StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Dangers of Cyber-Terrorism - Research Paper Example

Cite this document
Summary
In the paper “The Dangers of Cyber-Terrorism” the author discusses cyber terrorism, which entails two major aspects: cyberspace and terrorism, allowing it to be considered as the usage of information technology by terrorist organizations…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
The Dangers of Cyber-Terrorism
Read Text Preview

Extract of sample "The Dangers of Cyber-Terrorism"

The Dangers of Cyber-Terrorism Introduction Cyber terrorism entails two major aspects: cyberspace and terrorism, allowing it to be considered as the usage of information technology by terrorist organizations with motives of individual advantage and extensive deterioration. The system of the entire world is dependent significantly on computer units and actions cyber terrorism against these types of systems may be disastrous. Skeptics are likely to minimize this risk and the devastating result that may end up in the event that this kind of a confrontation were effective. Such a perception does not absolutely figure out the implications of this kind of an offense on our technology organized world. Cyber-terrorism and United States: A nation like the United States, whose nationwide safety is indeed seriously reliant on computer systems, could locate itself crippled if an act of violence against the army or economic field of the state was released. The risk of cyber terrorism is extremely genuine and incredibly hazardous and computer system users should become aware of the threats. (Buchan, 1999) The face of international terrorism is beginning to change at a quick speed. Even though the motives keep on being the identical, United States is now confronted with cutting edge and unusual tools. The intelligence strategies, safety strategies, and devices which are designed to shield us, now are immobilized against this latest disastrous tactic, known as cyber terrorism. Moreover, the ways of counter terrorism that the world depends on have become fairly outdated since this opponent is not going to strike people with explosives, however, this enemy strikes with computer viruses and aims to interrupt our computer units which people have grown to be so reliant on. (Collin, 1997) Origin of Cyber terrorism idea: Cyber strikes, system safety and data present complicated troubles that hit into new places for nationwide safety and public plan. This paper examines one list of concerns – those associated with cyber-terrorism and cyber offenses on crucial system and their ramifications for countrywide safety. Cyber-terrorism is “the consumption of computer system resources to turn off crucial national infrastructures (for example power, transport, federal government procedures) or even force or torment a government or civilian populace.” The idea of cyber terrorism tends to be that as countries and vital infrastructure grew to become more influenced by computer systems for their functioning, innovative vulnerabilities are built – “a substantial computerized Achilles' heel.” A vicious society or group may well take advantage of these vulnerabilities to make their way into an improperly protected computer system and interrupt or even close down crucial services. Quite a bit of the literature on cyber-terrorism considers that the susceptibility of computer systems and the susceptibility of crucial infrastructures are the identical, and that all these vulnerabilities keep national security at a substantial threat. Presented the newness of computer network technological innovation and the rapidity with which it distribute into financial exercise, these assumptions are not unexpected. A deeper look at the associations between computer systems and crucial infrastructures, their susceptibility to attack, and the impact on national security, signifies that the supposition of susceptibility is inappropriate. In spite of plentiful media consideration, there is absolutely no consensus strategy through which numerous measures may be positioned under the nomenclature ‘cyber terrorism’, however, the term evidently exists in typical usage. The term, initially formulated in the 1980s by Barry Collin (Collin, 1997), has blossomed in the past couple of years: “Protect yourself from the cyber terrorist”; “Insure oneself against cyber terrorism”; “Funding upcoming to combat cyber terrorism” (Hamblen, 1999; Luening, 2000). All these seem great, however, the simple truth is that the audience, alternative provider, or defender can often be left to his very own systems regarding what the term really signifies and thus exactly what remedies ought to be produced (or executed). When a government’s or corporation’s whole system might be at risk, subjectivity is helpful yet is probably not the ideal evaluative equipment (Crenshaw, 1999). Some examples of Cyber Threats to United States: Not too long ago, cyber terrorists employed a lethal malware to approach the data network of Aramco, the Saudi oil firm, and annihilated every bit of the data on 35,000 desktop computer systems. The monitors of the afflicted computer systems were left with the