Cyber Terrorism Essay

1201 words - 5 pages

Cyber Terrorism


Thus far we have scratched the surface of the ever-perplexing problem of terrorism. As it has evolved those in the position of countering it have also gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber-terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the implications of a cyber attack could be just as harmful.

Traditionally terrorist acts target a specific locale and are executed precisely in this spot. This has been a limit of the damage inflicted upon those the perpetrator hopes to influence and the general public. This playing field has grown enormously to what could be conceived as boundless proportions. "Individuals or groups can now use Cyberspace to threaten International governments, or terrorize the citizens of a country" (cybercrimes.net). The creation of a boundless area of attack makes it that much harder to determine where an act will be taken.

Since it is easy to figure out that for cyber-terrorism to occur computers need to be accessible to the groups or individuals committing acts, why not restrict who can use computers? This has actually been considered but would be rather difficult to do in today's world. "Increasingly, America depends on computers'? (Cyberterrorism~ Fact or Fantasy?). We are not alone in this dependency, more and more of global business and personal activities are conducted via the Internet. This in itself indicates a major difference between conventional terrorism and cyber-terrorism. The former can be regulated to the extent that not everyone easily has access to the necessary resources. On the contrary, the only tools needed for cyber-terror are the proper knowledge and a powerful computer.

One of the key elements of terrorism is the creation of mass fear. This takes little effort with the use of computers. So many people are already intimidated by the efficacies of computers that the simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As soon as the word is out that a virus has been detected people take all possible actions to ensure that their files and data are protected. Taking this action to a higher level, if someone were to put a virus through a bank mainframe or something even bigger than that, then the general public would be afraid to make transactions over the computer and would return to doing business in person. The concern related to cyber-terrorism is warranted although we have been lucky thus far not to have experienced firsthand anything devastating.

In summary, cyber-terrorism opens opportunities for terrorists by expanding the arena and through the mass dependency on computers. So...

Find Another Essay On Cyber Terrorism

Should the US Government be scared of Cyber Terrorism?

931 words - 4 pages Should the U.S. Government be Scared of Cyber Terrorism?In today's society, people are always trying to improve technology, but in doing so, are they creating something that can be used to create mass destruction for the United States? Everyday computers get faster, new programs are written, or some scientist finds a way to make a job be done quicker. The United States is finding out that being a World Power and other countries are getting

Cyber Security Essay

1295 words - 5 pages . Cyber terrorism is one of the major treat to all sensitive information in cyberspace. Cyber terrorism can be defined as the use of computers and technology to cause server disruption or widespread fear in society. Through cyber terrorism data that is sensitive to major corporation and government alike are in danger of being hacked then used against them. Cyber security helps defend against cyber-attacks by tracking the attackers back to the source

CyberCrime and Terrorism

1058 words - 4 pages Throughout the years, there has been a steady increase in the amount of cyber crime committed. Technology is a constantly changing entity, constantly evolving, always progressing. Naturally this can make it hard to stay on top of things. In turn, law enforcement runs into various issues regarding cyber crime and cyber terrorism. Cyber crime and terrorism is so complex of a crime that it can be hard to break down the barriers that can lead to

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages . The FBI, however, has a number of technical programs that are addressing the issue of cyber crime. For example, there is the Internet Crime Complaint Center (IC3), the Cyber Division in Washington, DC, a computer forensics lab in Washington, DC, and most field offices have squads called Cyber Action Teams (CATS) (www.cert.org/tech_tips/FBI_investigates_crime.html, 2004). While most of these organizations investigations are aimed at terrorism and

cyber jihad

573 words - 3 pages UIntroduction Today, internet become a modern arena and is used by terrorists for fund raising distribute messages, and recruit new members. This groups known as Cyber Jihadists. Unlike cyber terrorism use of computers to attack networks and create chaos. In other hand, cyber jihad is information presented on behalf terrorist organization and it’s seemingly less threating than cyber terrorism and can be used for many activities that directly

