This website uses cookies to ensure you have the best experience. Learn more

Cyber Terrorism Essay

1201 words - 5 pages

Cyber Terrorism


Thus far we have scratched the surface of the ever-perplexing problem of terrorism. As it has evolved those in the position of countering it have also gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber-terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb? I will argue that the implications of a cyber attack could be just as harmful.

Traditionally terrorist acts target a specific locale and are executed precisely in this spot. This has been a limit of the damage inflicted upon those the perpetrator hopes to influence and the general public. This playing field has grown enormously to what could be conceived as boundless proportions. "Individuals or groups can now use Cyberspace to threaten International governments, or terrorize the citizens of a country" (cybercrimes.net). The creation of a boundless area of attack makes it that much harder to determine where an act will be taken.

Since it is easy to figure out that for cyber-terrorism to occur computers need to be accessible to the groups or individuals committing acts, why not restrict who can use computers? This has actually been considered but would be rather difficult to do in today's world. "Increasingly, America depends on computers'? (Cyberterrorism~ Fact or Fantasy?). We are not alone in this dependency, more and more of global business and personal activities are conducted via the Internet. This in itself indicates a major difference between conventional terrorism and cyber-terrorism. The former can be regulated to the extent that not everyone easily has access to the necessary resources. On the contrary, the only tools needed for cyber-terror are the proper knowledge and a powerful computer.

One of the key elements of terrorism is the creation of mass fear. This takes little effort with the use of computers. So many people are already intimidated by the efficacies of computers that the simplest cyber act could infuse a massive scare. Take for example the spreading of a virus. As soon as the word is out that a virus has been detected people take all possible actions to ensure that their files and data are protected. Taking this action to a higher level, if someone were to put a virus through a bank mainframe or something even bigger than that, then the general public would be afraid to make transactions over the computer and would return to doing business in person. The concern related to cyber-terrorism is warranted although we have been lucky thus far not to have experienced firsthand anything devastating.

In summary, cyber-terrorism opens opportunities for terrorists by expanding the arena and through the mass dependency on computers. So...

Find Another Essay On Cyber Terrorism

Cyber Warfare: Defending Against a New Form of Terrorism

972 words - 4 pages Introduction Cyber warfare is a new type of terrorism is the United States. The United States National Security Team is responsible for handling computer warfare battles against hackers. The government should invest more money and resources in cyber warfare defense to protect our nation’s economy and infrastructure that is heavily dependent on technology. Imminent Threat The threat of a cyber-attack on our nation’s infrastructure is now viewed

Should the US Government be scared of Cyber Terrorism?

931 words - 4 pages Should the U.S. Government be Scared of Cyber Terrorism?In today's society, people are always trying to improve technology, but in doing so, are they creating something that can be used to create mass destruction for the United States? Everyday computers get faster, new programs are written, or some scientist finds a way to make a job be done quicker. The United States is finding out that being a World Power and other countries are getting

Cyber Security

1295 words - 5 pages . Cyber terrorism is one of the major treat to all sensitive information in cyberspace. Cyber terrorism can be defined as the use of computers and technology to cause server disruption or widespread fear in society. Through cyber terrorism data that is sensitive to major corporation and government alike are in danger of being hacked then used against them. Cyber security helps defend against cyber-attacks by tracking the attackers back to the source

Future Terrorism

879 words - 4 pages definitely left many concerns about the possibilities of future incidents of terrorism in the United States. Since the events of September 11, 2011, Americans and much of the world are afraid. Americans are at war with terrorism and no longer feel comfortable. A part of this unease feeling has to do with cyber terrorism. When the internet was invented, it was a great way of communication in order to keep families and friends in contact with each

Computer Crime

1796 words - 8 pages crimes, including cyber-based terrorism, espionage, computer intrusions, and major cyber-fraud (fbi.gov).” The way the FBI is trying to stop it is by sharing and obtaining information to and from the public worldwide to keep everyone in the know and to stay updated on the latest problems in cyber-space. Some governments have taken steps towards trying to control this growing problem. The United States has formed groups such as the Computer

