logo

Research Report on Cyber Terrorism

   

Added on  2020-04-07

13 Pages2892 Words200 Views
Running head: CYBER TERRORISMCyber TerrorismName of the StudentName of the UniversityAuthor’s note

1CYBER TERRORISMTable of ContentsIntroduction..........................................................................................................................2Discussion............................................................................................................................2Cyber Terrorism...............................................................................................................2Characteristics of Cyber Terrorism.................................................................................4Challenges and Problems.................................................................................................4Relevant Technologies and its Applications in Cyber Terrorism....................................5Issues Discussed..............................................................................................................7Important Issues that are not addressed and its Impact...................................................7Important Lessons............................................................................................................8Conclusion...........................................................................................................................9References..........................................................................................................................10

2CYBER TERRORISMIntroductionIn this era of technology, cyber crimes are increasing at a high rate. Information andcommunication technology has been profitable for the society but at the same time it imposeshigh threat to the society (Alsaadi & Tubaishat, 2015). Cyber crimes have different forms andtypes. The general meaning of terrorism is a threat that aims to create a sense of fear in thesociety. There is no clear understanding of this issue. Cyber terrorism tends to create severethreat for the security of information system (Ahmad & Yunos, 2012). Cyber terrorismcomprises of the concept of terrorism as well as cyberspace. This is an unlawful act that attackscomputer systems as well as networks.This research report gives a brief overview of what cyber terrorism is. It discusses aboutthe challenges and problems that are encountered by the society due to this cyber attack. It alsotalks about the technologies that are relevant in this context as well as the application of thesetechnologies. This report also points out the issues that are not given much importance. It alsogives a brief explanation about the importance of these issues. . At the end this report gave aproper explanation about the lessons learnt.DiscussionCyber TerrorismThis type of terrorist act is done over the Internet. Terrorist activities take place becauseof some kind of political or national influence (Ahmad, Yunos & Sahib, 2012). There is no clearunderstanding behind the motive of terrorism. The cyber terrorists use the cyber space to getaccess to information and misuse the information for their own benefits. The result of the cyber

3CYBER TERRORISMterrorism can create the fear of traditional terrorist attacks. Some computer attacks can even leadto the death of people and infrastructural damage. The cyber terrorists tend to destroy the systemand attack the interest of the civilians as well as the public sector people. The target of thisterrorist attack is to have an impact on the political structure. These types of attacks are plannedfrom before. There is convergence in the logic of terrorism as well as the cyberspace.Technology is responsible for making a connection between the physical and virtual world.Technology has weaknesses and these weaknesses can be exploited by the attackers to takeadvantage of the system and harm the nation. Jihadists, insurgents and terrorist organizationshave made use of the Internet in order to plan attacks and spread wrong messages among thesociety. They had disruptive purpose. There are vulnerabilities that exist in the system that canbe exploited by the cyber terrorists. The act of computer fraud also falls under the category of cyber terrorism. They createaccess the information system in an unauthorized manner to gain access to sensitive data so thatthey can utilize the data for harming the social, religious, ideological, political as well as similarobjectives. Denial of service attack cannot generate much fear in the nation but it has highpotential for generating second and high order effects. Consider a situation where emergency andtelecommunication services are stopped during a period of crisis, the impact of this can becatastrophic in nature. Cyberspace can be defined as the global domain that exists within theenvironment of information technology. Important information can be shared over the internet.This is a dangerous space and has vulnerabilities. Cyber terrorists focus on giving up the oldtechniques of attacking by weapons and make the use of the technology. The cyber terrorism canattack several targets like computer system, government information system, data banks and oilrefineries.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview about Cyber Terrorism | Report
|12
|2450
|129

ITC544 : Computer Organisation and Architecture
|11
|2648
|235

Cyber terrorism and Cyber warfare
|15
|4802
|116

Cyber Terrorism and Its Effects on Society
|9
|1736
|382

Cyber terrorism Assignment 2022
|2
|570
|28

Combatting Cyber Terrorism
|14
|2989
|52