StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Terrorists: Shutdown the Internet - Term Paper Example

Cite this document
Summary
The author concludes that the threats by the possible cyber attacks can be critical enough to drive the attention of the security agents of the developed and the developing countries. The interdependence of technology and the economy of infrastructure are crucial to secure the resources of IT. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Cyber Terrorists: Shutdown the Internet
Read Text Preview

Extract of sample "Cyber Terrorists: Shutdown the Internet"

Cyber terrorists: shutdown the internet Introduction: Terrorism has been the common agenda to people all around the modern world. The concept of terrorism hit the social civilians of this planet in a bad way when The United States Of America was paralyzed by the attack s on the World Trade Center. It marked the beginning of Terror frightened world with numerous mishaps to follow. The major security forces of the world have strengthened their operation and have manipulated every possible measures to encounter the brutal acts of terrorist, but not very often they did managed to escape from the parasitism of terror. The terrorist groups have their super connectivity in every country of their choice and posses a strong network. They have carried out their attacks in almost every accessible strata of the universe and have not even spared the virtual cyber space. Competitions among the Technology makers have increased beyond leaps and bounds and innovation to provide numerous facilities to mankind has taken a high rise. The high generation technology offered to facilitate human being have also raised some questions among the critics as the safety of people all over is at stake thanks to a group of fellow people termed as terrorists. There is no dogmatic definition of cyber terrorism and its interpretation varies across society. The basic structure of the term deals with the culmination of terror and the use of Cyber space as a platform to synthesis operation in a large manner. The threats caused by the insane activities have stirred the mass and if no suitable measures are adopted then the pride of mankind will cease to exist. The breakdown of the cyber world will take place Types of cyber attacks: The most common form of cyber attack which was popular from the advent of the internet technology was hacking. Hacking procedures generally dealt with infringement upon others privacy and illegal access to files, WebPages and software and causing damage to the inbuilt system. However in present generation, the art of hacking is somewhat prestigious and an arousal of a new concept of ethical hacking has lead to legalization of the matter. The concept of ethical hacking has lead to the upgradation of many soft wares and has even strengthened the security of the internet. In recent times various soft wares have been generated which acts as the tool of attack in the cyber system and some popular among them are Trojan, password crackers, malware, key loggers. Scare ware is the most innovative among them as the attackers remove the program installed in the computer in payment of money. The evidences of lost or theft of data can be traced to various multi-national organizations in the western countries. These forms of cyber attack are popular in the business organization and had enormous implications in the running of the business. In case of most cyber attacks the attackers search for the vulnerability of security in the system and try to gain access. (Cyber attacks: from Face book to nuclear weapons) Different range of cyber attacks has been carried out against various alliances and the majority of them belong to the anti –US domain. On the context of the United States it is to be noted that the country have itself carried out cyber attacks in Iran’s secret nuclear program with the help of Israel. Various attacks have also been carried out which lacked any sort of political motivation. Cyber attacks relating to terrorism has been a serious concern for the security agents all over. The increase in volume of cyber attacks carried all over has been significant. The co ordination between the various attackers and their sophistication will prove to be massive threat from the attackers. The presence of various networking sites over the internet provides access to various likeminded groups and strengthens their unity and working virtually at the cost of nothing. The anonymity of the global access is utilized in a complete manner by the terrorist. One of the major difficulty faced by security agencies in underlying a cyber terror is that the traces out of the attack do not confirm that the attack has been carried out by a particular terror creating group or created by a mere individual for the sake of popularity. This poses a major advantage for the real terrorists who carry out such operations. Other than the example cited above there are various other advantages which the terrorist utilizes. The global access enables them to carry out operation from any corner. The presence of internet activity over most of the present generation mobile phones acts as an added advantage to them. The attacks can also be carried out in a much quick mode and serial operations can be taken charge of without any change of location of the attacker. The attackers can cause major physical harm to the human beings as major infrastructures are IT enabled and harm in the integrity of them will cause severe panic. Another possible mode of attack through the use of global network which has gained popularity over the years is the launch of hybrid attacks. This way of attack is not the conventional way of rendering attacks and is slightly different in nature. Example of hybrid attack includes the launching of various bomb attacks where the internet is used as a triggering devise. Other than the general modes of attack posed by the cyber criminals they also use the internet in various other modes in different ways which are explained below. (Cyber terrorism: the use of the internet for terrorist purposes, 26) Use of the internet by the terrorist: Presentation of their views: Most of the terrorist organization works undercover as they have been legally banned by their respective countries of origin or operation. It is quite evident that during the origination of the terrorist group, they faced problems and difficulties in gathering of the people who had similar views and hardly had any source to communicate and influence people and the media in particular. But the progresses of technology have helped them in a massive way. They promulgate their views, ideologies and their overall aim to the people all over with the help of the worldwide availability of the internet. Most of the terrorist organization have their own websites’ which help them to serve their purpose in a cost –effective way Arousal of threats and propaganda: The terrorists use the internet as a medium for the justification of terror and the glorification of their acts. The organizations carry out various threats propagandas with the help of their websites and create an era of panic among the people. They use the multimedia options effectively and even broadcast their material with the help of numerous television channels. Planning and Support. The ease of access to various information helps in the planning of the terrorist groups. Terrorists can collect data relating to each and every aspect of their attack from the various sources over the web. The presence of thorough and minute details in the form of satellite maps provides immense help in their working. This information is cumulated with other variety of information and helps to formulate strategy of their attacks. The skills and knowledge required to carry out over the web operation are also provided in the free market. Terrorist financing: The terror striking forces present all around are primarily run by the donations from individuals, foreign military organization or organizations that support their motive and cause. Internet acts a medium to help out with their financing. The typical mode of financing is through the virtual currencies and the help of online payment services where the identity of the donators is not revealed. The act of terrorist financing can be classified as reverse money laundering where legal money is used for illegal purposes. (Cyber terrorism: the use of the internet for terrorist purposes,33) Legal issues specific to cyber terrorism: The increase in number of cyber crime and cyber terrorism demands some regulatory laws to restrain their massive operation. Several countries like the United Kingdom and the United states have already understood the priority of the state and have enacted legislations in the matter of unauthorized access of data and the computer. The laws held guilty of a person who tries to access secured data and have intentions to modify or damage the data. In The United states of America password swapping is even held as criminal act. Framing of laws regarding the protection of information is easily dealt with the tangible matter of information