Cyber Terrorism Is the Process of Using Essay

Total Length: 678 words ( 2 double-spaced pages)

Total Sources: 4

Page 1 of 2

Cyber terrorism is the process of using disruptive, electronic activities to disrupt or destroy computers or computer networks with the aim of causing further damage or fear. Cyber terrorism is therefore a very great threat to information as it can lead to the leaking, damage or loss of very critical information by countries. In any case, cyber terrorism is facilitated through hacking and other activities aimed at affecting information across the world Verton, 2003.

Therefore as a threat, cyber terrorism involves terrorists using information technology in order to further their evil causes. The present technological world offers terrorists the opportunity to use information technology to make electronic threats through hackings, introduction of viruses defacing websites and Denial-of-service attacks.

Evolution of cyber terrorism

The evolution of cyber terrorism has basically grown in tandem with the developments realized in information technology. The initial threats began in the 1980s and continue as terrorists gained much knowledge in the field. However, many developments in cyber terrorism were realized in the last decade as the fight against the vice led to many strategies to counter the measures.

Stuck Writing Your "Cyber Terrorism Is the Process of Using" Essay?

Cyber terrorism works on the premise that the present society is becoming more depended on information technology networks and therefore an attack on such networks can cripple human activities. Therefore the terrorists use complex processes to interfere with the workings of information infrastructures with ideological or political intentions. The present cyber-terrorism threat is mostly geared towards the United States which has a very technologically advanced society Elmusharaf, 2012.

The primary attack process involves bringing down the internet in order to cripple the flow of information across the world.

Forms of cyber terrorism

Normally cyber terrorism can take several forms which basically involve the use of information technology. It can be in the form of data theft which involves getting very secret and valuable government information and using such information for malicious purposes. Another form of cyber terrorism presently employed involves the demolition of e-government bases which subsequently cripples critical sectors of the government. Cyber terrorists may also….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Cyber Terrorism Is The Process Of Using" (2012, May 29) Retrieved May 19, 2024, from
https://www.aceyourpaper.com/essays/cyber-terrorism-process-using-80302

Latest MLA Format (8th edition)

Copy Reference
"Cyber Terrorism Is The Process Of Using" 29 May 2012. Web.19 May. 2024. <
https://www.aceyourpaper.com/essays/cyber-terrorism-process-using-80302>

Latest Chicago Format (16th edition)

Copy Reference
"Cyber Terrorism Is The Process Of Using", 29 May 2012, Accessed.19 May. 2024,
https://www.aceyourpaper.com/essays/cyber-terrorism-process-using-80302