Cyber Security: Cyber Terrorism Essay

1810 words - 8 pages

Introduction
Cyber security refers to the practices and processes that are used in technologies such as networks, computers, information and programs from damages by unwarranted entities (Ahmad, Yunos & Sahib, 2012). There are different attacks towards technology which may distort information or be used to create tension in an organization. Information stored in computers has some level of privacy and this depends on the level of sensitivity that such information may have towards that organization. Business strategies, political discussions and government documents are some of the documents that require a higher degree of privacy. However, there are individuals who cause deliberate attacks ...view middle of the document...

Weimann (2004) argues that although there is the existence of cyber insecurity but to classify certain attacks on networks as terrorism is a populist move. This research therefore dwells on discerning the existence of cyber terrorism and how it is different from other forms of cyber attacks.
Findings
Cyber terrorism is a major concern with the Information technology sector. The increased synonyms that are associated with this subject are a clear representation of increased concern towards this subject. There are some researches that refer to this subject as either cyber harassment or cyber disruption. These varied synonyms are an indication that there has been more concern from the media and politicians over this subject. Talihärm (2010) indicates that increased activity towards cyber terrorism may lead to a myriad of information but this information could mislead the general public and stakeholders such as the Homeland Security. Weimann (2004) argues that cyber terrorism has been embraced by opportunistic politicians and business people in order to satisfy their own interests. The medium that these opportunists use in order to ensure that they achieve their selfish objectives is through the media. Weimann (2004) uses the 9/11 attack to validate the allegations of opportunists invading the issue of cyber terrorism to fulfill either economic or political interests. Weimann (2004) indicates that after the 9/11, the Bush government created the office of Cyberspace Security. Furthermore, the congress a request of $4.5 billion that was supposed to cater for development of infrastructure that could combat cyber terrorism (Weimann, 2004). However, Brunst (2010) is surprised that America was declared to be a target for cyber terrorism in the early 1990’s (Brunst, 2010). In fact during the presidential campaigns, Bush had indicated that American troops were under-funded in fighting terrorism (Brunst, 2010). During this time, he was not specific about cyber terrorism but came to react after the media had highlighted cyber terrorism as another form of terrorism. Conclusively, Brunst (2010) is on a mission to demystify the public relations that governments and agencies have used in creating confusion in regard to cyber terrorism.
Talihärm (2010) argument is also valid to this research. Talihärm (2010) indicates that most people especially those in the media have confused ‘hacktivism’ with cyber terrorism. Hacktivism is another way through which modern civil rights groups use to demonstrate their frustration with particular operations or conduct of government officials towards societal concerns. These civil right groups use anonymous accounts to disrupt normal operation of government sites. This is meant to create awareness about the issues that they are demonstrating against. For example, the United States was actively involved in the Iraq war and during this time recession was at greater magnitude (Talihärm, 2010). Most Americans could not service...

Other Papers Like Cyber Security: Cyber Terrorism

Cyber Security And Its Challenges To Society

3707 words - 15 pages the single biggest risk associated with Cyber Terrorism, Cyber-crime or Cyber Warfare. In our presentations, we drilled down to more specific issues and examples that helped illustrate what direction the practice of Cyber Security must proceed to match the growing threat. The introduction of new devices and technology is threatening the existences of our modern society, as the internet has changed it to be, and will only be resolved as we try to generate more secure devices and apps and before its introduction it protection should be kept in mind.

Cyber Threats Essay

658 words - 3 pages your security to help protect against future attacks. There are thousands of ways to help protect against cyber terrorism threats but I think the following are the simplest and most effective ways to start, Make sure all accounts have passwords and the passwords should be unusual, difficult to guess. Be sure to change the network configuration when defects become known. Constantly check with venders for upgrades and patches that can be installed

Cyber Crime Team

1543 words - 7 pages these crimes. Combating Corrections Issues Allowing inmates to use a computer and the Internet creates a security problem. Computer knowledgeable inmates could breach the security to access correctional system files or use the computer and Internet for other illegal purposes. Inmates may require computer restrictions to eliminate the possibilities of cyber-crimes within correctional facilities. A monitoring program that tracks website access

