Wednesday, October 9, 2019

Cyber Terrorism Research Paper Example | Topics and Well Written Essays - 2500 words

Cyber Terrorism - Research Paper Example Even though the benefits from a common global cyber system are many, the vulnerability of such a system cannot be overlooked. Due to the inclusion of millions of people, proper vigilance on their activities becomes impossible. Thus, the high probabilities of occurrence of cyber crimes exist. This vast database of information comprising of profiles and strategies of companies, details of financial deals between banks or even highly confidential facts about government organizations may at any time be exploited to serve the malicious motives of â€Å"cyber criminals and espionage agencies† (â€Å"Cyber Attack†) â€Å"Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks and the information stored therein, when done to intimidate or coerce a government or its people in furtherance of political or social objectives†. (Gordon and Ford, 4) An attack that causes harm to people or property and leads to mass fear can be considered as cyber terrorism. Examples of this may be attacks that result in water contamination, plane crash, physical injury or death, explosions or massive loss to property or infrastructure. However, attacks that lead to the disruption of trivial services or activities cannot be labeled as cyber terrorism. In the month of April of 2007, Estonia was paralyzed by a series of such attacks that completely rattled the economy. A host of important websites including the Banking sector, the Business sector and the Government sector were targeted by these cyber attack s. Ultimately, it resulted in the collapse of virtual linkages between most of the towns and cities of Estonia and the rest of the world. Immense monetary damages were incurred, the citizens had to face inconvenience and disturbances in conducting their day-to-day activities and some institutions had to be simply shut down. This incident represented the high level of vulnerability of the internet. (â€Å"Cyber Attack†) This is just one among the many incidences of cyber crimes that take place all around the world each day. The types of these crimes are as diverse as its causes and thus, produce a range of effects. Forms of Cyber Terrorism: In the 20th century, the internet has emerged as the favorite weapon of mass destruction as well as a convenient means of communication for terrorists. A research has found that the various terrorist groups and organizations make regular use of the internet and the information available on it to carry out attacks on the integrated software system and people, to communicate with the world and to plan and support the different acts of terrorism. The advantages that the global internet offers as a weapon of terrorism are manifold. Firstly, it can be accessed from any place, irrespective of the country, city or locality of a person. These days, the net can be accessed even through cellular phones. Secondly, the use of internet to carry out an attack produces quicker results, within the span of a few seconds. And, finally, the greatest advantage is that the attack cannot be traced back to the guilty as

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.