Preview

The Fundamental Factors Contributing to Economic Growth

Powerful Essays
Open Document
Open Document
2129 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Fundamental Factors Contributing to Economic Growth
Statement of the Problem Has cyber terrorism become a bigger concern to the government since the 9/11 attacks and the war on terrorism? When it comes to terrorism, people often think I is only restricted to physical harm. It is because of this oblivion that cyber terrorism is on the rise. According to the U.S. Federal Bureau of Investigation, cyber terrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents" (SearchSecurity.com, 2007). Agencies want to know where will these attacks strike next and who will be a target? Unlike a nuisance virus or computer attack, which results in a denial of service, cyber terrorist attacks are designed to cause physical violence or extreme financial harm (SearchSecurity.com, 2007). According to the U.S. Commission of Critical Infrastructure Protection, possible cyber terrorist targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. (SearchSecurity.com, 2007). Figure 1 is the most recent areas that see the highest amount of these cyber attacks (Breach, 2009). [pic] http://www.breach.com/resources/whitepapers/downloads/WP_WebHackingIncidents_2008.pdf
Besides the cultures in countries being targets for these attacks, the industry sees a large amount of these attacks as well (See figure below). It is because of these trends, that cyber terrorism is a growing concern. [pic] http://www.breach.com/resources/whitepapers/downloads/WP_WebHackingIncidents_2008.pdf Science behind the Problem Since cyber terrorism, is internet based, it is difficult to determine one specific form of attack that hackers will use. Terrorism is shown as a threat of violence, maintenance of a condition of constant fear with the purpose of achievement of certain political or other purposes, compulsion



References: Barnett, R. Zone-H Defacement Statistics Report for Q1 2010 (2010) retrieved on November 10, 2010 from http://tacticalwebappsec.blogspot.com/2010/06/zone-h-defacement-statistics-report-for.html. Breach Security Annual Report (2009) retrieved November 10, 2010 from http://www.breach.com/resources/whitepapers/downloads/WP_WebHackingIncidents_2008.pdf Coleman, K Era of cyberterrorism may be a step closer. (2010). South China Morning Post,12.  Retrieved October 13, 2010, from ProQuest Newsstand (Document ID: 2149115441). Golubev, V. Cyberterrorism as the new form of terrorism (2004) Retrieved October 13, 2010 from Martínez-Cabrera, A. Cybercrime costs firms $3.8 million yearly (2010) Retrieved October 13, 2010 from http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2010/07/26/BUT21EK1EQ.DTL. SearchSecurity.com definitions “cyber terrorism” (2007) Retrieved on October 13, 2010 from http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci771061,00.html. Sizemore, E. Cyber Terrorism: The Past, the Present, and the Future (2007) retrieved November 10, 2010 from http://www.associatedcontent.com/article/177180/cyber_terrorism_the_past_the_present_pg5.html?cat=37.

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    References: Combs, C. (2011). Terrorism in the twenty-first century (7th ed.). Boston, MA: Pearson Publishing…

    • 1017 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Economic Growth

    • 516 Words
    • 3 Pages

    1. Is it proper to multiply the average order size, $42.33, by the number of addresses (1,300,000) in the target mailing?…

    • 516 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    “We are now faced with a combination of new and traditional actors, a widened set of motivations and tactics, organizational structures and principles, as well as a wider range of threats along the technological spectrum, especially with the increased potential for the terrorists use of weapons of mass destruction. Counter terrorism must deal with a wider range of threats…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Cybersecurity Trends

    • 530 Words
    • 3 Pages

    Every year, millions of viruses are released through the Internet. The FBI reports that there are a variety of cyber-threats, such as identify theft, Internet fraud and cyber-crimes related crimes like terrorism.…

    • 530 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The FBI has identified the most significant cyber threats to our nation as those with high intent and high capability to inflict damage or death in the U.S., to illicitly acquire assets, or to illegally obtain sensitive or classified U.S. military, intelligence, or economic information.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mandatory uniform policy's measures and emphasize the benefits of students on specific behavioral and academic outcomes. The arguments for the issue are just as strong as those against the issue. There are two main points surrounding school uniforms: performance and school and reduction of violence due to uniformity.…

    • 1446 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    Americans are becoming more and more codependent on technology. The vast majority of homes in the United States have at least one home personal computer (PC) that is connected to the internet. Americans have gotten accustom to being able to access the internet from their homes. Banking, social media, video teleconferencing and business ventures are all examples of how the internet is being used. The availability of the internet and computers in homes have simplified lives in the United States, however this allows cyber-terrorist to have direct access to the most personal of information. Much like the attacks that took place on September 11th the average American is completely unaware of the vulnerabilities that lye waiting around every corner of cyberspace. Cyber-terrorism not only affects individuals, it can also affect the entire nation. The United States critical infrastructures are becoming more dependent on computer networks for there operations. If security is not stepped up terrorist may be able to disrupt or shut down critical support systems. Americans and American companies must educate themselves on the vulnerabilities that cyber-terrorism presents and begin to work toward securing our networks in the same manner as we do our borders.…

    • 2330 Words
    • 10 Pages
    Powerful Essays