3.0 Introduction to cyber terrorism and cyber theft
The definition of cyber terrorism:
According to the United States Federal Bureau of Investigation (FBI), cyber terrorism is any “premeditated, politically motivated attack against information, computer systems, computer programs and data which results in violence against non-combatant targets by sub national groups or clandestine agents.”
Definition from Wikipedia:
Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyber terrorism is a controversial term. Some authors choose a very narrow
…show more content…
Cyber terrorism always work in hacking, misinformation, virus and worm.
Hacking- hacking is gain access to a computer file or network illegally or without permission.
Misinformation- misinformation is to provide using incorrect information
Virus-virus a computer program that duplicates itself in harmful manner to a normal computer use. Most of the virus will attaching themselves to another program. The amount of damage varies and viruses may erase all data or to do nothing but reproduce themselves.
Worm-worm is a malicious program that can replicates itself until it fill all the storage space on adrive or network.
Where usually is cyber terrorism committed:
Usually cyber terrorism committed at cyber space such in computer systems infrastructure in government, hospitals, and banks and also in personal computers.
Example:
The cyber terrorism effect to the future:
1. Air traffic control tower or airline infrastructure could be hacked
2. Banking system can be violated and all of our money could be stolen
3. Bombs and other explosive could be set off by remote
4. Terrorist can learn government secret and
…show more content…
First, we should be cautions when opening email attachments.
2. Besides, we should have a complete Software Updates.
3. Next, we should create difficult passwords on each of our accounts such emails and etc.
4. Furthermore, we must download anti-virus software for our computer safety.
5. Lastly, we should uninstall unused application or services as a way of prevention and protection from these problems.
Conclusion:
Cyber theft and cyber terrorism can happens if fraudster accesses enough information about someone’s identity such as their name, address, date of birth and etc to commit identity fraud. Identity theft can take place whether the fraud victim is alive or dead.
If we are the victim of cyber theft or cyber terrorism, it can lead to fraud that can have direct impact on your personal finances and could also make it difficult for us to obtain loan, credit cards of a mortgage until the matter is resolved. The only system which is truly safe and secure is the one which is switched off and unplugged. Besides, the only way to be safe is pay attention and act smart on dealing to this
which could lead to physical damages and civilian casualties. In addition, terrorists stole confidential business information or set up fake charity website to gather funds for their activities. Furthermore internet was described as “online terrorists university” by (Weimann, 2004: 9, 2006: 112). Specifically online information taught beginners how to become “professional” for instance making bombs. For eliminating threats from the internet, European union according to Argomaniz (2014) took measures of updating institutions for example the “2005 Council Framework Decision (FD)” dealing with
Terrorism is a controversial, tricky, complicated subject, and thus it has a multitude of definitions. Although the majority of these definitions are sensible and working definitions, none of them are free from flaws. Each definition of terrorism has its own unique pros and cons which all ultimately come down to which groups and historical information it includes and which groups and historical information it excludes. For many definitions, what they include is one of their largest pros.
Homegrown Terror is violent acts committed by citizens or residents of a state against their own people or property within that state without foreign influence in an effort to instill fear on a population or government as a tactic designed to advance political, religious, or ideological objectives. This topic has been one of the most talked about in the presidential race. The politicians in the running, Hillary Clinton and Donald Trump, are often given the question about their solution with homegrown terrorism. All of their solutions that were mentioned on both sides, were both very interesting. But at the end, one of the solution, that Clinton made and it really stood out the most.
Recent discoveries show, “Of 134 jihadist-inspired terrorists who have carried out or plotted attacks here since 9/11, 96 were U.S. citizens” (Jenkins). In the United States there has been a serious rise in domestic terrorism, however the government refuses to acknowledge it. Instead their focus has been abroad, rightly so in some cases, while more domestic attacks make headline news. The change in visa laws does nothing, because since 9/11 86% of the terror attacks have been plotted or carried out by American citizens. Therefore, the United States needs to step up its efforts to combat domestic terrorism because the jail time is too short for current terrorists, there are no true task forces for current attacks, and there has been an increase of these groups and attacks.
