StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Black Ice: The Invisible Threat of Cyber Terrorism - Book Report/Review Example

Comments (0) Cite this document
Summary
This book review "Black Ice: The Invisible Threat of Cyber Terrorism" analyzes “Black Ice: The Invisible Threat of Cyber Terrorism”. The book is an investigation of the possibility of cyber terrorism, its global and financial implications, its impact on civil and private infrastructure, and the interest of the international terrorist organizations in the United States…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Black Ice: The Invisible Threat of Cyber Terrorism
Read TextPreview

Extract of sample "Black Ice: The Invisible Threat of Cyber Terrorism"

Download file to see previous pages Investigation of the possibility of cyber terrorism, its global and financial implications, its impact on civil and private infrastructure, and the interest of the international terrorist organizations such as Al Qaeda in interfering with the cyberinfrastructure of the United States.

Black Ice is packed with fictional scenes, commentaries, and interviews by leading government officials related to national security. Even the Al Qaeda supporters are given a place in the book, which makes the book different and interesting. The book reflects the author’s extensive research on the topic.

The book discusses an important issue of the modern world i.e. IT security is a national security issue. According to Thompson (2003), people still discard the idea of cyberattacks. Thompson believes that the main point of Verton’s book is to make the people aware of the possibility of a cyber-attack. Verton believes that the terrorists are moving with the pace of the world and are developing a new generation of cyberattacks. He argues in his book that the consequences of such attacks would be far worse than our imagination because we do not take them seriously and guard ourselves against them. Verton gives various examples in his book to support his argument. In 1996, a Swedish teenager made so many calls to 911 that it hung up their system. On another occasion, a teenager was caught developing software that could automatically make the flood of calls to 911.

According to Thompson (2003), Verton intends to highlight the intensity of a cyber attack. Verton believes that Al Qaeda would use the cyber world as a means to attack the real world. Such a kind of attack will have greater casualties coupled with other forms of terrorism. As Thompson writes, “Verton envisions “swarming attacks”, a combination of virtual and physical blows.”
One of the important points of the book is the interdependency of the infrastructure of the country. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Black Ice: The Invisible Threat of Cyber Terrorism Book Report/Review, n.d.)
Black Ice: The Invisible Threat of Cyber Terrorism Book Report/Review. https://studentshare.org/literature/1703760-book-review-on-black-ice-the-invisible-threat-of-cyber-terrorism-dan-verton
(Black Ice: The Invisible Threat of Cyber Terrorism Book Report/Review)
Black Ice: The Invisible Threat of Cyber Terrorism Book Report/Review. https://studentshare.org/literature/1703760-book-review-on-black-ice-the-invisible-threat-of-cyber-terrorism-dan-verton.
“Black Ice: The Invisible Threat of Cyber Terrorism Book Report/Review”. https://studentshare.org/literature/1703760-book-review-on-black-ice-the-invisible-threat-of-cyber-terrorism-dan-verton.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Black Ice: The Invisible Threat of Cyber Terrorism

Cyber Terrorism

... Attack”) “Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks and the information stored therein, when done to intimidate or coerce a government or its people in furtherance of political or social objectives”. (Gordon and Ford, 4) An attack that causes harm to people or property and leads to mass fear can be considered as cyber terrorism. Examples of this may be attacks that result in water contamination, plane crash, physical injury or death, explosions or massive loss to property or infrastructure. However, attacks that lead to the disruption of trivial services or activities cannot be labeled as cyber terrorism. In the month...
10 Pages(2500 words)Research Paper

Cyber Terrorism Case Study

...? Cyber Terrorism Case Study Cyber Terrorism Case Study Introduction With the continuing fast pace of technological development that have spanned during the current century, one is intrigued by the way criminal activities have used technological media to perpetuated havoc. The emergence and widespread use of the Internet globally has made this medium vulnerable to various threats and acts of violations of both personal and organizational privacy and security. Termed as cyber terrorism, the definition of which was revealed to have spurred difficulties in taxonomies, its meaning is hereby quoted by Gordon as: “Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats...
5 Pages(1250 words)Case Study

Cyber threat analysis

The paper will also mention companies that provide cyber threat analysis services. In addition, the paper will continue to by discussing future speculations about the fate and integration of cyber threat analysis. Cyber Threat Analysis Introduction Computer and internet users have been met with dire and consequences that have sought to deny them their freedom and sense of enjoyment when using various software and computer hardware that link to the internet. The World Wide Web has become a risk ground where individuals can be attacked by malicious programs that may work to ruin important information stored and retained in individual computer system. The issues of cyber threats have been very serious and grievous as the risks invol...
6 Pages(1500 words)Research Paper

