We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Cyberterrorism - A Threat Or A Hoax - Essay Example

Comments (0)
The purpose of the essay "Cyberterrorism - A Threat Or A Hoax" is to assess and explore the concerns prevalent on the topic of cyberterrorism and to identify from this information the most rational perspective on the path for better understanding the topic…
Download full paper
Cyberterrorism - A Threat Or A Hoax
Read TextPreview

Extract of sample
Cyberterrorism - A Threat Or A Hoax

Download file to see previous pages... Where a cyber-terrorist acts with the intent of severely impacting the economy or civil morale of the country, a hacker merely causes nonessential or at the most costly damage. For every publication produced that argues cyber-terrorism is a major threat, there is another that comes out claiming it is a hoax. Many of these authors who hold this position argue it is a form of presidential propaganda. In his article, Cyberterrorism: There are many ways terrorists can kill you—computers aren’t one of them, Joshua Green argues that the Bush administration’s infatuation with preaching the dangers of cyberterrorism is one that has become a pattern since September 11th. None are more exemplary of exploiting the public’s misunderstanding of the term, along with their fears, than Homeland Security Director Tom Ridge, which Green proves with this quote by Ridge: Terrorists can sit at one computer connected to one network and can create worldwide havoc," warned Homeland Security Director Tom Ridge in a representative observation last April. "[They] don't necessarily need a bomb or explosives to cripple a sector of the economy, or shut down a power grid. (Green, 2002)" Green further points out that Ridge’s propaganda is not without merit considering that a survey of 725 cities conducted by the National League of Cities for the Anniversary of the 9/11 attacks showed that cyberterrorism ranked with biological and chemical weapons at the top of a list made by officials of the single most feared threats (2002)....
Green recognizes that all of these actions would be reasonable responses to an actual looming threat, but they fail to muster any sort of rationale considering that, as he states, there is no such thing as cyberterrorism--no instance of anyone ever having been killed by a terrorist (or anyone else) using a computer (2002). In his article Cyberterrorism: How Real Is the Threat? Gabriel Weimann acknowledges that the potential threat of cyberterrorism is the cause for its apparent alarm in society; but with not one single recorded instance of authentic cyberterrorism, one is left to wonder if there is really a threat (Weimann, 2004). Weimann identifies the public concerns over cyberterrorism as the most pinnacle form of trivial propaganda. He best relays this idea with the argument, Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term "cyberterrorism." The fear of random, violent victimization blends well with the distrust and outright fear of computer technology. He further points out that this unprecedented type of fear somewhat existed before 9/11, and it was identified through a number of U.S. military exercises which revealed many vulnerabilities in the American network. After 9/11 cyberterrorism was promoted to contribute to fear tactic propaganda of the president and it was enhanced by those who Weimann refers to as interested actors from the political, business, and security circles (2004). Despite all of this, he does not completely disregard cyberterrorism as just a propaganda scare. The Symantec Corporation, founded in 1982, is an international corporation known for selling security and information management computer software. For the companies 2003 security response titled Cyberterrorism? Sarah Gordon and Richard Ford assess all of the facts about cyberterrorism for the purpose of increasing common knowledge about prevention. ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
The greatest terrorism risk currently facing Australia is not that of physical violence, but rather digital violence
Many Nations of the world have witnessed the chaos left behind by this evil practice of terrorism. With many measures in place and laws laid down, terrorism has been subsided. But a new form of terrorism evolutes through the emerging technology, which has been intimidating the world through its malicious affects, finally took the form of “Cyber terrorism”.
3 Pages(750 words)Essay
Disaster Management: Planninig for emergencies NIMS
Human made environmental disturbances such as deforestation, increased mining activities, and unscientific quarrying activities adversely affect the geological as well as ecological structure of the earth. Evidently, the undesirable structure transformation is the root cause of majority of small to medium scale disasters including fires and land sliding.
3 Pages(750 words)Essay
Someone is growing kittens in a bottle, effectively making Bonsai kittens
What if the same concept was applied to a live animal, such as a kitten II. Credibility Statement: The Humane Society of the United States has received numerous complaints about the website since its very beginning. After performing research, they found that it was a hoax "that describes how to stuff kittens into glass containers to warp their bodies into the shape of the container.
2 Pages(500 words)Essay
Cyberspace is defined as "The electronic medium of computer networks, in which online communication takes place." It is made up of millions of interconnected networks, servers, computers, and fibre optic cables which help control the entire infrastructure.
8 Pages(2000 words)Essay
Assessment 2 - Cyberterrorism Research Essay
s research also aims to investigate how the repercussions of such legislation can be moderated through a balance of the law coupled with other measures that can work in tandem with the law. Some of the measures recommended in this study include a more active role for
15 Pages(3750 words)Essay
Emergency Planning and Operations
Is the National Response Framework being followed by local and state government’s emergency response units? Should revisions be made to the framework so that it will also address the current threat on “cyberterrorrism”? Emergency and disaster planning for state
3 Pages(750 words)Essay
Categories of Computer Crime
Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files. The misuse of the computer may involve the falsification of computer signatures through
2 Pages(500 words)Essay
SCADA Worms (also called Stuxnet Worms) target, attack and destroy these SCADA systems. Since SCADA systems are implemented to manage industrial IT applications used
3 Pages(750 words)Essay
‘Cyberterrorism hinges on the widespread use of computers by individuals, private industry and corporations, the military, and the government and its agencies.’ (Ching, 2010) The main focus of the
2 Pages(500 words)Essay
Domestic and International Terrorism and Cyberterrorism
The internet has become a valuable tool that is relied on by almost every country in the world. It leads to the interconnection between different countries on various important issues. Moreover, the internet continues to play a valuable role in national and international space. It plays a role in the linkage of different networks of computers.
3 Pages(750 words)Essay
Let us find you another Essay on topic Cyberterrorism - A Threat Or A Hoax for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us