sight of a burning United States flag. A team known as the Cutting Sword of Justice professed credit for the harm. (Buchan, 1999) Almost a year ago, PC hackers hacked the Twitter account of The Associated Press and dispatched a tweet declaring that there were two explosions at the White House and that President Barack Obama was hurt. Within a couple of minutes, the stock exchange reduced by 143 points. The Syrian Digital Army later on claimed credit for the offense. Barely a day goes by without reading or listening about a different cyber strike against certain objective in America. Cyber dreadfulness has become the brand new dialect of battle that we recognize merely slightly. We realize that increasingly more of our everyday lives center around an electronic world on the web, our computer systems and our mobile phones. We anticipate that the companies who sell us those electronic solutions are doing their best to shield it against cyber assaults and we anticipate the federal government is performing the same. However, professionals alert us now that true danger is simply at hand in the event that our federal government and companies are unable to generate a formidable protection against cyber strikes. (Denning, 2000) How harmful might these cyber-attacks be? Give some thought to what may come about in case our water supply, our electric powered grid, or the Web was efficiently turned off by a cyber-strike. Previous CIA director and U.S. Security Secretary Leon Panetta lately cautioned that the subsequent Pearl Harbor might be from cyber-terrorists. It is possible for digital intrusions to harm commercial infrastructure and undermine physical risk, grabbing command over those systems from the outside is exceedingly challenging, needs a lot of professional understanding and should get over non-computerized fail-safe steps. Because of this, authorities and company security experts--while cautious not to overlook the gravity of the issue--point to this undeniable reality: It happens to be simpler to bomb a target as compared to hack a computer. (Crenshaw, 1999) Cyber Crime and the Economic system Cyber strikes do present an extremely genuine threat in their likelihood of offense and for striking financial expenses much out of proportion to the cost of setting up the offense. Hurricane Andrew, the costliest natural catastrophe in U.S. history, brought on $25 billion dollars in deterioration and the typical yearly expense from tornadoes, cyclones, and flood destruction in the U.S. is expected to be $11 billion. On the other hand, the Love Bug malware is projected to include cost computer users all over the world around $3 billion and $15 billion. (Denning, 2000) Placing aside for now the issue of the way in which the approximations of the Love Bug’s expense were estimated (these statistics are most likely over-estimates), the capability of just one university student in the Philippines to generate this measure of deterioration making use of low-priced device displays the prospective risk from cyber offense to the worldwide economy. Conclusion From a wider security viewpoint, nations right now deal with a variety of amorphous threats to their security which are challenging for the conventional equipment of national safety to attain. The lines between household and international, private and community, or law enforcement and army are blurring, and the nature and needs of national safety are transforming dramatically. The most significant ramifications of these modifications for cyber security may be that national strategies must adapt to developing interdependence among economies and highlight the requirement for collaboration among nations to wipe out cyber threats. References Buchan, G. C. (1999), "Implications of Information Vulnerabilities for Military Operations,” in Khalilzad and White, The Changing Role of Information in Warfare, Rand. Collin, B., 1997. The Future of Cyber terrorism, Crime and Justice International, pp.15-18. Crenshaw, M. 1999. How Terrorism Ends. US Institute of Peace working group report. Denning, D. (2000), “Cyber-terrorism”, Testimony before the Special Oversight Panel of Terrorism Committee on Armed Services, US House of Representatives, 23 May 2000. Larissa P. (2001), “When Cyber Hacktivism Meets Cyber-terrorism,” SANS Institute, February 19. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Dangers of Cyber-Terrorism Research Paper Example | Topics and Well Written Essays - 1250 words”, n.d.)
The Dangers of Cyber-Terrorism Research Paper Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/social-science/1637990-terrorism-without-borders-the-dangers-of-cyber-terrorism
(The Dangers of Cyber-Terrorism Research Paper Example | Topics and Well Written Essays - 1250 Words)
The Dangers of Cyber-Terrorism Research Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/social-science/1637990-terrorism-without-borders-the-dangers-of-cyber-terrorism.
“The Dangers of Cyber-Terrorism Research Paper Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/social-science/1637990-terrorism-without-borders-the-dangers-of-cyber-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Dangers of Cyber-Terrorism

