Preview

Cyberterrorism

Best Essays
Open Document
Open Document
3167 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyberterrorism
Nick Jackson
Cyberterrorism: Weapons of Mass Annoyance
11/8/2012

Outline:

I. Introduction a. Define Cyberterrorism II. Types of Cyber Attacks b. Identify and give examples of: i. Trojan horse ii. Virus iii. Worm iv. Phishing v. Denial of Service (DoS) c. Three Levels of Cyber Capability vi. Simple-Unstructured vii. Advanced-Structured viii. Complex-Coordinated III. Potential Threats of Cyberterrorism d. Dams Used for Water Storage of Power Generation e. Reliance on Digital ix. Increased DoS Attacks IV. Conclusion V. Works Cited

Introduction

The term cyberterrorism was created in the mid 90’s by combining cyberspace and terrorism. The term has been widely accepted after being embraced by the United State Intelligence Community. Janczewski and Colarik describe cyberterrorism as “Premeditated, politically motivated attacks by subnational groups, clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combat targets” (Janczewski & Colarik, 2005, p. 43).
Cyberterrorism is a form of terrorism that uses any form of connected source to engage in attacks of information systems, incitement to violence, theft of data, and planning of terrorist attacks (Britz, 2011, p. 197). As an introduction into the topic, the following definition is key to understanding the definition:

“Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coercer a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate



Cited: Baranetsky, V. (2009, November 5). What is Cyberterrorism. Harvard Law Record . Blau, J. (2004, November 29). The Battle Against Cyberterror. Retrieved November 2012, from Network World: http://www.networkworld.com/supp/2004/cybercrime/112904terror.html Britz, M Cole, S., & Glasser, S. (2009). The Internet Helps Promote Terrorism. In L. Gerdes (Ed.), Cyber Crime (pp. 95-103). Farmington Hills, MI, US: Greenhaven Press. Denning, D. (2000, May 23). Cyberterrorism. georgetown.edu. Retrieved October 28, 2012, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html Denning, D Gohring, N. (2009). Vigilantism Motiveates Some to Violate Cyber Laws. In L. Gerdes (Ed.), Cyber Crime (pp. 86-90). Farmington Hills, MI: Greenhaven Press. Goldman, D. (2012, September 28). Major Banks Hit With Biggest Cyberattack in History. CNN Money . Gross, G. (2003, November 5). ComputerWorld. Retrieved October 29, 2012, from computerworld.com: http://www.computerworld.com/s/article/86857/Cyberterrorist_attack_would_be_more_sophisticated_than_past_worms_expert_says_ Janczewski, L., & Colarik, A Kuehl, D. (2012, November). Cyber Threats. Class Lecture . Lewis, J. (2002, December). Assessing the Risks of Cyber Terrorism, Cyber War and Othe Cyber Threats. Center for Strategic & International Studies , p. 12. Washkuch, F. (2009). What Factors Contribute to Cyber Crime? In L. Gerdes (Ed.), Cyber Crime (pp. 79-85). Farmington Hills, MI, US: Greenhaven Press.

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Better Essays

    References: Combs, C. (2011). Terrorism in the twenty-first century (7th ed.). Boston, MA: Pearson Publishing…

    • 1017 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    Final Project

    • 5430 Words
    • 22 Pages

    Is it unlawful for an agency to require all public school students to undergo a search of their clothes, backpacks, lockers, and desks each morning?…

    • 5430 Words
    • 22 Pages
    Powerful Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Lone Wolf Terrorism

    • 8850 Words
    • 36 Pages

    Walker, C. (2006): Cyber terrorism; the legal principle and law in the U.K. Pg 625-665, Penn state law review no. 3, Vol. 110…

    • 8850 Words
    • 36 Pages
    Powerful Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Welcome to the course

    • 3699 Words
    • 15 Pages

    This course will analyze the history and many dimensions of national security before and after 9/11. It will also provide a comprehensive and interdisciplinary critique of the concepts of threats and responses and explore the nature of various threats. The course will compare and contrast how to conduct threat assessment using the concept of threats using the included practical risk assessment tool for emergency managers. It will also look at assessing and defending against cyber-terrorism and cyber-warfare to include how information can be used as a weapon. This course is a prerequisite to HSM430, Intelligence Gathering and Crime Analysis.…

    • 3699 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Good Essays

    After a person with DID is hospitalized or reports to therapy, clinicians or therapist’s needs to work on assessment/diagnosis and eventually treatment. The type of treatment that used for DID differs from one therapist to another, however, the goals of treatment remains the same, which is integration of all alternate personalities and strengthening the host character. Research has shown that there is a pattern in the way in which clinicians or professionals approaches treatment of DID. A model that is consistent with this pattern is the Phase Orientation Treatment Approach, which has three treatment stages. This approach deals with trauma related disorders, including DID.…

    • 1466 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    There are many different theories when it comes to digital crime. Some of the theories are the choice theory, the deterrence theory, the psychological theory, the strain theory and the routine activities theory. In this paper I will discuss the one theory to be the cause of digital crime, why the theory chosen could be recognized as the most relevant in terms of being the cause of digital crime and two examples of non-digital crime that could be considered caused by this theory.…

    • 704 Words
    • 3 Pages
    Good Essays
  • Best Essays

    When can an act of violence, perpetrated by an individual or group properly be termed “terrorism”? This is a question passed over without due attention in everyday journalism. Jennifer Jane Hocking in her wok, noted, “Terrorism is a social construction, and once an action have been given that label, it becomes difficult to treat it in a value-neutral manner”. According to her, “Replete with implied moral opprobrium, a socially assigned value and meaning, an imputation of illegitimacy and outrage, ‘terrorism’ can never fit apparently value-neutral typologies much used in the social sciences… (Hockings 86). An apparent definition of terrorism that has been deemed serviceable for most purposes is the definition of the United Nations General Assembly:…

    • 2941 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    Answer: because cyberwarfare is more complex than conventional warfare. Cyberwarfare is Internet based conflict that involves political motivated attacks on information systems. Cyberwarfare attacks are disabling financial systems and communication networks. This is a serious problem because the potential targets for these attacks are military power grids but this cyberwarfare is targeting MNC, technology firms, and news organizations. This causes Obama (who is the official first cyberwarfare president) to not only worry about who is attacking his military but who is attacking and targeting his country.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays

Related Topics