Cybercrime

2247 words - 9 pages computer security and to urge the private sector to also accept tougher security measures in order to be able to reduce infrastructure vulnerabilities. So far we can agree that the cyber terrorism threat have been overstated, but we cannot ignore it. A reason for this can be the differences in goals and motives for terrorists. Terrorist try to make political statement and to impose psychological and physical damage on their targets for which the goal

Cyber Warfare

596 words - 3 pages warfare, one of which was provided earlier this year by Defence Signals Directorate's (DSD) Deputy Director of Cyber and Information Security Mike Burgess in a speech to the Old Crows Association. He defined cyber warfare as 'an act...intended to degrade, destroy or deny computer accesses and systems' and added 'a true act of cyber warfare would have to be potentially lethal, instrumental and political'. Information stored on computers has

A Case of Bureaucracy

2759 words - 12 pages examine how people can use the Internet to spread a new form of terrorism, cyber-terrorism. A person sitting at home using his personal computer can longer feel safe, even in the security of his/her own home, as information security has become one of the prime concerns of everybody, including the government. It is believed that a threat of cyber-terrorism is a very real threat and the government has taken some very cautious measures in order to

Cyber Crime

1366 words - 6 pages property. • Cyber crimes against government. • Cyber crimes against society. CATEGORIES Cyber crimes against INDIVIDUAL  Harassment via E-Mails Hacking E-Mail / SMS Spoofing Carding Assault by Threat PLISHING CATEGORIES Cyber crimes against PROPERTY Intellectual Property Crimes Cyber Squatting Cyber Vandalism Transmitting Virus Internet Time Thefts CATEGORIES Cyber crimes against GOVERNMENT Cyber Terrorism CATEGORIES Cyber

Computer Crime

1301 words - 6 pages annual survey Electronic funds transfer fraud E-tax fraud, electronic voting fraud risks Electronic Medicare / Centrelink (welfare) fraud ABACUS – Aust Business Assessment of Computer User Security Identity crime, e-banking, funds transfer fraud, business fraud Sharemarket manipulation / e-piracy / intellectual property theft Money laundering / financing of terrorism (SVCs, e-currencies, EFT) Private sector Personal cyber crime • ACFT

Introduction to Cyber Crime

1950 words - 8 pages understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes. Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband. Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control

Week 3 Paper

902 words - 4 pages Attack Prevention: Preventing Cyber Attacks Krista McCafferty CMGT441: Introduction to Information Systems Security April 20, 2012 Attack Prevention: Preventing Cyber Attacks In today’s society technology is everywhere. The use of computers, cell phones, GPS’s, and internet are a lot more common. Now that today’s technology is

Security for Web Applications

1022 words - 5 pages RECENT CYBER ATTACKS SANDEEP VEMULAPALLI 12917417 IA-606 ST.CLOUD STATE UNIVERSITY SEP4, 2015 Cyber Attack: The attempt of breaching the security layers of an organization or a system by disrupting the network and there by accessing, stealing, modifying or destroying the valuable data and using the data for fraudulent purposes, causing a loss to the organization is called a Cyber Attack Origin: The idea of cyber attacks began at the

Related Essays

Cyber Security Essay

1448 words - 6 pages some risk present. Risk will be like lost of data or to protect data by any attack of security. According to a survey which took place in 2012 about security, the graph of crimes and security attacks is gradually going up every year. As we talk about security it’s a very huge field to do research on it. Security has many different units in a field. One can’t do a research on this topic. The topic I am going to discuss in my research is cyber

Cyber Security Essay

534 words - 3 pages Define Cyber Security. Computer security is also known as cyber security or IT security which refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. It is an information security as applied to computers and computer networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from

Cyber Terrorism: The American Response Essay

1741 words - 7 pages Cyber Terrorism: The American Response Mutale Chisanga School of Computer Science 03-60-305 Professor Kristina Verner March 6, 2016 Cyber terrorism: The American Response United States (U.S.) critical infrastructure faces a growing cyber terrorism threats due to advancements in the availability and sophistication of malicious software tools and the fact that new technologies raise new security issues that cannot always be addressed

Cyber Security: Physical And Digital Security Measures

3505 words - 15 pages Cyber Security: Physical and Digital Security Measures Abstract Due to the issues associated with cyber security and the appropriate application thereof, this paper will strive to address different cybersecurity measures that may be employed, both physically and digitally. It will identify what cyber security is, measures that may be taken, the tools needed to ensure implementation, and provide information regarding the different resources