Homeland Securtiy. Post-Mortem of the US Governments Response to the Times Square Cesium Terrorist

The scenario chosen for this project is a hypothetical terrorist attack on Times Square in New York City.... In this attack, terrorists have obtained cesium stolen from a hospital's medical equipment, and detonated this cesium with a TNT bomb in Times Square.... … The threat of nuclear terrorism has been apparent since Brian Jenkins published his groundbreaking “Will Terrorists Go Nuclear?...
9 Pages (2250 words) Essay

Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements

"Considering the Threats and Vulnerabilities of Information Systems: A Plan for Improvements" paper purposes actions that include: enhancements to the hiring and promotion processes, implementing a contingency in job appointments, enhancing the sustainability of basic technology.... hellip; Thomas Kean, co-chairman of the 9/11 Commission, the First Response Coalition illustrates that the call for action is the same now as it was several years ago: “On September 11, people died because police officers couldn't talk to firemen....
7 Pages (1750 words) Coursework

Cyberterrorism - A Threat Or A Hoax

In his article, Cyberterrorism: There are many ways terrorists can kill you—computers aren't one of them, Joshua Green argues that the Bush administration's infatuation with preaching the dangers of cyberterrorism is one that has become a pattern since September 11th.... For every publication produced that argues cyber-terrorism is a major threat, there is another that comes out claiming it is a hoax....
7 Pages (1750 words) Essay

Crimes Against Information

The essay "Crimes Against Information " discusses the threat of cyber-terrorism remains a quick and inexpensive weapon to deliver a detrimental effectholding cyber-terrorists responsible and matching the detriment of their crimes have not been implemented.... Over the years, the level of cyber-terrorism has evolved.... Though hackers implement a more simplistic form of cyber-terrorism, and their trespassing is not as harmful as modern day crackers-those who seek to disable networks or systems-both hackers and crackers pose danger to the world that holds critical information....
6 Pages (1500 words) Essay

Computer Sciences & Information Technology - Cyberterrorism

Cyber terrorism is the type of violence than invades the information base of every computers, networks and stored data to misuses the… ‘Cyberterrorism hinges on the widespread use of computers by individuals, private industry and corporations, the military, and the government and its agencies....
2 Pages (500 words) Essay

American security culture in history

Terrorism has been a real challenge to the world in general but America being the world's icon of safety serious measures have to be put in place to eradicate the menace of terrorism.... Homeland security having been constituted in 2002 after the 9/11 attacks it has been placed… Despite the many years of success enjoyed by Homeland security there are still better ways to improve its operations and especially when the attacks it is expected to stop are major and they can claim many Terrorism activities have been among the most life claiming catastrophes in this century....
5 Pages (1250 words) Essay

Vulnerability of North Anna Nuclear Generating Station in Virginia

In the paper “Vulnerability of North Anna Nuclear Generating Station in Virginia” the author analyzes the susceptibility of nuclear plants to terrorism.... He states that the vulnerabilities of US nuclear plants are known to American officials and there is sufficient time for preventive action to be taken....
6 Pages (1500 words) Essay

The Internet and Increasing Criminal Risks

This study analyzes the relationship of the internet to the increasing criminal risks with regards what roles that this tool plays in the negative occurrence.... The author concludes until countermeasures are put in place, the internet remains a major factor of increasing criminal activities.... nbsp;… Evaluations regarding the relationship between increasing criminal activities in the above study reveal that indeed, the two are interconnected....
10 Pages (2500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us