As the chief information officer of a company, my plan to fight cyberterrorism would involve educating my employees, focusing both on cyberterrorism prevention and empirical exercises that will provide them...

...

Therefore, I would ensure that everyone's passwords are safe and unique, and would require them to change passwords regularly. Employees would be required to save all documents in multiple locations, and have back-up files for everything. Cyberterrorist attacks often involve financial theft, so all workers would be required to know how much money the company has at all times. If an employee notices that the account totals are incorrect, they would be required to notify everyone. Lastly, I would stage unannounced mock attacks, since people often react differently when placed under more threatening conditions (Gori, 2011). This plan would effectively fight cyberterrorism since it targets increased communication, while the mock attacks provide workers with valuable real-world experience.
Cyberterrorism Moves to Commercial Enterprise

Knapp and Boulton provide clear explanations for their 12 trends, identifying how terrorism has moved beyond the military realm and into the commercial landscape (Knapp, Boulton, 2006). However, I believe that there are actually fewer than 12 trends because…

Sources Used in Documents:

Works Cited

Awan, A., & Blakemore, B. (2012). Policing Cyber Hate, Cyber Threats, and Cyber Terrorism. Surrey: Ashgate Publishing Company.

Ford, R., & Gordon, S. (2002). Cyberterrorism? Computers and Society, 21(7), 636-647.

Gori, U. (2011). Modelling cyber security: Approaches, methodology, security. International Journal of Information Technology and Security, 1(1).

Johnson, T.A. (2006). Forensic Computer Crime Investigation. Boca Raton: Taylor and Francis Group.


Cite this Document:

"Cyberterrorism What Is Cyberterrorism Cyberterrorism Is Characterized" (2012, August 30) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/cyberterrorism-what-is-cyberterrorism-cyberterrorism-81831

"Cyberterrorism What Is Cyberterrorism Cyberterrorism Is Characterized" 30 August 2012. Web.26 April. 2024. <
https://www.paperdue.com/essay/cyberterrorism-what-is-cyberterrorism-cyberterrorism-81831>

"Cyberterrorism What Is Cyberterrorism Cyberterrorism Is Characterized", 30 August 2012, Accessed.26 April. 2024,
https://www.paperdue.com/essay/cyberterrorism-what-is-cyberterrorism-cyberterrorism-81831

Related Documents

Cyber Terrorism What is cyber-crime? Cybercrime denotes an illegal action committed primarily by deploying technology (or, to be more precise, a computer and internet). America's justice department expands this definition to cover all illegal actions employing computers to store evidence of crime (Tech Target, 2016). What is cyber space? Cyberspace represents a domain characterized by application of electromagnetic spectrum and electronics for storing, altering, and communicating information through networked structures and related physical infrastructures.

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the

S. law. Legislation such as many elements of the U.S.A. PATRIOT ACT are problematic because they do not provide adequate controls to ensure that investigative methods and procedures appropriate under some circumstances cannot be used in circumstances where they are inappropriate under U.S. law. 4. What is the FISA Court? Explain how it works. What authorities can it grant law enforcement? How is it different from traditional courts? What concerns exist

Media Theory Essay
PAGES WORDS 1325

Introduction Cyberterrorism, illegal (and legal) espionage, piracy, and cybercrimes differ from their pre-digital counterparts in serious and meaningful ways. For one, the nature of online social interactions diverges from that of face-to-face or even voice-only interactions due to the shields of anonymity. Second, technological prophylactics ranging from encryption to skillful network architecture can add multiple levels of protection to shield perpetrators while exposing the weaknesses in a less advanced consumer public.

In the first instance an attack of this nature usually serves a symbolic purpose from the terrorist's point-of-view in that he or she is seen to be attacking the bastion of global Western commerce. Secondly, many business concerns are more vulnerable to attack as they are usually not as heavily secured as military or energy installations. There is also the factor that American financial institutions are invariably identified with