Verified Document

Cybercrime And Cyberterrorism How Should We Respond Term Paper

¶ … cybercrime and cyberterrorism? How should we respond to these if we detect them? Although 'cybercrime' and 'cyberterrorism' have had flexible definitions in common legal and corporate parlance, perhaps the best way to define these 'cyber' criminal and security issues are to focus on the fact that 'cyber' refers to anything taking place in the world of cyber, or virtual rather than physical space. Cybercrime is thus using a computer and cyberspace specifically as a tool to commit a crime, a crime that could not otherwise be committed without a computer. For instance, merely stealing a computer is not a cybercrime, for the stealing of tangible goods is something that has always existed. Nor is using a computer to type up and print out false receipts with a word-processing program, as if that computer was a typewriter. However, hacking into an online system to access credit card numbers and other criminally useful data like social security numbers would not be possible without the existence of computer technology and the existence of the Internet. ("Cybercrime: The Internet as Crime Scene," 2004)

Likewise, cyberterrorism...

Cyberterrorism might be defined as using the computer as a weapon of mass destruction for an act of terror that could not take place without a computer or cyberspace. This might encompass, for instance, shutting down the operating system of an entire corporation or country, so that power systems ground to a halt, and routine medical and business operations become impossible. "Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, who in 1997 was attributed for creation of the term...defined cyber-terrorism as the convergence of cybernetics and terrorism. Mark Pollitt, a special agent for the FBI, defined cyberterrorism as a "premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents." (Krasavin,…

Sources used in this document:
Works Cited

Cybercrime: The Internet as Crime Scene." (2004) Retrieved on June 26, 2004 at http://faculty.ncwc.edu/toconnor/315/315lect12.htm

Newman, Robert C. (2003). Enterprise Security. Upper Saddle River, New Jersey: Prentice Hall.

Krasavin, Serge. (2004) "What is Cyberterrorism?" Computer Crime Research Center. (CCRC). Retrieved on June 26, 2004 at http://crime-research.org/library/Cyber-terrorism.htm
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now