Threat Management Of Terrorism

...?Threat management of terrorismTerrorism has become the systematic weapon of a war that knows no borders or seldom has a face”. Jacques Chirac, Speech: Sept. 4, 1986 Introduction: Once known as a phenomenon restricted to certain parts of the globe, such as countries in the Middle East, South East Asia, or South Africa, terrorism today has transcended beyond those boundaries, engulfing almost the entire world in its grasp. Terrorism has truly become a global phenomenon, which has gripped nations across the world, leading to unprecedented chaos and destruction to human lives and property. It is hence imperative for nations and government administrations to ensure the application and adoption of effective preventive measures and strategies...
3 Pages(750 words)Essay

Fraud And Cyber Terrorism

... that allows for much more efficient investigation. (Sanjay Goel. 2010). Cyber terrorism threat Cyber terrorism is the act of illegally accessing computers and information chiefly via the internet to create physical harm or severe disturbance of infrastructure. Cyber terrorism could scholarly be defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives.” Efforts of dealing with cyber terrorism Agencies that deal with fraud such as Interpol and the FBI are doing a great job in fighting against cyber terrorism...
3 Pages(750 words)Research Paper

Invisible Details in Black Swan by Aronofsky

...Black Swan Reviews Having viewed the film, it was difficult not to interject with the reviews made by the critics of “Black Swan” (Aronofsky, .Both reviews were similar in a sense that they both carried sarcastic tones in their reviews which perhaps, the critics considered necessary to spice up their articles. Both critics likewise agree that “Black Swan” is a “mental” film that requires audiences to think outside and beyond the box. These two reviews also made reference to “The Red Shoes” which was an earlier ballet film. In addition, both critics agreed that Aronofsky, the film’s director was never the type to be subtle in his film-making antics. However, these two reviews had opposite things to say in terms of the quality of the film...
1 Pages(250 words)Movie Review

Cyber Terrorism and Warfare

...Cyber Terrorism and Warfare Cyber Terrorism and Warfare Cyber terrorism and warfare involve use of a computer network to tamper with infrastructure, such as transportation and government operations (Andress & Winterfeld, 2014). In most cases, these attacks are politically motivated with the intention of forcing a government or a population of people to act in a specific way or to meet demands of the attackers. It further involves illegal access to information from the government for political, military, or economic benefits. Cyber terrorism and warfare, according to national defence leaders, poses a great risk to the national security of the U.S (Brady, 2011). Cyber terrorism and warfare has three main components. The first component...
1 Pages(250 words)Research Paper

Cases of Cyber Crimes and Threat of Terrorism

... process usually make it difficult to accurately estimate time and budget required to complete the project at the initial stage. Q6. In recent years, governments all over the world have assumed the role of protecting their citizens amidst increasing cases of cyber crimes and threat of terrorism. State, federal, and international legislations affect IT security planning in many ways. First, these legislations lay many laws, often complicated, that information technology professionals must comply with. There are numerous laws the govern information security, accountability as well as privacy. Information technology professional often plan information security with an aim of protecting the privacy of users’ data in line with human right...
3 Pages(750 words)Assignment

Cyber Terrorism

... Research Center. (2012). Second city third in cybercrime. Retrieved from http://www.crime-research.org/news/18.04.2012/3893/ Council of Europe. (2007). Cyberterrorism: the use of the internet for terrorist purposes. France: Council of Europe. Gordon, S., & Ford, S. (2003). Cyberterrorism? Retrieved from https://www.symantec.com/avcenter/reference/cyberterrorism.pdf Gustin, J. F. (2007). Cyber terrorism: a guide for facility managers. US: CRC Press. Ramshaw, L. S. & Smith, S. W. (2010). Creating large disturbances in the power grid: methods of attack after cyber infiltration. Retrieved from http://www.ists.dartmouth.edu/library/490.pdf Verton, D. (2003). Black ice: the invisible threat of cyber-terrorism. US: McGraw-Hill Professional....
12 Pages(3000 words)Research Paper

History of Cyber-Terrorism

... years of 1990s when the Internet saw a massive rise in its growth and use and the concept of “information society” emerged and practiced, numerous theories and studies highlighted the potential risks attached with this kind of society particularly in the United States of America (Weimann, 2004). Weimann (2004) further highlights that the National Academy of Sciences, in 1990, highlighted the gravity of cyber terrorism and clearly mentioned the term “electronic Pearl Harbor.” Based on this historical development on the issue of cyber terrorism, it can be extracted that with the emergence of the Internet there were only studies, theories, observations and possibilities of cyber threats but there was no concrete and solid evidence or study...
10 Pages(2500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Book Report/Review on topic Black Ice: The Invisible Threat of Cyber Terrorism for FREE!

Contact Us