Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across the world Verton, 2003.
Therefore as a threat, cyber terrorism involves terrorists using information technology in order to further their evil causes. The present technological world offers terrorists the opportunity to use information technology to make electronic threats through hackings, introduction of viruses defacing websites and Denial-of-service attacks.
Evolution of cyber terrorism
The evolution of cyber terrorism has basically grown in tandem with the developments realized in information technology. The initial threats began in the 1980s and continue as terrorists gained much knowledge in the field. However, many developments in cyber terrorism were realized in the last decade as the fight against the vice led to many...
Cyber terrorism works on the premise that the present society is becoming more depended on information technology networks and therefore an attack on such networks can cripple human activities. Therefore the terrorists use complex processes to interfere with the workings of information infrastructures with ideological or political intentions. The present cyber-terrorism threat is mostly geared towards the United States which has a very technologically advanced society Elmusharaf, 2012.
The primary attack process involves bringing down the internet in order to cripple the flow of information across the world.
Forms of cyber terrorism
Normally cyber terrorism can take several forms which basically involve the use of information technology. It can be in the form of data theft which involves getting very secret and valuable government information and using such information for malicious purposes. Another form of cyber terrorism presently employed involves the demolition of e-government bases which subsequently cripples critical sectors of the government. Cyber terrorists may also use Distributed denial of services attacks…
Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the
Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the
Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating
Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack
Terrorist Group's Use Of Cloud Technology After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of
FIGHT AGAINST TERRORISM A similar crime was witnessed on September 11, 2001. The United States of America saw the sad death of thousands of innocent people just because some people wanted to acquire their goals. This followed an economic crisis and many innocent civilians faced unnecessary loss of jobs. The political environment has ever since been changing constantly and the United States went into war against Afghanistan. After Afghanistan there was