Search icone
Search and publish your papers

Cyber Terrorism: The darker side of internet applications

Or download with : a doc exchange

About the author


About the document

Published date
documents in English
term papers
4 pages
2 times
Validated by
0 Comment
Rate this document
  1. Abstract
  2. Introduction
  3. An overview of cyber terrirosm & targets
  4. Cyber terrirosm: Network security perspective
  5. How cyberspace is used?
  6. Counter cyberterrorism
  7. Conclusion

Cyber terrorism is the convergence of cyberspace and terrorism. Computers and the Internet are aggressively being used by many international terrorist groups. Although cyber terrorism attacks have not yet happened and also there is no such identified substantiation that terrorists are planning a coordinated ?soft? attack against critical infrastructure of public or private institutions, the loopholes in Internet security may attract their attention, as logic bomb would do a great amount of damage than a physical bomb in form of virtual violence with lot of ease in operation on terrorist part. If you consider this as hype, unfortunately you may have to utter ?failure of imagination? one more time. The purpose of this paper is to explore a new explanatory angle concerning cyber terrorism, challenges involved, network security perspective and counter-measures to minimize its' danger. Keywords: Cyber terrorism, network security

[...] During the past five years, terrorists have shown a stronger interest in and capability to conduct cyber attacks, and they have successfully conducted numerous attacks against websites. Moreover, even if our critical infrastructures are not under forthcoming threat by terrorists seeking political and social objectives, they must be protected from harmful attacks conducted for other reasons such as money, revenge, youthful curiosity, and war. The owners of these infrastructures and their governments must defend against cyber attacks regardless of who may perpetrate them. G.Meighan. "An Examination of the concept of Cyber-terrorism" Communique Management Journal K.Kerr. "Putting cyberterrorism into context". Australian Computer Emergency Response Team. Oct-2003. D. [...]

[...] Answer is awareness of computer and Internet security loopholes and stays ready with the soft solutions. Establish communication channels before attacks happen: Develop organizational / business continuity plans Raise logging levels Employ security best practices: o Apply software patches and updates o Use firewalls Employ anti-virus software and intrusion detection systems (IDS) Use BLUE and RED teams for assessments Secure critical information assets Practice ingress and egress filtering Duell proposes some methods of counter cyber terrorism for an organization. Anti-virus software: Needs to be installed on ALL computers, should never be disabled, and should always be kept up to date with the latest detection and cleaning data files. [...]

[...] ?What is Cyberterrorism?? Computer Crime Research Center, April C. Wilson. "Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress" CRS Report for Congress. Jan-2008. Galley, P. ?Computer terrorism: What are the risks?? 1998. D. Denning."A View of Cyberterrorism Five Years Later" 2007. S.Duell. "Cyberterrorism". SFBA Chapter Webmaster REFERENCES As cited on, an excellent site offering topic definitions. J.Kim, T.Hyun. "Status and Requirements of Counter-Cyberterrorism". Proceedings of world academy of science, engineering and technology Volume 6 issn 1307-6884 June 2005. J.Prichard and L.MacDonald. "Cyber Terrorism: A [...]

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages