Cyber Terrorism - Case Study Example

Comments (0) Cite this document
Cyber Terrorism Case Study Date Cyber Terrorism Case Study Introduction With the continuing fast pace of technological development that have spanned during the current century, one is intrigued by the way criminal activities have used technological media to perpetuated havoc…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.9% of users find it useful
Cyber Terrorism Case Study
Read TextPreview

Extract of sample
"Cyber Terrorism"

Download file to see previous pages It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination or severe economic loss would be examples” (Denning, 2000, p.1). Two other definitions of the term were created by the U.S. Federal Emergency Management Agency (FEMA) and Coleman whose definitions are as follows: “unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives” (Wilson, 2008); and “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives” (Coleman, 2003). ...
Statement of the Purpose The purpose of the current case study is to present details on cyber-attack that had persisted between Pakistan and India over their territorial conflict on Kashmir. According to Vatis (2001), “this conflict illustrates the vulnerability of critical infrastructure systems to cyber attacks and the increasing willingness of groups to target sensitive systems during political conflicts” (p. 5). The case study, therefore, enhances awareness on conflicting parties’ increased vulnerabilities to cyber terrorist attacks and, thus, should focus on installing increased protection and security measures to prevent destructive disruptions. Description of the Subject The case covered the conflict between India and Pakistan over a territory: Kashmir. Historical events have traced the geopolitical dispute after the British occupation in 1947. Armed conflicts were used through the years before 1998 to resolve problems, after that the dispute eventually resorted to electronic warfare ranging from hacking incidents to web defacements that disrupted websites in both private and public sectors of India and Pakistan. Chronology of the Case Study The India – Pakistan conflict over Kashmir could be traced from the end of the British occupation in 1947, when, according to a summarized discourse: “two countries stood where there once was one. Pakistan separated with the intention of being the nation for the Muslims of India. Kashmir, the roots of the boundary dispute between the two nations, was an autonomous state under British rule and remained so post-partition, when initially given a choice between Pakistan and India. Eventually though, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyber Terrorism Case Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from
(Cyber Terrorism Case Study Example | Topics and Well Written Essays - 1250 Words)
“Cyber Terrorism Case Study Example | Topics and Well Written Essays - 1250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
...Ideological, Nationalist and Religious Terrorism The Montana Freemen were a Christian Patriot Movement that had declaredthemselves free from the authority of any outside government. The group started in the 1990s and believed that citizens could become fully sovereign by rejecting the federal government alongside other forms of authority. This movement did not use militants and guns but used legal briefs and the uniform commercial code. They believed they were kings and queens, and nobody was allowed to tax them. The U.S government was viewed as a foreign corporation and did not have citizens, but franchises. Some of the founding members included Leroy Schweitzer, who was the head of the group, Skurdal and Daniel...
6 Pages(1500 words)Case Study
Introduction to Terrorism
...? TERRORISM Terrorism Definition: Although the scholars have not defined any comprehensive and unanimous definition of terrorism, the term simply means one or more acts conducted by the individuals, groups, organizations or communities, in order to threaten, hurt and harm their rivals and opponents by applying weapons or any type of destructive material in order to obtain political, religious, cultural or racial gains and benefits. The main reason behind determining some specific definition of terrorism includes the difference of opinion and variation in the criteria the `communities maintain while defining the acts of terrorism; as act, committed by an organization is taken as terrorist offence by the rivals, though the same one... is...
3 Pages(750 words)Case Study
Types of Terrorism
...? Types of Terrorism Introduction Terrorism can be defined as the systematic use of terror activities by individuals, groups or organisation aas a means of coercion. However, with reference to criminal law, there isn’t a legally binding defination of terrorism that is universally aceepted. Most of the description of terrorism usually revolve aroud those violent activities intended to create fear. The terror activities are mainly perpetrated for ideologcal, religious ar political goals and are most of the time deliberately targeted at civilians and are commited by those agencies outside the government. Terrorism is characterised by use of violence indiscriminatively against civilians with intensions of gaining publicity of cause... for...
3 Pages(750 words)Case Study
