Cyber terrorism is considered terrorism activity

Assignment Help Basic Computer Science
Reference no: EM132836431

Discussion 1:

Cyber terrorism is considered as the terrorism activity in which attackers attack on the properties and affect the computer, information by taking support of internet. This kind of terrorism activities may cause physical harm to the real world and can disrupt the infrastructure as well.

Cyber attacks are generally done to harm particular person but it has no specific goal but cyber terrorism activities are being performed to hurt specific component of political system of the country (Taylor and et.al. 2019). Cyber terrorism activities are being performed with specific motive. The main motive of this kind of criminal activities is to destroy the enemies and their operational capabilities as well. By attacking on the system terrorist try to finish the operational capacity of the nation so that it may fail to handle the critical situations well. Another major motive of cyber terrorism is to misrepresent the reputation of the firm. Many big nations have strong infrastructure facilities and have sound system as well. If terrorists attack on these systems then it may cause harm to the nation. Special there is presence of specific motive then cyber attack is considered as cyber terrorism

The main target of such kind of terrorism activities are economy of the nation and particular industry which is performing well in the market. By attacking the industry, nation may get failed to handle the security effectively.

These attacks are done with the intention to destroy the organization and hurt the public of that country. If there is presence of this feature then this would make the cyber attack as the cyber terrorism activity (Venkatachary, Prasad & Samikannu, 2018).

The main agenda of cyber attack is to gain financial benefits or to hurt the other person but when these attacks are performed to destroy the political system then it would turn the entire situation in to the cyber terrorism. These professional hackers perform such illegal activities to hurt the entire political system of the country.

References

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. New York, NY: Pearson.

Venkatachary, S. K., Prasad, J., & Samikannu, R. (2018). Cybersecurity and cyber terrorism-in energy sector-a review. Journal of Cyber Security Technology, 2(3-4), 111-130.

Discussion 2:

Cyber-attacks are strikes launched by cyber criminals using computers against a single computer or multiple computers. The purpose of cyber-attacks is usually to maliciously steal information from computers or use a breached computer to attack other computers. The methods used to launch cyber-attacks include malware, phishing, denial of service among others. Cyber attacks are preventable. Cyber terrorism on the other hand, is the use of the internet to perform violent activities that can lead to the loss of lives or serious bodily harm. Cyber terrorism is the use of computers or devices to cause harm to other uses for personal gain of the cyber terrorist. These two terms, even though may seem to mean the same thing, refer to two different acts.

Cyber-attacks are taken to be more information oriented as compared to cyber terrorism. A cyber attack can be viewed as a launchpad for future cyber terrorism. The theft of information from personal computers through the illegal access to passcodes and the breaking of security barriers is a cyber-attack. When such information and data are used to perform other serious crimes like blackmail, it becomes cyber terrorism. Cyber terrorism is therefore more violence oriented than cyber-attack. A cyber terrorist can deny the user of a personal computer the use of their own computer. That is classified as a cyber-attack. If the terrorist then goes forward to steal information from such computers and blackmail the user or cause actual bodily harm to the user, it becomes cyber terrorism (Xuan & Zuyi, 2017).

An attack can be classified as cyber terrorism if the attack is used for acts of terrorism. These acts include grievous bodily harm, blackmail, murder or robbery and such like vices. Cyber attacks are used to launch cyber terrorism. This is because cyber attacks involve the access of computers and/or the illegal access of information and data in the affected computers. A cyber attack can be termed as cyber terrorism if it affects many users at once.

Reference

Xuan Liu, & Zuyi Li. (2017). Trilevel Modeling of Cyber Attacks on Transmission Lines. IEEE Transactions on Smart Grid, 8(2), 720-729.

Reference no: EM132836431

Questions Cloud

What estimated ending inventory destroyed by fire is : October 31 inventory warehouse, leaving undamaged inventory with a cost of $3,000. Using the gross profit method, estimated ending inventory destroyed by fire?
What outbreaks are currently being address in virginia state : Go to HealthMap. Read through the website and watch the cartoon video titled, "What is HealthMap?" View HealthMap. Write a 2-page paper expressing how you.
Discuss the role of data and data management solutions : Discuss the role of data and data management solutions in organizational decision making
What change in the amount of operating assets is required : If both sales and expenses cannot be changed, what change in the amount of operating assets is required to achieve the same result?
Cyber terrorism is considered terrorism activity : Cyber terrorism is considered as terrorism activity in which attackers attack on the properties and affect computer, information by taking support of internet
Compute each division residual income : Adams Cough Drops operates two divisions. Compute each division's residual income. Which division increased the company's profitability more?
What accounting method should hariette choose : Determine how much to set aside for her estimated taxes. What accounting method should Hariette choose when she runs the Profit and Loss report?
Threat Modeling : You will research several threat models as it applies to the health care industry,
What is one example of actual audit evidence : What type of audit evidence do you think would meet the requirement for sufficient, appropriate audit evidence in this case? What is one example of actual audit

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd