Preview

Cyber war Vs Cyber terrorism

Good Essays
Open Document
Open Document
3714 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber war Vs Cyber terrorism
SCHOOL OF BUSINESS, ECONOMICS AND MANAGEMENT

PROGRAMME : BSc Accounting COURSE NAME : Management Information Systems (BBA 230) STUDENT NUMBER : AFIN 10205 STUDENT NAME : Gary Sinyangwe ASSIGNMENT : Two (1) LECTURER : Mr. Henry Sinkala DUE DATE : 22 April 2014

UNILUS 2014
Introduction

In this time and era, we have witnessed the emergence of electronic resources as the most important development of the modern day communication system. Technologies such as cellular phones, home computers, the internet and websites have added another dimension to the way we live our lives today. This presentation seeks to address and analyse the negative and positive aspects in view of the introduction of computers and telecommunications techniques as follows: Firstly, it raises awareness with regard to the new age of crimes, termed as cyber crimes. The paper focuses, in particular, on the difference between the two common types of cyber crimes, cyber war and cyber terrorism. Secondly, the paper examines the limitations and impact of having graduates through e-learning. Thirdly and lastly, the paper discusses on whether computer practitioners should be required to have a practicing license as it is with other professionals such as doctors, lawyers and teachers.

1. (a) Difference Between Cyber War and Cyber Terrorism
The end result of both cyber war and cyber terrorism is the same, to damage critical infrastructures and computer systems. The major difference being that cyber

You May Also Find These Documents Helpful

  • Satisfactory Essays

    HaleIS3350Week08

    • 149 Words
    • 1 Page

    This class session explores cyberspace legal issues and relevant laws. It also presents principles of e-contract and cybercrime. It discusses various IT methods and strategies to handle cyberspace legal requirements.…

    • 149 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Pervasive influence of information technology with penetration of computers and communication in all aspect of the workplace, it is important for a organization to keep up with the advancement of technology in the criminal justice and security agency. Technology is playing a major role in how criminals for committing crimes, which is why there has been a increase in cyber crimes because a criminal…

    • 750 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The War on Terror vs. Wwi

    • 996 Words
    • 4 Pages

    The War on Terror can readily be compared to WWI. The following analysis will compare and contrast these two important historical occurrences. It will also examine just a few of the many consequences of both.…

    • 996 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Web misrepresentation will be the greatest PC wrongdoing test for the nearby law requirement, with the greatest number of casualties and the most noteworthy fiscal misfortune. There are projections of further development in the utilization of cutting edge data innovation to perpetrate wrongdoings and stretching out into new fields of monetary and social life. The web may be utilized for coercing. Consideration ought to be drawn on the utilization of the web to circulate terrorist content, for instance through Xenophobia and Nazism. Another development industry for computerized wrongdoing is the false utilization of stolen online information. The stress confronted by numerous individuals is with respect to the developing exchange related digital…

    • 184 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    WHILE-READING: Read the text entitled “The Myth of Cyber Terrorism” by Joshua Green and fill in the table below with the arguments for and against the idea that cyber terrorism is a real threat or not.…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Terrorism can always take different forms that are either domestic or foreign. Domestic terrorism is a form of terror that is caused by the civilians within his or her country. On the other hand foreign terrorism is mainly caused by political difference, hate for some particular religion, economic superiority and fights over mineral among others. This form of terrorism always occurs between countries or nations.…

    • 1200 Words
    • 5 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Better Essays

    A definition of “terrorism” refers to the use of force or violence against persons or property for the purpose of intimidation, coercion (U.S. Department of Health & Human Services, 2011); Terrorists often use violence and threats to create fear among the public. Terrorism is a criminal act such as airline hijackings, bomb scares, weapons of mass destruction that influences an audience beyond the immediate victim. The strategy of terrorists is to commit acts of violence that draws the attention of the local populace, the government, and the world to their cause. (International Terrorism and Security Research , n.d.)…

    • 1122 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Research Paper Outline

    • 423 Words
    • 2 Pages

    References: Cybercrime. (2013). In C. Bates et al. (Eds.), Global social issues: An encyclopedia. London, United Kingdom: Routledge. Retrieved from http://ezproxy.apus.edu/login?url=http://search.credoreference.com.ezproxy2.apus.edu/content/entry/sharpesi/cybercrime/0…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Terrorism has been going on in the United States for many years now. Terrorism is defined differently by many people. There are two different types of terrorism Domestic and International. Which of the two is the most dangerous for the American Public?…

    • 589 Words
    • 3 Pages
    Good Essays
  • Better Essays

    From the extensive evolution of computers to the introduction and mass popularity of the Internet. From bombs to missiles, from bases to shuttles. The world of technology is seemingly endless. In modern times computers and the Internet possess tremendous power and have a wide range of capabilities for better or for worse. Terrorism is for the worse and yet unfortunately, the evolution of technology has advanced the means to commit acts of terrorism, both actual terrorism but also cyber terrorism.T hink about the seemingly endless depth of technology, the complex features that go into making a bomb mechanism, you can only come to the solid conclusion that yes, technology has had a worldwide effect on the act of terrorism.…

    • 2408 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Some individuals conduct research and there are those who meet at conferences to discuss the above. According to Passas, who attended a summit in which it was noted that legalities should be handled on a national level due to the sophistication of cyber-crimes. Computer based crimes are increasing, which calls for the needed advancement of provisions that establish the legal ramification against those who commit crimes against individual’s personal information by means of computers. Cases crossing numerous jurisdictions should be prosecutor friendly and handled in an expeditious manner. Passas further noted that in regards to financial fraud, security measures should be improved when individuals are banking on line. May student participate in on-line banking and shopping as this is more modern and convenient for their life…

    • 1645 Words
    • 7 Pages
    Powerful Essays