Hacking

1665 words - 7 pages States. This new technology is being called Cyber Terrorism, and is used by a variety of people. Many radical Rebel groups, and other terrorist groups are using the World Wide Web to preach propaganda, and some U.S. officials believe they are also sending encrypted e-mails detailing when there next attack will be. The Columbian Rebel Group ELN is one of the many terrorist groups known to have a web page on the Internet. The ELN is known mainly

Stop Cyber Warfare Before It Happens

2884 words - 12 pages attack is. Cyber attacks, cyber terrorism, and cyber warfare each have a similar definition. It refers to generating mayhem by way of disrupting computer systems; this attack aims at unsettling governments (“Information”). However, knowing what a cyber attack is does not shed light on the extreme danger of one. Every day, thousands of United States civilians exploit structures reliant on computer systems. From taking a shower to turning on a light

Security Breaches in Comunication and Data Systems

4082 words - 17 pages form of terrorism that uses infectious toxins such as viruses and biological agents, which may be utilized as weapons against humans, animals, or plants. Anthrax is a form of bioterrorism, that the United States had incidents with in 2001. Cybercrimes are crimes that are committed over computers and the internet. Cyber terrorist do not keep information on the internet for prolonged periods of time for the simple fact that they do not want to be

The Role of Federal Agencies in Fighting Digital Crime

781 words - 3 pages enhance the integrity of forensic analysis of digital evidence. In some cases, these steps may increase the time it takes to analyze evidence and add to backlogs and delays. (GAO High Risk & Other Major Government Challenges Balancing Fighting Crime Versus Terrorism) State and local law enforcement agencies face several challenges including the lack of resources, expertise, training, and funding to solve cyber crime. Of these problems, are the

HOMELAND SECURITY CHAPTER FOUR SUMMARY AND ESSAY.

1429 words - 6 pages tasted the horrible affects of chemical warfare, and chemical warfare is still a danger. There are many forms of chemical weapons, and many forms of delivery. Ricin is a dangerous poison found in beans, and has a variety of dangers. Nerve agents attack the central nervous system of the body, and are easily delivered. IEDs have caused massive casualties in Iraq and Afghanistan, and are simple to construct. Cyber terrorism can be devastating to

Definition of cybercrime

1503 words - 6 pages is limitless. The only limit that can be put on these types of criminals is the limit they set in their own minds. Therefore, even though there is a long list of crimes they can commit, the most common types of cybercrimes that they will commit are: Stalking and/or Harassment, Phishing and Smishing, Hacking and Cyber terrorism just to name a few. We would think that stalking and/or harassment could only be done in person, well that would be

Similar Essays

Cyber Terrorism Essay

2138 words - 9 pages For my term paper, I researched on Cyber Terrorism. I believe that Cyber Terrorism is a big problem in our society and may even be a worldwide problem for all humanity today. I want to do my term paper on Cyber Terrorism because I had some personal experience with this sort of terrorism. About a two years ago, I encountered a Hacker on America Online. I opened an unknown message in my mailbox that was titled “Free Nude Teens”. Then about a

Cyber Terrorism Essay

1619 words - 6 pages called Cyber Terrorism, and is used by a variety of people. Many radical rebel groups, and other terrorist groups are using the World Wide Web to preach propaganda, and some U.S. officials believe they are also sending encrypted e-mails detailing when their next attack will be.The Columbian Rebel Group ELN is one of the many terrorist groups known to have a web page on the Internet. The ELN is known mainly for blowing up oilrigs inSouth America, and

The Dangers Of Cyber Terrorism Essay

1529 words - 6 pages , and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the more dangerous of the 3, is defined as the use of digital equipment to bring down a country by tapping into its computer based programs and dismantling its infrastructure which includes but not limited to: banking networks, air traffic control systems, gas and oil production, transportation, and emergency services that all rely on computer networks to function (Thio, 2010

From Hacking To Cyber Terrorism Essay

4086 words - 16 pages From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time