Monday, December 23, 2019

From Hacking to Cyber Terrorism Essay - 3963 Words

From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time we are also observing explosive growth in the darker side of the IT - regarding hacking and cyber crimes. Activities like unauthorized computer intrusion, denial of service (DOS), stealing computer passwords and secure data; causing damage to computer systems and databases and causing damage to†¦show more content†¦Some hackers are malicious, whilst others are merely naà ¯ve and do not cause any real harm. Their motivations for hacking includes financial gain, revenge, ideology or just plain mischief making 1. There are different categories of hackers - algorithm hacker, system hacker , password hacker etc. What is cyber terrorism? Cyber terrorism is a new class of threat to the world. This is one of the extreme cases of hacking. Here, instead of physical terror efforts are focused upon attacking information systems or resources especially using World Wide Web. Cyber terrorists use computer systems and software to create violence and loss by breaking security of target systems or by stealing/corrupting computer systems. Unlike hackers, Cyber terrorists usually work under political or ideological influence and always more harmful than a hacker. However it’s always possible that a hacker can turn into a cyber terrorist by providing his technical skills to perform terrorist activities. Hacker himself can be a terrorist or can be hired by terrorist organizations for hacking. In this case, we see overlaps between hacking and cyber terrorism activities. Cyber terrorists use Internet for a number of purposes, as described below. * Propaganda/Publicity - Some terrorists useShow MoreRelatedCyber Security and Technology Essay1097 Words   |  5 Pagesdefend themselves. Cyber terrorism is one of the major treat to all sensitive information in cyberspace. Cyber terrorism can be defined as the use of computers and technology to cause server disruption or widespread fear in society. Through cyber terrorism data that is sensitive to major corporation and government alike are in danger of being hacked then used against them. Cyber security helps defend against cyber-attacks by tracking the attackers back to the source and hacking them. This way securityRead MoreThe Growing Threat Of Cyber Warfare From Russia1700 Words   |  7 PagesThreat of Cyber-Warfare from Russia The next generation of terrorists will grow up in a digital world, with ever more powerful and easy-to-use hacking tools at their disposal. - Dorothy E. Denning. This is becoming more and more apparent as time goes on. You hear something new every day about some company being hacked by the Chinese, Russians, Iranians, or North Koreans. The world we live in is becoming more and more digitized and, perhaps unsurprisingly, the threat of cyber-terrorism is onlyRead MoreThe Threat Of Cyber Terrorism1093 Words   |  5 PagesSolution Q. No. 2 The possible threat posed by cyber terrorism has motivated considerable alarm. Many security experts have exposed the danger of cyber terrorists hacking into government and remote computer systems and service areas of progressive economies. The possible threat is, indeed, very disturbing. So far, despite all the gloomy pre-dictions, no single example of real cyber terrorism has been recorded. This increases the question: about the threat? Psychological, political, and economicRead MoreThe Liberties, Ideologies, And Effects Of Hacktivism1699 Words   |  7 Pagesliberties, ideologies, and effects of hacktivism. Hacktivism, is the combination of hacking and activism, and is where a hacker creates a technology-centered disturbance with a political or social motive. Unlawful hackers typically cause cyber damage for amusement, or monetary gain. While traditional hackers are perceived as criminals, hacktivists are a transgressive group. Cyberterrorism is the most extreme version of hacking, where the goal is to cause permanent damage. There are benefits to hacktivismRead MoreThe Patriot Act Title Vii Section 814 And 8161429 Words   |  6 Pages814 and 816. These sections of the Patriot Act protects the citizens of The United States from the world’s newest form of terror; Cyber-Terrorism. The aim is to explain this law, its adequacies, and inadequacies in detail and to offer suggestions and solutions for its shortc omings. Commission of Cyber Terrorism In 2013, a man, investigators named the â€Å"Sexual Cyber Terrorist† extorted over 350 women by hacking into their email accounts and baiting them into giving him nude photos. If the women didRead MoreCyber Terrorism And Threats Of Information System1688 Words   |  7 PagesCyber-Terrorism and Threats to Information System National security has been top priority of the United States after World War II. This is due to the fact that the United States before this time was relatively an isolationist country with no influence in the world. As a result national security was not important, this changed post World War II. The United States found themselves among the top, overnight they went from being new and not listened to, to becoming one of the major players in the worldRead MoreComputer Crimes And Computer Crime1066 Words   |  5 Pagescrimes. History of computer crimes Computers and networks became increasingly known and used in the 1990s. Hackers back then were more interested in attaining information about different systems. Hacking became almost like a competition, hackers would compete to win the title of the best hacker. Hacking was not seen as a big problem, it was seen as more of an annoyance and hackers did not pose a long-term threat until hackers started using malicious software that made the networks and systems slowRead MoreThe Fbi Agents And The Criminal Law Of The United States1615 Words   |  7 Pages(FBI) Agents have increased, due to the amount of crimes that have continued to rise. The FBI serves as the nation’s federal law enforcement and works to keep our country safe from dangers that we cannot deal with. The FBI agents have an impact on our nation because they defend us against counterfeiting, terrorist attacks and cyber-based attacks. The FBI is a treat-based and intelligence driven national security organization. There mission is to protect and defend the United States against terroristsRead MoreCyber Bullying And Cyber Crime1607 Words   |  7 Pagesresult, cyber technology and cyberspace are major areas of interest for citizens and lawmakers all over the world† Governments face enormous strife when it comes to creating legislation to technological offences in the law as technology is developed at a fast rate and therefore preventative legislation to cyber crime is rarely made before these issues have happened. These issues that relate to the individual in cyberspace are cyber bullying, cyber stalking, online predators, terrorism, hacking, internetRead MoreWorld of Network Security Infirmities 1427 Words   |  6 Pagesinformation. During the early 90’s, the internet did not exist but as this new phenomena birthed my job title changed with added responsibilities. Information Systems Technician was the new named deemed for my field or IT for short. IT’s were responsible from everything to setting up video teleconferences to resetting user passwords, computer repair and maintaining the network. My was heart always fixated on telecommunications but due to the crass course of telecommunications and network security integration

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.