Author
Institution
Date
Cyber terrorism is a dreaded and unethical utilization of the internet to hack or gain access to computer systems without the owner’s authorization. This is done by either the internal or external stakeholders for the purpose of acquiring confidential information without the owner’s consent including inciting, fundraising for terror attacks, and promotion of racism (Council of Europe,2007).
The increase in technology would mean an increase in cyber terrorism thus the need for cyber security that involves people, procedures and systems which play an important role in controlling and operation of cyber security; however it’s the human selfish ambitions that makes conflicts to occur in the system leading to conflicts and the general cyber terrorism.
The key players who take part in cyber terrorism are both internal and external who work in protecting the system and those who attack the system respectively. The stakeholders have influenced cyber terrorism in both a negative and a positive way:-
Hackers.
As the main stakeholders in cyber terrorism, have played an important role whereby in a positive way they help in analyzing and providing consulting services to the experts to identify loopholes in a system by understanding the coding and protocols in cyberspace. Negatively, through selfish motives some hackers play the role of attacking the systems and gaining access to authorized information using either viruses or sperm software.
Cyber terrorist.
A cyber terrorist is an expert well informed and equipped with the necessary tools to gain control of especially the countries information systems like the defense infrastructure. These are external stakeholder that plays only a negative role in cyberspace and thus a top priority security threat in any countries setting.
System programmers.
These are individuals with expertise and high vast knowledge about a given system.They help in error corrections in both the
References: Limoncelli, T. A., Hogan, C. J., & Chalup, S. R. (2008). The practice of system and network administration. Upper Saddle River, N.J: Addison-Wesley. Council of Europe. (2007). Cyberterrorism: The use of the Internet for terrorist purposes. Strasbourg: Council of Europe Pub.