Research Report on Cyber Terrorism
Added on 2020-04-07
13 Pages2892 Words200 Views
Running head: CYBER TERRORISMCyber TerrorismName of the StudentName of the UniversityAuthor’s note
1CYBER TERRORISMTable of ContentsIntroduction..........................................................................................................................2Discussion............................................................................................................................2Cyber Terrorism...............................................................................................................2Characteristics of Cyber Terrorism.................................................................................4Challenges and Problems.................................................................................................4Relevant Technologies and its Applications in Cyber Terrorism....................................5Issues Discussed..............................................................................................................7Important Issues that are not addressed and its Impact...................................................7Important Lessons............................................................................................................8Conclusion...........................................................................................................................9References..........................................................................................................................10
2CYBER TERRORISMIntroductionIn this era of technology, cyber crimes are increasing at a high rate. Information andcommunication technology has been profitable for the society but at the same time it imposeshigh threat to the society (Alsaadi & Tubaishat, 2015). Cyber crimes have different forms andtypes. The general meaning of terrorism is a threat that aims to create a sense of fear in thesociety. There is no clear understanding of this issue. Cyber terrorism tends to create severethreat for the security of information system (Ahmad & Yunos, 2012). Cyber terrorismcomprises of the concept of terrorism as well as cyberspace. This is an unlawful act that attackscomputer systems as well as networks.This research report gives a brief overview of what cyber terrorism is. It discusses aboutthe challenges and problems that are encountered by the society due to this cyber attack. It alsotalks about the technologies that are relevant in this context as well as the application of thesetechnologies. This report also points out the issues that are not given much importance. It alsogives a brief explanation about the importance of these issues. . At the end this report gave aproper explanation about the lessons learnt.DiscussionCyber TerrorismThis type of terrorist act is done over the Internet. Terrorist activities take place becauseof some kind of political or national influence (Ahmad, Yunos & Sahib, 2012). There is no clearunderstanding behind the motive of terrorism. The cyber terrorists use the cyber space to getaccess to information and misuse the information for their own benefits. The result of the cyber
3CYBER TERRORISMterrorism can create the fear of traditional terrorist attacks. Some computer attacks can even leadto the death of people and infrastructural damage. The cyber terrorists tend to destroy the systemand attack the interest of the civilians as well as the public sector people. The target of thisterrorist attack is to have an impact on the political structure. These types of attacks are plannedfrom before. There is convergence in the logic of terrorism as well as the cyberspace.Technology is responsible for making a connection between the physical and virtual world.Technology has weaknesses and these weaknesses can be exploited by the attackers to takeadvantage of the system and harm the nation. Jihadists, insurgents and terrorist organizationshave made use of the Internet in order to plan attacks and spread wrong messages among thesociety. They had disruptive purpose. There are vulnerabilities that exist in the system that canbe exploited by the cyber terrorists. The act of computer fraud also falls under the category of cyber terrorism. They createaccess the information system in an unauthorized manner to gain access to sensitive data so thatthey can utilize the data for harming the social, religious, ideological, political as well as similarobjectives. Denial of service attack cannot generate much fear in the nation but it has highpotential for generating second and high order effects. Consider a situation where emergency andtelecommunication services are stopped during a period of crisis, the impact of this can becatastrophic in nature. Cyberspace can be defined as the global domain that exists within theenvironment of information technology. Important information can be shared over the internet.This is a dangerous space and has vulnerabilities. Cyber terrorists focus on giving up the oldtechniques of attacking by weapons and make the use of the technology. The cyber terrorism canattack several targets like computer system, government information system, data banks and oilrefineries.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Overview about Cyber Terrorism | Reportlg...
|12
|2450
|129
ITC544 : Computer Organisation and Architecturelg...
|11
|2648
|235
Cyber terrorism and Cyber warfarelg...
|15
|4802
|116
Cyber Terrorism and Its Effects on Societylg...
|9
|1736
|382
Cyber terrorism Assignment 2022lg...
|2
|570
|28
Combatting Cyber Terrorismlg...
|14
|2989
|52