Nobody downloaded yet

Cyberterrorism - A Threat Or A Hoax - Essay Example

Comments (0) Cite this document
The purpose of the essay "Cyberterrorism - A Threat Or A Hoax" is to assess and explore the concerns prevalent on the topic of cyberterrorism and to identify from this information the most rational perspective on the path for better understanding the topic…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Cyberterrorism - A Threat Or A Hoax
Read TextPreview

Extract of sample
"Cyberterrorism - A Threat Or A Hoax"

Download file to see previous pages Where a cyber-terrorist acts with the intent of severely impacting the economy or civil morale of the country, a hacker merely causes nonessential or at the most costly damage. For every publication produced that argues cyber-terrorism is a major threat, there is another that comes out claiming it is a hoax. Many of these authors who hold this position argue it is a form of presidential propaganda. In his article, Cyberterrorism: There are many ways terrorists can kill you—computers aren’t one of them, Joshua Green argues that the Bush administration’s infatuation with preaching the dangers of cyberterrorism is one that has become a pattern since September 11th. None are more exemplary of exploiting the public’s misunderstanding of the term, along with their fears, than Homeland Security Director Tom Ridge, which Green proves with this quote by Ridge: Terrorists can sit at one computer connected to one network and can create worldwide havoc," warned Homeland Security Director Tom Ridge in a representative observation last April. "[They] don't necessarily need a bomb or explosives to cripple a sector of the economy, or shut down a power grid. (Green, 2002)" Green further points out that Ridge’s propaganda is not without merit considering that a survey of 725 cities conducted by the National League of Cities for the Anniversary of the 9/11 attacks showed that cyberterrorism ranked with biological and chemical weapons at the top of a list made by officials of the single most feared threats (2002)....
Green recognizes that all of these actions would be reasonable responses to an actual looming threat, but they fail to muster any sort of rationale considering that, as he states, there is no such thing as cyberterrorism--no instance of anyone ever having been killed by a terrorist (or anyone else) using a computer (2002). In his article Cyberterrorism: How Real Is the Threat? Gabriel Weimann acknowledges that the potential threat of cyberterrorism is the cause for its apparent alarm in society; but with not one single recorded instance of authentic cyberterrorism, one is left to wonder if there is really a threat (Weimann, 2004). Weimann identifies the public concerns over cyberterrorism as the most pinnacle form of trivial propaganda. He best relays this idea with the argument, Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term "cyberterrorism." The fear of random, violent victimization blends well with the distrust and outright fear of computer technology. He further points out that this unprecedented type of fear somewhat existed before 9/11, and it was identified through a number of U.S. military exercises which revealed many vulnerabilities in the American network. After 9/11 cyberterrorism was promoted to contribute to fear tactic propaganda of the president and it was enhanced by those who Weimann refers to as interested actors from the political, business, and security circles (2004). Despite all of this, he does not completely disregard cyberterrorism as just a propaganda scare. The Symantec Corporation, founded in 1982, is an international corporation known for selling security and information management computer software. For the companies 2003 security response titled Cyberterrorism? Sarah Gordon and Richard Ford assess all of the facts about cyberterrorism for the purpose of increasing common knowledge about prevention. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from
(Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 Words)
Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 Words.
“Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Is Global Warming a Hoax
...?Global warming, the theory of climate change has aroused intense controversy regarding the extent to which our activities affect global temperature and weather patterns. Although there a lot of people out there who are trying to keep their carbon emission to the minimum, skeptics believe that human induced global warming is insignificant and the evolution from fire to nuclear energy is a path of improved human health and welfare arising from efficient and effective access to energy. Whatever may be the argument, earth temperature is rising year after year. In this regard, my research aims to ultimately address the issue: is global warming a hoax and is it actually an exaggeration? Certain atmospheric gases such as carbon...
3 Pages(750 words)Research Paper
...extent to cyberterrorism. According to the Computer Emergency Response Team (CERT) Coordination Center, there were about 2,500 vulnerabilities detected in the nation's cyber system in 2001, and this number rose to 6,000 in 2005. In 2006, more than 7,200 vulnerabilities were found out. This exponential increase in cyber vulnerabilities of systems coupled with increasing cyberterrorism is leaving a critical part of the nation's security exposed to terrorist pursuits. Cyberterrorism: Cyberterrorism is he mingling of cyberspace with terrorism. It encompasses all unlawful threats and attacks against electronic equipment and data with an objective to...
8 Pages(2000 words)Essay
Assessment 2 - Cyberterrorism Research Essay