Cases of cyber attacks
...? Cases of Cyber Attacks Cases of Cyber Attacks The historical landscape of how wars are fought changed drastically when Information Technology was used by developed countries to attack one another. Instead of bullets and guns, critical websites of government and news agencies are hacked or defaced to express political statement and display of IT power. In this paper, a comparison of three cases of cyber terrorism would be discussed to enable people understand the nature, power and threat caused by cyber attacks. Likewise, the governments’ initiatives to response to similar threats in the future are also included in this report. The case of the...
4 Pages(1000 words)Case Study
Terrorism Case Study
...RUNNING HEAD: TERRORISM IS NOT A NEW PHENOMENON Terrorism is not a New Phenomenon Terrorism is not a New Phenomenon Ganor (2002) argues that, contrary to the belief held by many, in order to understand and effectively combat terrorism a definition of it becomes necessary. Opponents perceive that defining the word will give rise to 'loophole' within the international law system to allow countries to sponsor groups outright who can then legitimise their affiliation and align themselves with something other than the term 'terrorist'. Along these lines of thought Ganor (2002, p. 288) defines terrorism as "the deliberate use or the threat to use violence...
10 Pages(2500 words)Case Study
...TERRORISM There are various approaches through which the definitions of terrorism provided by Lawless and Player et al. can be critiqued. In Lawless, for example, the author only defines terrorism internationally: “terrorism is an international crime, and, as such, it requires the international community to act in the prevention of terrorism and the sanction of individuals perpetrating acts of terrorism” (Lawless, 2007). However, this definition denies the presence and relevance of domestic terrorism, seen in the US through recent events like the Oklahoma City bombing and the Michigan Militia standoff. Player et al....
3 Pages(750 words)Case Study
Terrorism and the Media
...Terrorism and the Media of Affiliation On April 15, the participants in the Boston Marathon, as well as horde of humanity that had gathered to spectate were treated in a rather unforgettable experience. Just within the proximity of the finish line of the Marathon, two pressure cooker bombs exploded in a span of seconds from each other resulting in more than two hundred casualties. Three people were later on pronounced dead from the incident. Investigation into the bombings commenced immediately with investigators closely examining the footage captured in the surveillance cameras. Two individuals carrying heavily loaded bags and wearing caps were noted, and their images circulated to the public soon afterwards. Law...
3 Pages(750 words)Case Study
Cyber Security and Startups
...Cyber Security and Start-ups What is a DDoS attack? A DDoS Attack is an attempt to make an online service inaccessible by overpowering it through the obstruction from various sources. The motive of the attacker is to receive payments in Bitcoins before releasing the service to resume its normal functions. The attack targets significant resources used by business organizations, security firms or schools by making it a challenge to access the information. The authors indicate that the charges requested normally range between $100 and $300, but there are fears it could be increased in the future to extort more users (Perlroth & Wortham, 2014). How can a small company protect itself from DDoS attacks? A small company can...
1 Pages(250 words)Case Study
Cyber Security in Business Organizations
...Cyber Security in Business Organizations Cyber Security in Business Organizations Information security is a growing challenge among organizations that have implemented information systems. With the incorporation of information technology into organizational operations, corporations have become vulnerable to a plethora of information security risks. Failure of information systems can cost organizations heavily in the form of declining consumer trust, monetary losses, and deteriorating shareholder confidence. Johnson and Goetz (2007) describe security risk management as a balance between “maintaining security” and keeping the business going. Information security failures tip the balance and expose...
5 Pages(1250 words)Case Study
Cyber Security in Business Organizations
...Cyber Security in Business Organizations Number Aftermath analysis and investigations into what is perhaps the greatest retail hack in the history of the United States reveals that the act was not really unavoidable or was it a superiorly skilled undertaking. In fact, revelations point to the fact that the event would have been easily prevented had security alerts been heeded and promptly addressed (Riley, Elgin, Lawrence & Matlack, 2014, March 13). Before 2013’s thanksgiving, a malware was installed in Target’s systems for payment and security to facilitate the theft of the cards that would be utilized in all the retail’s US stores. However, Target had half a year prior to that installed malware detection systems from...
3 Pages(750 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Case Study on topic Cyber Terrorism Case Study for FREE!
Contact Us