Preview

Cyber Terrorism

Good Essays
Open Document
Open Document
821 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Terrorism
Cyber terrorism

Author

Institution

Date

Cyber terrorism is a dreaded and unethical utilization of the internet to hack or gain access to computer systems without the owner’s authorization. This is done by either the internal or external stakeholders for the purpose of acquiring confidential information without the owner’s consent including inciting, fundraising for terror attacks, and promotion of racism (Council of Europe,2007).

The increase in technology would mean an increase in cyber terrorism thus the need for cyber security that involves people, procedures and systems which play an important role in controlling and operation of cyber security; however it’s the human selfish ambitions that makes conflicts to occur in the system leading to conflicts and the general cyber terrorism.

The key players who take part in cyber terrorism are both internal and external who work in protecting the system and those who attack the system respectively. The stakeholders have influenced cyber terrorism in both a negative and a positive way:-

Hackers.

As the main stakeholders in cyber terrorism, have played an important role whereby in a positive way they help in analyzing and providing consulting services to the experts to identify loopholes in a system by understanding the coding and protocols in cyberspace. Negatively, through selfish motives some hackers play the role of attacking the systems and gaining access to authorized information using either viruses or sperm software.

Cyber terrorist.

A cyber terrorist is an expert well informed and equipped with the necessary tools to gain control of especially the countries information systems like the defense infrastructure. These are external stakeholder that plays only a negative role in cyberspace and thus a top priority security threat in any countries setting.

System programmers.

These are individuals with expertise and high vast knowledge about a given system.They help in error corrections in both the



References: Limoncelli, T. A., Hogan, C. J., & Chalup, S. R. (2008). The practice of system and network administration. Upper Saddle River, N.J: Addison-Wesley. Council of Europe. (2007). Cyberterrorism: The use of the Internet for terrorist purposes. Strasbourg: Council of Europe Pub.

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Martin, G. (2010). Understanding Terrorism: Challenges, Perspective, and Issues Third Edition. In G. Martin, Understanding Terrorism: Challenges, Perspective, and Issues Third Edition (pp. 82-84). California: Sage Publication, Inc.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lone Wolf Terrorism

    • 8850 Words
    • 36 Pages

    Walker, C. (2006): Cyber terrorism; the legal principle and law in the U.K. Pg 625-665, Penn state law review no. 3, Vol. 110…

    • 8850 Words
    • 36 Pages
    Powerful Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Read the paragraph below taken from the text “Myth of Cyberterrorism” and analyse the content and organisation.…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Arguments Against Kaplan

    • 940 Words
    • 4 Pages

    Robert Kaplan makes a compelling argument in his book, “The Coming Anarchy,” that global environmental and social factors such as resource depletion, overpopulation, crime, and tribalism are the most pressing national security issues in the 21st century. He cites numerous examples of crime, war, and destitution in failing states of West Africa as well as protracted conflicts in the Balkans, and Central Asia. However, the environmental and social factors described by Kaplan are not security threats, per se, rather the fertile ground from which security threats arise. Resource depletion, overpopulation, tribalism, or combinations thereof are not sufficient conditions for security threats. Kaplan himself makes perhaps the best argument for this in his description of the Turkish culture and the people of a shanty town called Golden Mountain. Despite having many unfavorable…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    When I think of a cyber threat I am thinking of planes falling. Some new and deadly dieses like the T-virus. All the money in the USA will be worthless. I believe this will be a land of confusion, if we have a cyber-attack. Do we have a plan for a cyber terrorism?…

    • 422 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Terrorism has changed and developed across the world over time, much like the world has changed and developed over time. Advancements in technology, communications, military and transportation have also aided in the advancement of terrorist ability. Most countries, as well as the people residing in them, have dramatically advanced their capabilities in all areas, including terrorism, with each passing decade. The phrase ‘terrorism’ was originally coined in the late 1700s in reference to European governments attempting to gain a stronghold over the people and initiate their ideas (Roberts, 2002). However, this began to change in the late 1800s when non-governmental organizations began developing with a mission to overthrow their unsatisfactory…

    • 350 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Three cyber security experts say, “US policies toward defending against cyber-warfare need to take a different approach than the government has against other forms of attack.” It would be difficult for the US to have a fight in cyber-warfare as it is “difficult to identify attackers, especially when some nations appear to be sponsoring private attackers.” If the US were to follow other nations with using private assailants, other nations could possibly see this as unethical and even malicious. As a nation, the US is presented as the country some look up to. Its image has to stay clean, or it could cause uproar with other nations. One problem that not only the US but other countries face is that there is no strict definition of a cyber-attack. Martin Libicki, a senior management scientist specializing in cyber-security said, “One problem with a cyber-warfare policy is the lack of definition of what constitutes an act of cyber…

    • 794 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays