Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Cyber Terrorism

Discuss About The Constructing Terrorism As A Security Threat?

Cyber terrorism is the most used word in the technological world. The motivation of utilizing technology and intelligence for harming a targeted victim or group of victim in a nation is known as cyber terrorism (Akhgar, Staniforth & Bosco, 2014). It spreads terror and fear in all over the world. All the generations are affected by this cyber terrorism. The main disadvantage of this terrorism is that even if the cyber terrorist attacks a particular group of people, the entire nation is affected due to their activities. In simple words, cyber terrorism is the action of destructing the society in various ways. Internet is the biggest boon that the society has obtained from technology. The world will become stagnant if there is any problem in the Internet. The benefits of information technology include improvement in communication, efficiency, productivity and creativity. Information and data can be easily accessed by this technology. However, there is always an opposite side of a coin (Jarvis, Macdonald & Whiting, 2015). It is evident that internet has provided many advantages but it is also utilized by several human beings for the act of destruction. Cyber terrorism is the best of example of such cases.

The following report describes about cyber terrorism. It even outlines the important features of cyber terrorism with relevant details. The problems, applications, relevant technologies and the challenges are also given in the report. Moreover, the several impacts of the cyber terrorism on society are provided here. Relevant justifications are also given regarding the lesson learnt from cyber terrorism.

As per the legal rules and legislation of any nation, cyber terrorism is listed as the most degrading and destructive crimes in modern world (Ahmad & Yunos, 2012). Cyber terrorism is the most used word in the technological world. The motivation of utilizing technology and intelligence for harming a targeted victim or group of victim in a nation is known as cyber terrorism. It spreads terror and fear in all over the world. All the generations are affected by this cyber terrorism. The main disadvantage of this terrorism is that even if the cyber terrorist attacks a particular group of people, the entire nation is affected due to their activities. In simple words, cyber terrorism is the action of destructing the society in various ways (Taylor, Fritsch & Liederbach, 2014). The major requirement of this cruel act is the Internet. Without internet enabled systems, cyber terrorism cannot occur. Internet is the biggest boon that the society has obtained from technology. The world will become stagnant if there is any problem in the Internet. The benefits of information technology include improvement in communication, efficiency, productivity and creativity. Information and data can be easily accessed by this technology. However, there is always an opposite side of a coin (Tehrani, Manap & Taji, 2013). It is evident that internet has provided many advantages but it is also utilized by several human beings for the act of destruction. Cyber terrorism is the best of example of such cases. This cyber terrorism only affects a particular group of people but also the entire nation.

Challenges

The hacker or the terrorist, who is involved in cyber terrorism hacks an information system to pursue his job. This is through computer systems that are enabled with Internet. The major requirement for conducting such destructive crime is the Internet connection. The cyber terrorist gets the IP address of some of the targeted systems. It can be a computer, a laptop, a smart phone or a tablet. There are various challenges that are related to cyber terrorism. These challenges mainly include the different sectors of a nation like economic, political, social and legal (Jarvis, Macdonald & Whiting, 2015) Each of these sectors are handled and completely managed by the information and communication technology. The daily necessities of a nation will be stopped if there is any problem in the internet. The infrastructure of a society is dependent on the regular need of an individual. These utilities are the supply chain of electricity, water connection, management of air traffic, accounting, finance and banking. If any of these utilities are reduced, the entire nation would be affected. Cyber terrorists target the systems that are controlling these utilities (Uma & Padmavathi, 2013). Similar challenges are faced in the political, economic and legal sectors.

Cyber terrorism occurs for the several problems and issues. They are as follows:

i) Simplicity in the Infrastructure: The system infrastructure plays a significant role in the security of that system. If the infrastructure of a particular system is protected by firewalls or other necessary measures, it is evident that no intruder can get into the system (Ahmad & Yunos, 2012). However, the case is absolutely opposite for infrastructure that is way more simple than normal. Hacker can easily get into the system and act as the user and perform his illegal activities.

ii) Issues Related to Politics: This is the most dangerous problem for any nation. Political parties are those groups of individuals, who are responsible for the overall growth of a country. They rule the country with proper means (Awan, 2014). However, some of the political leaders or parties have an immense nature of competition. It has been observed that in few cases of cyber terrorism, a particular political party is involved. They support or rather hire this type of cyber terrorists for conducting such destructing crimes in the country.

iii) Lack of Passwords: This is another important problem for any system. Passwords are the simplest way of securing a particular system. All the systems should have passwords (Hua & Bapna, 2013). Lack of password in any system opens the way for hacker and intruders. They enter into the system and gets access of the data.

Problems

iv) Lack of Legal Factors: The legal rules and regulations helps to secure the information system of any country. These rules are responsible for maintaining the legal balance of a nation. There are few countries, where the rules and regulations are extremely strict (Ahmad, Yunos & Sahib, 2012). This helps to prevent all types of crime and criminal activities in a nation. However, there are some countries that do not have strict laws and cyber terrorism can easily occur in those countries.

v) Absence of Relevant Systems: Every government of a country should have a attack detector system installed in it. This helps to detect and prevent any attack by providing the information to the government (Bogdanoski & Petreski, 2013). In simple words, if the detector detects that there is a chance of cyber attacks in the future. The government can take necessary steps to prevent this type of attacks.

Technology has the most important impact on the modern world. This technology has altered or modified the entire world with its advantages. Internet is the greatest advantage that the society has obtained from technology (Dawson, 2015). The world will become stagnant if there is any problem in the Internet. The benefits of information technology include improvement in communication, efficiency, productivity and creativity. Information and data can be easily accessed by this technology. Cyber terrorism are conducted by some of the relevant technologies. They are as follows:

i) Internet: This is the most relevant technology that helps to conduct cyber terrorism in any country. Without Internet cyber terrorism cannot be conducted. Internet is the biggest boon that the society has obtained from technology. The world will become stagnant if there is any problem in the Internet. The benefits of information technology include improvement in communication, efficiency, productivity and creativity.

ii) Smart Phones: Smart phones are another advantage that technology has provided to the society. Communications have become easier with smart phones (Ahmad, 2012). As smart phones are enabled with internet connection, it is evident that it can be easily hacked. The cyber terrorist utilize the smart phones of citizens to conduct such destructing activities.

iii) Systems: Systems refer to computer systems, laptops and tablets. They store all the necessary information in their database (Eid, 2012). These are hacked by hackers to perform their activities easily and secretly. However, password protected systems are tough to hack and are claimed to be secured.

Relevant Technologies

The impact of cyber terrorism is absolutely negative for a country. The affected areas of a nation are the economic, legal, social and political areas. When cyber terrorism occurs in a country, often the economic level of the country goes down and the nation suffers (Bowman-Grieve, 2015). This type of activities often stops the basic utilities of an individual like electricity, water supply, banking and many more. The citizens of the nations suffer a lot due to this phenomenon. They are unable to understand the reason and thus are affected. This in turn affects the social life of the nation. Similarly, the rules and regulations of a nation are violated (Awan & Blakemore, 2016). Thus causing a huge impact on the legal sector. Often political parties are involved in these cases and thus political sector is also affected.

The most important lesson I have got from this report is that nobody should be involved in these types of activities. Everybody should be ethically and morally correct towards his or her nation. Moreover, internet can be utilized for various important and creative fields. It should not be used for wrong deeds like cyber terrorism.

Conclusion

Therefore, from the above report it can be concluded that, cyber terrorism is the most used word in the technological world. The motivation of utilizing technology and intelligence for harming a targeted victim or group of victim in a nation is known as cyber terrorism. It spreads terror and fear in all over the world. All the generations are affected by this cyber terrorism. The main disadvantage of this terrorism is that even if the cyber terrorist attacks a particular group of people, the entire nation is affected due to their activities. In simple words, cyber terrorism is the action of destructing the society in various ways. Internet is the biggest boon that the society has obtained from technology. The world will become stagnant if there is any problem in the Internet. The benefits of information technology include improvement in communication, efficiency, productivity and creativity. Information and data can be easily accessed by this technology. However, there is always an opposite side of a coin. It is evident that internet has provided many advantages but it is also utilized by several human beings for the act of destruction. Cyber terrorism is the best of example of such cases. The above report describes about cyber terrorism. It even outlines the important features of cyber terrorism with relevant details. The problems, applications, relevant technologies and the challenges are also given in the report. Moreover, the several impacts of the cyber terrorism on society are provided here. Relevant justifications are also given regarding the lesson learnt from cyber terrorism. The report even helps to understand that this type of cyber terrorism can be mitigated by obtaining proper security approaches.

References

Ahmad, R. (2012). Perception on cyber terrorism: A focus group discussion approach. Journal of Information Security, 2012, 3, 231-237.

Ahmad, R., & Yunos, Z. (2012). A dynamic cyber terrorism framework. International Journal of Computer Science and Information Security, 10(2), 149.

Ahmad, R., & Yunos, Z. (2012). The application of mixed method in developing a cyber terrorism framework. Journal of Information Security, 2012,.

Ahmad, R., Yunos, Z., & Sahib, S. (2012, June). Understanding cyber terrorism: The grounded theory method applied. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on(pp. 323-328). IEEE.

Akhgar, B., Staniforth, A., & Bosco, F. (Eds.). (2014). Cyber crime and cyber terrorism investigator's handbook. Syngress.

Awan, I. (2014). Debating the Term Cyber-terrorism: issues and problems. Internet Journal of Criminology. ISSN, 2045(6743), 1-14.

Awan, I., & Blakemore, B. (Eds.). (2016). Policing cyber hate, cyber threats and cyber terrorism. Routledge.

Bogdanoski, M., & Petreski, D. (2013). Cyber terrorism–global security threat. Contemporary Macedonian Defense-International Scientific Defense, Security and Peace Journal, 13(24), 59-73.

Bowman-Grieve, L. (2015). 5 Cyberterrorism and Moral Panics. Terrorism online: Politics, law and technology, 86.

Dawson, M. (Ed.). (2015). New threats and countermeasures in digital crime and cyber terrorism. IGI Global.

Eid, M. (2012). Cyber-terrorism and ethical journalism: A need for rationalism. In Ethical Impact of Technological Advancements and Applications in Society(pp. 263-283). IGI Global.

Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), 175-186.

Jarvis, L., Macdonald, S., & Whiting, A. (2015). Constructing cyberterrorism as a security threat: a study of international news media coverage. Perspectives on Terrorism, 9(1).

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.

Tehrani, P. M., Manap, N. A., & Taji, H. (2013). Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. Computer Law & Security Review, 29(3), 207-215.

Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), 390-396.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Cyber Terrorism: Challenges, Problems, And Relevant Technologies. Retrieved from https://myassignmenthelp.com/free-samples/constructing-terrorism-as-a-security-threat.

"Cyber Terrorism: Challenges, Problems, And Relevant Technologies." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/constructing-terrorism-as-a-security-threat.

My Assignment Help (2018) Cyber Terrorism: Challenges, Problems, And Relevant Technologies [Online]. Available from: https://myassignmenthelp.com/free-samples/constructing-terrorism-as-a-security-threat
[Accessed 22 July 2024].

My Assignment Help. 'Cyber Terrorism: Challenges, Problems, And Relevant Technologies' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/constructing-terrorism-as-a-security-threat> accessed 22 July 2024.

My Assignment Help. Cyber Terrorism: Challenges, Problems, And Relevant Technologies [Internet]. My Assignment Help. 2018 [cited 22 July 2024]. Available from: https://myassignmenthelp.com/free-samples/constructing-terrorism-as-a-security-threat.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close