In the twentieth century, that expanded to the skies. In the twenty-first century, wars will be increasingly fought in cyberspace…,” “… We need to get serious about cyber warfare. Government and the private sector need to work together to improve our defenses…,” “… I believe that the United States should declare a new doctrine that states that a cyber attack to our vital national infrastructure will be treated as an act of war and met with a proportional response…” Finally, “… The point of modern propaganda isn’t only to misinform or push an agenda. It is to exhaust your critical thinking to annihilate
Terrorism is in the extensive sense, the use of purposely indiscriminate violence as a means to generate terror, to attain a political, spiritual or conceptual aim. It is used in this regard mainly to refer to violence against peacetime aims or in war against non-fighting. It is mainly caused because of the hate towards certain group of people. They are National terrorism and International terrorism. National terrorism involves attacking their own people and opposing their government for certain reasons.
While some may think that the nations of the world have become much more intelligent and diplomatic since the end of the Cold War; there is evidence that proves otherwise. During the Cold War children were taught to hide under a desk so that they would be protected from a nuclear bomb; this fear of nuclear fallout was valid since this weaponry effects both combatants and none combatants. However, nuclear weapons have only been used several times, due to the immediate and long term effects that this action could have on the targeted nation, its enemy, and the rest of the world. With this concern attached to this decision, there could be very few justifiable situations to utilize the nuclear option.
Literature Review: A. Terrorism and its Economic Cost: Even though terrorism has existed in countries throughout history, there has not found long-term impact. The reason for that it seems to be less significant and less interesting for scientists but, after 11 September terrorist attacks, it seems to be that it has changed. (Bergersen and Lizardo, 2004). Now, terrorism and its effects have moved to remarkable research topics. After 11 September, terrorist attacks have increasing trend all over the world.
Nevertheless, we shall not become stagnant with the investigations and intelligence gathering or else, terrorism will defeat us. Future terrorist attacks are likely to originate in a form that has yet not been explored. Experts expect cyberattacks and chemical attacks as the means of the delivery of the next predicted catastrophe.
Identity theft Identity theft is a crime that has existed for centuries. However, modern technologies such as the Internet have duplicated and simplified the different ways to commit this crime. Not so long ago, birth certificates or other identification documents were rare; it was thus not too difficult to pass yourself off as another person. While people have more identification documents and other personal data nowadays, identity theft and/or identity fraud are becoming more and more common crimes.
However, it has been largely underestimated in the modern society with 85% of firms in the modern times being forced to experience an internal incident regarding their information security and websites. These incidences are sometimes serious as some firms end up losing their sensitive information to unauthorized individuals and others having their systems destroyed. Some surveys done in the recent past by Panko (2008) reveal that the most common types of threats to system security from inside a firm involve vulnerabilities and flaws existing in software applications, unintended leaks of data due to errors caused by human beings, and the theft or the loss of mobile and handheld
Message attack! ( 1 messages from each Byron poems) Everyone knows how important nature is. Everyone has seen someone who is innocent. You may have regrets.
Cybercrime is a new type of crime that can occurs in this generation. Recently more cybercrime happen because we use technology everyday. This crime can be categorised in different categories. Internet has become one of the main keys for many people around the world.
The internet is now extremely used against the west by its foes thus leading to greater height international terrorism. The internet acts as a platform of new terrorism as it provides higher sense of anonymity hence neither is it easy to be controlled nor restricted as there is free access to those who want to use it. It makes it easier for both the large and small terrorist regimes to create their own websites and used it to spread their propaganda in a wide scale, ask and generate their own finance, they also use the internet to recruit their members, communicate easily through chat rooms, forums, social networking and also use some of the online sites such as YouTube, Facebook. They could also use the internet in launching attacks online. Weimann (2012b) claims that the modern terrorists that are involved in attacks or planning the attacks were persuaded, recruited, trained and also were launched online.
In many cases, the security vulnerabilities in computers and Information Technology software can be and are exploited by the “Black Hats” or cybercriminals as they are known, to invade people’s privacy, and steal people’s identity. We know that computers have no moral compass; they cannot make moral decisions for themselves. Essentially, people make moral decisions that affect others positively or negatively depending on how they use computer technology. Some of the biggest ethical issues facing people in the computing environment include privacy concerns on the web and identity theft.