Verified Document

Computer Terrorism According To Weimann, Term Paper

Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism. Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth, cyberterror can be launched and managed remotely and fifth, computer terrorism can garner instant and widespread media attention. Cyberterrorism is not only in the province of international terrorist organizations but may also be used by fanatical religious groups or even by disgruntled employess. Using computer terrorism can also become an adjunct to traditional forms of terror like bombs.

The National Security Agency (NSA) has investigated vulnerabilities...

Governmental organizations, energy corporations, transportation and communications infrastructures, and law enforcement departments have also been stepping up efforts to prevent acts of cyberterrorism, spending large amounts of money to do so. The larger the system, the more potential vulnerabilities it may have. Weimann admits that acts of cyberterror may increase in the future but that for now cyberterrorism is simply a "sexy" idea. Most large-scale it systems are closed and would require an insider or disgruntled employee to take part in the attack. Weimann's report puts computer terrorism into perspective, dispelling myths and exposing realities.
References

Weimann, G. (2004). Cyberterrorism: How Real Is the Threat? United States Institute of Peace. Retrieved April 17, 2007 at http://www.usip.org/pubs/specialreports/sr119.html

Sources used in this document:
References

Weimann, G. (2004). Cyberterrorism: How Real Is the Threat? United States Institute of Peace. Retrieved April 17, 2007 at http://www.usip.org/pubs/specialreports/sr119.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorism and the Internet Modern
Words: 2030 Length: 7 Document Type: Term Paper

(Ulph, 2006) The document is remarkable for a couple of reasons, which more widely emphasizes on the importance of the internet for the jihadi terrorists. The first one is the component of collective initiative that the writer promotes; emphasizing the pace of communication and the prospective strength that spread jihadi sympathizers throughout the world could concentrate on a single project. Second relates to the competence for data storing that the

Computer Networks and Terrorism
Words: 2546 Length: 8 Document Type: Research Paper

Cyber Terrorism: The Greatest Risk in the U.S. Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the

Cyber Terrorism
Words: 4455 Length: 13 Document Type: Research Paper

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now