which includes CD ROMs, papers; floppy disc whereas the authorities face much difficulty in dealing with electronic information thefts due to their intangible nature, and the countries like Greece and Italy faces serious inconvenience in this respect. Laws relating to sabotage of information and the computers are differently accounted for in different countries. In Belgium and Canada the damage to information without any harm to the physical medium is not chargeable for penalty whereas in countries like Japan, Norway and Spain it is legally penalized. However the penalization can take place only if traces of harm of physical medium are reported. In some countries there are specific laws which cover the denial of service whereas in some countries it is related to damage of data and is not dealt separately. Owing to the great diversity and the racism, countries like India, Germany takes strict measures regarding hate speech, spread of violence, confiscatory statement which can hurt the sentiments of a group of people and indulge into acts which may harm the social security. The results awaiting such statements or measures can lead to massive discomfort and in order to stop those precautionary measures are taken. The popularity of some social networking sites had also lead to adoption of strict surveillance measures by the intelligence department of some countries and they have passed laws which will allow them to take a visit on the profiles of any person they wish to and take measures against if found breaching the code of conduct. Cryptography is another issue which can harm the security of the web world. In some countries there is proper regulation of import and export control by licensing regime. International agreements relating to decryption and cryptography have also taken place. A part of the patriot act in the United States of America deals with prevention of Cyber terrorism and measures are legalized to protect the internet from unauthorized operations. In India the presence of The Information Technology act provides rules and regulations for controlling web security. The developing countries should be aware of the harm which the threats from cyber crime can cause. Most of the countries are technologically improved and their daily operations of almost every sector are directly or indirectly dependent on technology. Utter importance needs to be given to them and they should device laws regarding their proper uses and any breach should be dealt strictly. The government and the security agent should infringe upon the suspicious websites and trace out their link and stop unauthorized access. There should be proper communication between the security agents of different countries as the matter relates to the security of global aspect. (CYBER TERRORISM IN THE CONTEXT OF GLOBALIZATION) Incidents of cyber terrorism: Various incidents of Cyber terrorism both in large and small scale have caused disruptions in the world. The first evidence of cyber terrorism was encountered in Sri Lanka when the guerilla supporters flooded the Sri Lankan embassy with thousands of emails over a period of two weeks’ time to paralyze the communication system. This stood as a mode of protest of the Sri Lankan Black tigers against the discrimination carried out by the government. The institute of Global Communication was hit badly by the Spanish protestors as it was bombarded by numerous electronic mails. The cyber terrorist also spammed the account of the members and the staffs. They main reason for the outburst of the terrorist can be referred to the fact that IGC was hosting a New York based journal which contained material on some terrorist group and demanded the immediate closure of the website. The authorities had no option other than to respond to the demands of the attackers. Technologically advanced country like The United States Of America was also hit badly when the power grid of the country was brought down due to the invasion of 1900 websites by the hackers (CYBER TERRORISM IN THE CONTEXT OF GLOBALIZATION). The evidence of Cyber terrorism causing direct physical harm is negligible; however the probability of such occurrence cannot be overlooked. The vulnerability of cyber laws and loopholes in operation of the cyber space can endanger the possible situation of cyber attacks causing ruthless physical destructions. The technology empowerment of the United States is known to the mass worldwide. All the sectors of the economy are network driven. Documents and information pertaining to any field are updated over the internet on a regular basis. Terror groups aiming to cause major impact on the country may look to breach security system, have an access to the confidential data and take necessary steps to cause panic among the civilians and the government. Infringement of U.S defense firms by China has already been traced out (China implicated in massive cyber attack targeting US). Probable infiltration of the cyber space of the country can lead the path to cause unexpected severe implications to the country and to the world in general. The major areas which could take a high tool are the countries defense system, the online payment system and the innumerable service facilities provided with the free space available. The risk of possible cyber attack can even cause the total web system to collapse. Mitigation from Possible attack: Owing to the possibility of cyber attacks the United States should maintain precautionary measures and should plan adequately to combat such incidents. The US government in general approves the consequence of such attacks and has framed the National Cyber Security Division to work dedicatedly in collaboration with the private and the multinational security agencies. There is also the presence of the United States Computer emergency readiness team (CERT) which works under the domain of the National Cyber Security division. It is to be admitted that the domain of the threats in cyber space is not restricted to any particular region and adherence to international cooperation is needed in a much larger scale. The assessment of vulnerability to the cyber space and remediation activities should be carried on a regular basis. Multilayered network should be designed in sectors of prime importance and the presence of resilient network should be provided to tackle security issues. Cooperation from the users is required in a good deal and they should follow the rules and guidelines specified. Several course of action have been devised for the users which specifies the strategy for safer operations of emails, mobile devices, and safe browsing options. Prevention measures relating to identity theft and their proper responses should be adhered to. The users should also be trained to react in emergency situations and the knowledge of adequate cyber security should be inculcated among the users. The user’s needs to be encouraged to install proper anti –virus in the system to stop from implantation of virus in their system and prevent unauthorized access of their files and documents. Conclusion: The threats imposed by the possible cyber attacks can be critical enough to drive the attention of the major security agents of the developed and the developing countries. The interdependence of technology and the economy of infrastructure are crucial to secure the resources of the information technology. The facilities provided by the creation of the web world should be protected so that the tide does not turn against our favor. Efforts should be made to prevent it from becoming an abode of illegal and unsocial activity. Upgradation in technology needs to be accompanied by the innovation in devising latest security measures. References: “Cyber attacks: from Facebook to nuclear weapons”, The Ttelegraph, (2011), September, 12, 2011 from http://www.telegraph.co.uk/finance/newsbysector/mediatechnologyandtelecoms/digital-media/8302688/Cyber-attacks-from-Facebook-to-nuclear-weapons.html Cyber terrorism: the use of the internet for terrorist purposes, Council of Europe, 2007 China implicated in massive cyber attack targeting US, global post, 2011, September, 12, 2011 from http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/110803/china-google-cyber-attack-us-spearphish-trawl-dope Nagpal, Rohas, CYBER TERRORISM IN THE CONTEXT OF GLOBALIZATION, ieid, 2002, September, 12, 2011 fromhttp://www.ieid.org/congreso/ponencias/Nagpal,%20Rohas.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber Terrorists: Shutdown the Internet Term Paper, n.d.)
Cyber Terrorists: Shutdown the Internet Term Paper. Retrieved from https://studentshare.org/information-technology/1756414-possible-topic-cyber-terriost-shutdown-the-internet
(Cyber Terrorists: Shutdown the Internet Term Paper)
Cyber Terrorists: Shutdown the Internet Term Paper. https://studentshare.org/information-technology/1756414-possible-topic-cyber-terriost-shutdown-the-internet.
“Cyber Terrorists: Shutdown the Internet Term Paper”, n.d. https://studentshare.org/information-technology/1756414-possible-topic-cyber-terriost-shutdown-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Terrorists: Shutdown the Internet

