Verified Document

Cyber Terrorism Is The Process Of Using Essay

Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across the world Verton, 2003. Therefore as a threat, cyber terrorism involves terrorists using information technology in order to further their evil causes. The present technological world offers terrorists the opportunity to use information technology to make electronic threats through hackings, introduction of viruses defacing websites and Denial-of-service attacks.

Evolution of cyber terrorism

The evolution of cyber terrorism has basically grown in tandem with the developments realized in information technology. The initial threats began in the 1980s and continue as terrorists gained much knowledge in the field. However, many developments in cyber terrorism were realized in the last decade as the fight against the vice led to many...

Cyber terrorism works on the premise that the present society is becoming more depended on information technology networks and therefore an attack on such networks can cripple human activities. Therefore the terrorists use complex processes to interfere with the workings of information infrastructures with ideological or political intentions. The present cyber-terrorism threat is mostly geared towards the United States which has a very technologically advanced society Elmusharaf, 2012.
The primary attack process involves bringing down the internet in order to cripple the flow of information across the world.

Forms of cyber terrorism

Normally cyber terrorism can take several forms which basically involve the use of information technology. It can be in the form of data theft which involves getting very secret and valuable government information and using such information for malicious purposes. Another form of cyber terrorism presently employed involves the demolition of e-government bases which subsequently cripples critical sectors of the government. Cyber terrorists may also use Distributed denial of services attacks…

Sources used in this document:
References

Alexander, Y., & Swetnam, M.S. (2001). Cyber terrorism and information warfare: threats and responses. Ardsley, NY: Transnational.

Elmusharaf, M.M. n. d. (2012). Cyber Terrorism: The new kind of Terrorism. Computer Crime Research Center - Daily news about computer crime, internet fraud and cyber terrorism. Retrieved May 29, 2012, from http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism

Taylor, R.W. (2006). Digital crime and digital terrorism. Upper Saddle River, N.J: Pearson/Prentice Hall.

Verton, D. (2003). Black Ice: the Invisible Threat of Cyber-Terrorism. New York: McGraw-Hill.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Terrorism
Words: 4455 Length: 13 Document Type: Research Paper

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

Cyber Terrorism Cyber Crime Cyber Espionage and Cyber Warfare
Words: 1652 Length: 5 Document Type: Research Paper

Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating

Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Since
Words: 2784 Length: 10 Document Type: Research Paper

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Terrorist Groups Use of Cloud Technology
Words: 4606 Length: 15 Document Type: Dissertation or Thesis complete

Terrorist Group's Use Of Cloud Technology After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of

Sociology of Crime Primarily Using
Words: 3045 Length: 11 Document Type: Term Paper

FIGHT AGAINST TERRORISM A similar crime was witnessed on September 11, 2001. The United States of America saw the sad death of thousands of innocent people just because some people wanted to acquire their goals. This followed an economic crisis and many innocent civilians faced unnecessary loss of jobs. The political environment has ever since been changing constantly and the United States went into war against Afghanistan. After Afghanistan there was

Information Security Model and Cyber Terrorism
Words: 2900 Length: 10 Document Type: Capstone Project

goals of this study are to reveal some of the common and prevailing cyber security threats. Here we plan to explore the risk that is most difficult to defend: social engineering. We seek answers to the human elements and characteristics that contribute to the frauds and how they themselves unwittingly give out information that eventually leads to difficult situations. There are many ways in which the attackers 'phish' their

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now