The Republic of India

936 words - 4 pages as to connect the central government with the state governments; and the Education and Research Network (ERNET), which served the academic and research aspects. Though the rate of growth has slowed considerably, the number of Internet users now approximately reaching over 100 million which has resulted in anti-growth such as Cyber threats, Cyber terrorism, Cyber Crime, Cyber Terrorism, Cyber Espionage and Cyber Warfare. Although the need for a

CyberCrime and Terrorism

1058 words - 4 pages Throughout the years, there has been a steady increase in the amount of cyber crime committed. Technology is a constantly changing entity, constantly evolving, always progressing. Naturally this can make it hard to stay on top of things. In turn, law enforcement runs into various issues regarding cyber crime and cyber terrorism. Cyber crime and terrorism is so complex of a crime that it can be hard to break down the barriers that can lead to

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages . The FBI, however, has a number of technical programs that are addressing the issue of cyber crime. For example, there is the Internet Crime Complaint Center (IC3), the Cyber Division in Washington, DC, a computer forensics lab in Washington, DC, and most field offices have squads called Cyber Action Teams (CATS) (www.cert.org/tech_tips/FBI_investigates_crime.html, 2004). While most of these organizations investigations are aimed at terrorism and

cyber jihad

573 words - 3 pages UIntroduction Today, internet become a modern arena and is used by terrorists for fund raising distribute messages, and recruit new members. This groups known as Cyber Jihadists. Unlike cyber terrorism use of computers to attack networks and create chaos. In other hand, cyber jihad is information presented on behalf terrorist organization and it’s seemingly less threating than cyber terrorism and can be used for many activities that directly

What is Cyber Security?

1085 words - 5 pages make it that the user is less vulnerable to this form of terrorism. “Cyber terrorism is the newest of all terrorist attack methods, and it is defined as the use or destruction of computing or information technology resources aimed at harming, coercing, or intimidating others in order to achieve a greater political or ideological goal” (Bullock 284). Our government has a team of individuals that fight for our nation’s security in cyber space so

Finland Should be a Cyber Connector

912 words - 4 pages regarding its opportuni- ties to conduct cyber surveillance, but other countries are racing to develop their own security, surveil- lance and espionage capabilities. Some countries, such as Brazil and Germany, are reacting to this US dominance by looking at how their citizens’ online information can be stored on domestic servers. Besides being expensive and technically dif- ficult, these efforts may lead to the “Balkanization” of cyberspace. Many cyber

Similar Essays

Cyber Terrorism Essay

2138 words - 9 pages For my term paper, I researched on Cyber Terrorism. I believe that Cyber Terrorism is a big problem in our society and may even be a worldwide problem for all humanity today. I want to do my term paper on Cyber Terrorism because I had some personal experience with this sort of terrorism. About a two years ago, I encountered a Hacker on America Online. I opened an unknown message in my mailbox that was titled “Free Nude Teens”. Then about a

Cyber Terrorism Essay

1619 words - 6 pages called Cyber Terrorism, and is used by a variety of people. Many radical rebel groups, and other terrorist groups are using the World Wide Web to preach propaganda, and some U.S. officials believe they are also sending encrypted e-mails detailing when their next attack will be.The Columbian Rebel Group ELN is one of the many terrorist groups known to have a web page on the Internet. The ELN is known mainly for blowing up oilrigs inSouth America, and

The Dangers Of Cyber Terrorism Essay

1529 words - 6 pages , and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the more dangerous of the 3, is defined as the use of digital equipment to bring down a country by tapping into its computer based programs and dismantling its infrastructure which includes but not limited to: banking networks, air traffic control systems, gas and oil production, transportation, and emergency services that all rely on computer networks to function (Thio, 2010

From Hacking To Cyber Terrorism Essay

4086 words - 16 pages From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time