Verified Document

Cyber Terrorism Is The Process Of Using Essay

Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across the world Verton, 2003. Therefore as a threat, cyber terrorism involves terrorists using information technology in order to further their evil causes. The present technological world offers terrorists the opportunity to use information technology to make electronic threats through hackings, introduction of viruses defacing websites and Denial-of-service attacks.

Evolution of cyber terrorism

The evolution of cyber terrorism has basically grown in tandem with the developments realized in information technology. The initial threats began in the 1980s and continue as terrorists gained much knowledge in the field. However, many developments in cyber terrorism were realized in the last decade as the fight against the vice led to many...

Parts of this document are hidden

View Full Document
svg-one

Cyber terrorism works on the premise that the present society is becoming more depended on information technology networks and therefore an attack on such networks can cripple human activities. Therefore the terrorists use complex processes to interfere with the workings of information infrastructures with ideological or political intentions. The present cyber-terrorism threat is mostly geared towards the United States which has a very technologically advanced society Elmusharaf, 2012.
The primary attack process involves bringing down the internet in order to cripple the flow of information across the world.

Forms of cyber terrorism

Normally cyber terrorism can take several forms which basically involve the use of information technology. It can be in the form of data theft which involves getting very secret and valuable government information and using such information for malicious purposes. Another form of cyber terrorism presently employed involves the demolition of e-government bases which subsequently cripples critical sectors of the government. Cyber terrorists may also use Distributed denial of services attacks…

Sources used in this document:
References

Alexander, Y., & Swetnam, M.S. (2001). Cyber terrorism and information warfare: threats and responses. Ardsley, NY: Transnational.

Elmusharaf, M.M. n. d. (2012). Cyber Terrorism: The new kind of Terrorism. Computer Crime Research Center - Daily news about computer crime, internet fraud and cyber terrorism. Retrieved May 29, 2012, from http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism

Taylor, R.W. (2006). Digital crime and digital terrorism. Upper Saddle River, N.J: Pearson/Prentice Hall.

Verton, D. (2003). Black Ice: the Invisible Threat of Cyber-Terrorism. New York: McGraw-Hill.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now