Essay Undergraduate 692 words Human Written

Cyberterrorism What Is Cyberterrorism? Cyberterrorism Is Characterized

Last reviewed: ~4 min read Crimes › Cyber Security
80% visible
Read full paper →
Paper Overview

Cyberterrorism What is Cyberterrorism? Cyberterrorism is characterized by the fusing of terrorism and technology; it has made it such that guarding against terrorism necessitates careful use of computers and technology, and constant awareness of one's software and security systems. According to Gordon and Ford (2002), cyberterrorism has greatly expanded...

Full Paper Example 692 words · 80% shown · Sign up to read all

Cyberterrorism What is Cyberterrorism? Cyberterrorism is characterized by the fusing of terrorism and technology; it has made it such that guarding against terrorism necessitates careful use of computers and technology, and constant awareness of one's software and security systems. According to Gordon and Ford (2002), cyberterrorism has greatly expanded the scope and procedures used for terrorism, and have made acts of terrorism more difficult to police.

Because of the technological component, it is most often directed at the workplace, where computers are prevalent and important files (often involving vast sums of money) are housed and protected (Matchulat,, J.J., 2006). While terrorism has always resulted in tragic consequences, it was previously much easier to identify since it was characterized by more overt acts of violence. However, cyberterrorism makes it such that one could be a victim of a terrorist attack and not even be aware of the terrorist act.

As the chief information officer of a company, my plan to fight cyberterrorism would involve educating my employees, focusing both on cyberterrorism prevention and empirical exercises that will provide them with the experience necessary to combat a terrorist attack should when arise. Therefore, I would ensure that everyone's passwords are safe and unique, and would require them to change passwords regularly. Employees would be required to save all documents in multiple locations, and have back-up files for everything.

Cyberterrorist attacks often involve financial theft, so all workers would be required to know how much money the company has at all times. If an employee notices that the account totals are incorrect, they would be required to notify everyone. Lastly, I would stage unannounced mock attacks, since people often react differently when placed under more threatening conditions (Gori, 2011). This plan would effectively fight cyberterrorism since it targets increased communication, while the mock attacks provide workers with valuable real-world experience.

Cyberterrorism Moves to Commercial Enterprise Knapp and Boulton provide clear explanations for their 12 trends, identifying how terrorism has moved beyond the military realm and into the commercial landscape (Knapp, Boulton, 2006). However, I believe that there are actually fewer than 12 trends because the authors do not sufficiently connect many of them. For example, trends one and two, "Computer-related security incidents" and "Entry barriers for cyber-attackers," are too closely related to constitute separate trends.

Moreover, each informs the other, since the security incidents delineated in trend number one often result from the fact that there are too many points of entry for cyberterrorists. Therefore, it would be more appropriate to categorize trend two as a subset of trend one. Similarly, while trends seven through ten usefully describe the various areas in which cyberterrorism occurs, it would be more useful to group them together.

This would allow the authors to focus instead on the similar underlying structures that cause cyberterrorism to take place in these venues. In choosing how to help my organization guard against cyberterrorist attacks I would ensure that all information systems are coordinated, since lack of coordination is one of the main areas in which government agencies have been susceptible to cyberterrorism in recent years (Johnson, 2005).

Everyone must be aware of all of the people who have access to the information systems; if someone is spotted who does not have access, they must be reported immediately. I would also build "cyber security.

139 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
7 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Cyberterrorism What Is Cyberterrorism Cyberterrorism Is Characterized" (2012, August 30) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/cyberterrorism-what-is-cyberterrorism-cyberterrorism-81831

Always verify citation format against your institution's current style guide.

80% of this paper shown 139 words remaining