logo

CYBER TERRORISM Student Name Institute Name Contents Introduction

   

Added on  2019-11-08

9 Pages1888 Words413 Views
 | 
 | 
 | 
RUNNING HEAD: CYBER TERRORISM 1CYBER TERRORISMStudent NameInstitute Name
CYBER TERRORISM Student Name Institute Name Contents Introduction_1

CYBER TERRORISM 2ContentsIntroduction......................................................................................................................................3Description of the challenge............................................................................................................3Relevant technologies......................................................................................................................3Application of the technologies.......................................................................................................4Research questions...........................................................................................................................4Summary of the issues discussed in research papers.......................................................................5Important issue that were not addressed in research paper..............................................................6Impact of discussed of the issues and their application in real world.............................................6Conclusion.......................................................................................................................................7Reference.........................................................................................................................................8
CYBER TERRORISM Student Name Institute Name Contents Introduction_2

CYBER TERRORISM 3IntroductionIn the current age of advanced technologies, there is growth in the dependency on some cyber technologies, and there is an existence of new threat that starts to emerge with some digital basedfrontiers. It is a known fact of life that to get more integrated on digital platforms, and the infrastructure of the country is associated, and it further becomes more and more vulnerable (Raiyn, 2014). The views also say that existence of cyber terrorism and also the possibilities surrounding it are very far from ranges and from those who also have a belief it is not a threat and can never be taken seriously with so many lasting harms. The report will discuss the impact of cyber terrorism with the help of three research papers.Description of the challengeThe concept of cyber terrorism can be defined as an attack on an electronic based communication networks. At the same time, it is also utilized in the loose form to discuss the usage of the internet by different terrorists in order spread the message widely along with the propaganda and a lot of fear. As the group of terrorists can evolve from the present hierarchal structure to have for independent terrorist cells that are operating in one place to accomplish the objective, the internet has further become an ideal place to spread the ideas and keep the communication well with associated cells (Hua & Bapna, 2013). The process is quite inexpensive by nature and also sufficient for the usage of the readily present with internet for the motive and with incredibly easy for people to retain the anonymity.
CYBER TERRORISM Student Name Institute Name Contents Introduction_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Research Report on Cyber Terrorism
|13
|2892
|200

ITC544 : Computer Organisation and Architecture
|11
|2648
|235

Cyber Terrorism and Its Effects on Society
|9
|1736
|382

Overview about Cyber Terrorism | Report
|12
|2450
|129

Big Data Privacy: Balancing Personalization and Privacy
|19
|4957
|121

Contemporary issues in information technology Assignment 2022
|11
|3434
|56