...The aim and objective of this research is to undertake an examination into the issue of cyberterrorism in order to answer the research question: havethe terrorists won the war on terror due to the draconian legal measures democratic countries have imposed on their citizens? This research also aims to investigate how the repercussions of such legislation can be moderated through a balance of the law coupled with other measures that can work in tandem with the law. Some of the measures recommended in this study include a more active role for intelligence, the application of Lessig’s framework of code in cyber-architecture, as well as the need for enhanced cooperation between nations to tackle terrorism. Since...
15 Pages(3750 words)Essay
Global Warming: A Hoax
...Global Warming: A Hoax. Global Warming constitutes one of the most contentious and divisive issues of contemporary times. While global warming per se, which is actually a negligible less than one degree Celsius, is generally acknowledged as a fact, the debate hinges on whether it is attributable to anthropogenic or natural causes. The alarmists who contend that everything, from floods and famines to the total annihilation of life on planet earth, is the result of climate change caused by human activity, are becoming increasingly strident. It is now considered politically and socially ‘correct’ to agitate against allegedly human-induced climate change. The voices of sanity and scientific proof are being ignored. Global...
4 Pages(1000 words)Essay
The Hoax in Wal-Mart
...Task: The Hoax in Wal-Mart Wal-Mart offers the cheapest prices for retail goods and has succeeded to be one of the most profitable companies in the world. However, Wal-Mart is actually deceiving Americans because what the company does is to kill small entrepreneurial retail stores. This retail stores could have contributed significantly to the American economy and acted as a source of income for the small entrepreneurs. Wal-Mart prides itself in being the most popular retail store in the globe. With over eight thousand stores in fifteen different countries, it leaves no space for competition thus monopolizing its operation. It employs over 2 million people, qualifying as the largest job provider in the private sector in...
3 Pages(750 words)Essay
Information Warfare & Cyberterrorism
...Information Warfare & Cyberterrorism affiliation Information Warfare & Cyberterrorism Information warfare is a term usedto describe attacks made on the information technology of a person known as the victim. In cyberterrorism, most aggressors target the information content of the victim. However, in some cases the aggressor targets to paralyze the digital operations of the victim. With rising technology levels, cases of cyberterrorism have increased and they have been developed to paralyze even the most complicated digital systems. The situation worsens when the information warfare becomes a rivalry between two nations. Over the years, nations have emerged claiming...
3 Pages(750 words)Case Study
Bioterroist threat
...Bioterrorist Threat Bioterrorism is the deliberate application of disease causing agents such as bacteria, virus, fungus, or toxin on an enemy population. Application of biological weapon dates back to the ancient civilizations, when biological agents were used to destroy enemy cities. Unlike conventional weapons, biological weapons do not differentiate between enemy and friendly forces (Paquette, 2006). However, advancements in the field have led to the creation of more sophisticated agents that can be applied efficiently. This essay reviews factors or characteristics that make bacteria, viruses, and fungi effective agents of bioterrorism. Terrorists value biological weapons due to their ability to cause mass panic...
2 Pages(500 words)Essay
Threat Analysis feel more secure now. Furthermore, now U.S. intelligence analysts appreciate that the adversary is not Islam; but a distortion of Islam is the foe. In fact, U.S. adversaries go beyond al-Qaida (a non-state actor) to accommodate the radical ideological factions, motivated to a certain extent by al Qaeda3; and the threat of Islamist extremism as well as terrorism will continue, but it will diminish significantly in future.2 Bibliography 1. International Security Forum, Anja H. Ebnöther, Ernst M. Felberbauer, and Theodor H. Winkler. Proceedings of the Conference. Bern [u.a.]: Peter Lang, 2005. 2. Chaliand, Gérard, and Arnaud Blin. The History of Terrorism: From Antiquity to Al Qaeda. Berkeley: University of...
2 Pages(500 words)Essay
...THREAT ANALYSIS Capability Assessment (Skills, Resources and Terrorist Groups) Significantly, terrorism through nuclear attacks entails the explosion of the nuclear bombs that contain fissile material and use of nuclear weapons; nonetheless, it might not necessary be through the explosives but sometimes, terrorists infiltrate and incapacitate a nuclear facility, though it is very rare. For instance, in 2012, terrorists and saboteurs in Iran caused power cuts to disrupt the country’s nuclear program in two plants. However, most of the terrorists and terrorist groups lack the ‘ability to engage in nuclear weapons because they lack the knowledge and ability despite the willingness and intent’ (Bunn 2009, 114). Firstly, the...
3 Pages(750 words)Essay
Organized Threat
...Organized Threat What is smuggling? What is smuggled and why is it smuggled? Who benefits from smuggling and who is hurt by smuggling and how? The notion smuggling is referred to the act of importing or exporting of some objects from one country to another that is considered to be illegal (Herman, 2014). There are a huge number of different ways to perform this process secretly. Objects that are smuggled may be of a wide difference, as all goods that can be sold may become the objects of smuggling. Still, the most popular commodities are drugs and weapon (Herman, 2014). In addition, that human smuggling is also highly popular. The process of smuggling provides an influence on the economy of the country and people’s...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Cyberterrorism - A Threat Or A Hoax for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us