Computer Terrorism According to Weimann, Term Paper

Total Length: 562 words ( 2 double-spaced pages)

Total Sources: 1

Page 1 of 2

Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism.

Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth, cyberterror can be launched and managed remotely and fifth, computer terrorism can garner instant and widespread media attention. Cyberterrorism is not only in the province of international terrorist organizations but may also be used by fanatical religious groups or even by disgruntled employess. Using computer terrorism can also become an adjunct to traditional forms of terror like bombs.

Stuck Writing Your "Computer Terrorism According to Weimann," Term Paper?



The National Security Agency (NSA) has investigated vulnerabilities in their own systems and have hired hackers to expose weaknesses in their systems. Governmental organizations, energy corporations, transportation and communications infrastructures, and law enforcement departments have also been stepping up efforts to prevent acts of cyberterrorism, spending large amounts of money to do so. The larger the system, the more potential vulnerabilities it may have. Weimann admits that acts of cyberterror may increase in the future but that for now cyberterrorism is simply a "sexy" idea. Most large-scale it systems are closed and would require an insider or disgruntled employee to take part in the attack. Weimann's report puts computer terrorism into perspective, dispelling myths and exposing realities......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Terrorism According To Weimann " (2007, April 17) Retrieved May 19, 2024, from
https://www.aceyourpaper.com/essays/computer-terrorism-according-weimann-38484

Latest MLA Format (8th edition)

Copy Reference
"Computer Terrorism According To Weimann " 17 April 2007. Web.19 May. 2024. <
https://www.aceyourpaper.com/essays/computer-terrorism-according-weimann-38484>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Terrorism According To Weimann ", 17 April 2007, Accessed.19 May. 2024,
https://www.aceyourpaper.com/essays/computer-terrorism-according-weimann-38484