Religious terrorists

Religious terrorists are often seen as viewing themselves as playing a crucial role is a vast cosmic war.... hellip; Though religious terrorists and secular terrorists both are trying to get a point across to the general population, and both are considered “terrorists”, religious terrorism is essentially different from secular terrorism for several reasons.... While, again, they are both considered terrorists, and both use actions that create fear and terror (hence the name) in others, both have widely different agendas, and different points of view on which they operate....
3 Pages (750 words) Essay

Introduction to Terrorism

David Farley (2003) argues that if these sources could be shutdown Al Qaeda operations would suffer perhaps a critical blow.... In conclusion, while it may be possible to eliminate leaders in the terrorist movement, or shutdown training facilities, the essential element in limiting terrorism is through tracing the funding that Al Qaeda... Indeed, Blake states, “Pennsylvania professor Marc Sageman discovered 70 percent of terrorists were recruited outside their native country” (Blake, pg....
2 Pages (500 words) Research Paper

How Modern Terrrorism Uses the Internet

...
1 Pages (250 words) Essay

Government Shutdown as a Tool

This paper tells that the government shutdown is the stalemate in government's functions which is always experienced when the congress fails or declines to pass legislative funding.... hellip; In American law, when there is a stalemate as regards to legislative funding, the constitution compels the federal government to commence a shutdown on the activities that have been significantly affected.... The shutdown may not affect all the segments of the government....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us