logo

Cyber Terrorism Assignment

   

Added on  2020-04-07

11 Pages2353 Words135 Views
CYBER TERRORISM 1Running Head: CYBERTERRORISMCyber terrorismNameUniversity
Cyber Terrorism Assignment_1
CYBER TERRORISM 2CONTENTSIntroduction .......................................................................................3Problems...........................................................................................3Challenges.........................................................................................4Applications and technologies..........................................................4Research question and vague areas..................................................6Importance in real life.....................................................................6Advantages and disadvantages........................................................7Conclusion......................................................................................8References
Cyber Terrorism Assignment_2
CYBER TERRORISM 3Cyber TerrorismIntroductionToday with the ubiquity of internet in every sector of social andpolitical life, cyber terrorism is becoming rampant not mentioning itscomplexity and severity. It is basically an illegal act of extracting ordestroying data and information from an individual or an organization’scomputer. This act is executed either by a gang of people or individualswho are considered as computer genius. Cyberattacks have become evenmore common since any kind of defence mechanisms against suchattacks is far from fool proof and the attackers take very advantage ofevery loophole that exists in cyber law. Another encouraging factor forthese criminals is that Internet governance is subjected to various socialand economic constraints as well as it lacks the opportunities forassessing different regulatory tools (Shackelford, 2014). Problems In the modern days, people are eventually depending more andmore on the Internet for the sake of surfing and browsing in order tocollect information and make business out of it. This has resulted in theexpansion of cyberspace and security in the cyber world. Any possibilityof threat from use of the Internet can be referred as “criminal actscommitted using electronic communications networks and information
Cyber Terrorism Assignment_3
CYBER TERRORISM 4systems or against such networks and systems” (Lagazio et al., 2014,p.59). Cyber-attacks can be of three kinds. First, there could be non-permitted intrusions which in turn refer to a condition where the criminaltends to invade a different computer system using hacking techniques.Again, viruses could enter the systems through emails and all theinformation of another computer could be erased or messed up. Thirdly,services could be denied and this might destroy communication withother parts of the system and other computer’s functionality (Howitt &Pangi, 2003). ChallengesThe Internet has provided scopes to criminals in the cyber world tobe used in the virtual world for misanthropic activities. When differentfirms and individuals carry out their activities on the Internet, they areusually not aware that this space could become home to criminals whocan initiate their attacks. While it is true that the cyber space should beprotected from them, IT experts are still not able to completelyunderstand how far cyber-crime is effective and what could be theprobable outcomes. Since this aspect cannot be completely determined,cyber security methods are not competent enough (Globalpost, 2011).Different types of criminals can pursue cyberattacks. They use illegalnetworks which could be built for purpose of building an area for theircrimes to be carried out. Cyber law system emphasizes on the specificarea of such crimes (Kshetri, 2010). Cyber law is about studying thebehavioural tendencies of cyber criminals by assessing their economic
Cyber Terrorism Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber terrorism and Cyber warfare
|15
|4802
|116

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Overview about Cyber Terrorism | Report
|12
|2450
|129

Research Report on Cyber Terrorism
|13
|2892
|200

ITNET305A Emerging Technologies Security
|9
|2542
|115

Cybercrime: Types, Prevention, and Impact
|12
|732
|28