Cyber Terrorism: A Comprehensive Analysis of Threats and Prevention

Verified

Added on  2023/04/22

|4
|465
|463
Essay
AI Summary
This essay provides an overview of cyber terrorism, defining it as the use of cyberspace and internet resources to conduct violent acts that can result in loss of life and system damage. It highlights that cyber terrorism can be carried out by individuals or groups to threaten ideologies or societal practices, with potential victims ranging from entire nations to individuals. The essay uses the example of NATO computer blasts during the Kosovo conflict to illustrate the consequences of cyber terrorism, including disruption of targeted systems. Furthermore, it suggests preventive measures such as implementing VPNs and firewalls, installing antivirus software, and educating users about online safety rules. The document concludes by emphasizing the importance of awareness and proactive measures in mitigating the risks associated with cyber terrorism. Desklib offers a range of study tools and solved assignments for students.
Document Page
Running head: CYBER TERRORISM
CYBER TERRORISM
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CYBER TERRORISM
Cyber Terrorism
Cyber terrorism is the term that defines the use of the cyber space and internet resources to
conduct the violent acts that results in the loss of life and damage of the system. Cyber
terrorism can be conduct by the individual or group of people in order to threaten the
ideology or benevolent practices in the society. The victim of cyber terrorism can be a whole
nation or individual person (Dawson, Omar & Abramson, 2015). Cyber terrorism sometimes
regarded as internet terrorism which includes disruption of the functioning of computer at
large scale through the usage of various tools techniques and use of computer viruses. Cyber
Terrorism can be used for political issues and sometimes helps to manipulate the normal
consequences of decisions taken by a nation r individual person.
Aftermath of cyber terrorism
The consequences of the cyber terrorism depends on the motive of cyber terrorism. This
type of attack can be done for political issues or personal benefits. The consequences of cyber
terrorism can be disruption of functioning of targeted system or the mass destruction. One of
the prominent example of cyber terrorism is regarding the blasts of NATO computers. During
the KOSOVO conflict, the group of hackers implemented the cyber terrorism through the
blasting of the computers at NATO centre. This was done through the denial-of-service
attack. The attack was occurred for the protest of NATO bombing (Blakemore, 2016).
However, the attacks can be developed through other techniques like spreading virus laden e-
mails to the target system.
Prevention of the attacks:
Certain steps can be taken in order to prevent the attacks of the intruders in cyber
terrorism. The organization can implement the VPN and firewall in order to prevent the
external threats. On the other hand the organization can install anti-virus software in the
Document Page
2
CYBER TERRORISM
system those will help to prevent the external threats in the system (Dawson, Omar &
Abramson,2015). Apart from that the employees in the organizations and the individual
users are needed to make aware about importance of maintaining rules during the online
activities.
Document Page
3
CYBER TERRORISM
References
Blakemore, B. (2016). Policing cyber hate, cyber threats and cyber terrorism. Routledge.
Dawson, M., Omar, M., & Abramson, J. (2015). Understanding the methods behind cyber
terrorism. In Encyclopedia of Information Science and Technology, Third Edition (pp.
1539-1549). IGI Global.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]