Cyber Terrorism: Challenges, Problems, And Impact On Modern Society

Definition of Cyber Terrorism

Question:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Discuss About The Provided Various Advantages To The Society?

Cyber terrorism is a common word in modern world. The utilization of Internet has provided various advantages to the society. At the same time, this Internet has also turned out to be a terror for the society. All kinds of crime in today’s world are conducted through Internet (Ahmad & Yunos, 2012). Cyber terrorism can be defined as the violent and cruel acts that are conducted for threatening or harming an individual or sometimes an entire nation. This is done by using the Internet to disrupt the networks of computer or to conduct various terrorist activities. These are done deliberately with the intention of causing harm.

The following report outlines a brief discussion on the cyber terrorism. It provides descriptions about the problems, challenges and relevant technologies. The report gives a brief description about the impact of cyber terrorism in the modern world. The lesson that can be learnt from the discussions is also mentioned here. The description is provided in the following paragraphs.

Cyber terrorism is the utilization of the information and communications technology or ICT and computer systems to generate dangerous disruption and severe fear in the cyber world (Hua & Bapna, 2013). The utilization of Internet has provided various advantages to the society. At the same time, this Internet has also turned out to be a terror for the society. All kinds of crime in today’s world are conducted through Internet (Awan & Blakemore, 2016). Cyber terrorism can be defined as the violent and cruel acts that are conducted for threatening or harming an individual or sometimes an entire nation. This is caused by using the Internet. This is done intentionally with the intention of wrong deeds.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Cyber terrorists attack and target those systems, which are completely operated and managed by computers (Taylor, Fritsch & Liederbach, 2014). These systems include all the necessities of a society. The infrastructure of these systems include several utilities like the electricity and water supplies, finance, banking, transport systems, controlling of air traffic and many more. The other utilities that are attacked are the information technologies, supply networks and other physical facilities. These utilities are either destroyed or degraded for a certain period. This becomes a major challenge for the entire nation or state (Ahmad, Yunos & Sahib, 2012). The terrorists break into the system and afterwards they take complete control of the system. The whole nation is affected through this type of attack. The cyber terrorism is a major challenge for all the citizens of a nation including the governing body. The major challenges of cyber terrorism include political challenge, legal challenge, economic challenge and social challenge. This type of terrorist attacks affects the governing body or the political parties. The whole jurisdiction of a nation is well shaken, the moment such attacks occur. When the facilities are disrupted or stopped by the cyber terrorists, it creates a huge impact on the social and economic wellbeing of a nation (Awan, 2014). These challenges sometimes even turn out to be fatal and the nation and legal bodies are not able t control them.

Advantages and Disadvantages of Internet

There are several problems and issues that are related to cyber terrorism. The problems are as follows:

  1. Political Issue: This is the most dangerous problem of cyber terrorism. Most of the cyber attacks take place because of the act of revenge on the political parties, acting on the nation (Tehrani, Manap & Taji, 2013). It is seen in various cases that political parties from other countries organize and hire cyber terrorists for attacking on any other nation.
  2. Inexpensive Infrastructure: This is another important issue in cyber terrorism. The weak infrastructure of any system opens the way for cyber terrorism and thus is affected severely.

Simple Infrastructure: Simplicity of the infrastructure of any system is another issue of cyber terrorism. The terrorists can easily hack this type of systems and enter into it with the intention of terrorism (Uma & Padmavathi, 2013). The infrastructure should be made somewhat complex so that the system cannot be hacked easily.

  1. Passwords: This is another problem for any information system. Passwords should be present in all systems and they should be updated periodically so that there exists no loopholes of hacking.
  2.  Absence of Communication System for Government: This is again one of the most important problems of cyber terrorism. All governments should have systems for communication and cooperation (Ahmad & Yunos, 2012). These system help in collection, distribution and sharing of all information related to security. Moreover, they detect the situation whenever there is a chance of cyber attack or a danger of such attacks.
  3.  Lack of Adding and Revision of Legislation: Laws and regulations help a nation to meet its goals and objectives. The government should alter and modify the laws and rule periodically, especially for the criminal law, so that any terrorist will think twice before involving in cyber terrorism.

Lack of International Cooperation: International cooperation helps a lot in case of cyber terrorism (Dawson, 2015). There is a restriction for all nations to conduct their search for terrorists. However, when they take help from international bodies, there is no limitation. Lack of international cooperation is another problem of cyber terrorism.

Technologies are the most important things for any progress in modern world. They have provided several advantages to the world. However, at the same time they are the reason for threats of security in every aspect. (Ahmad, 2012) The most important technologies that welcome cyber terrorism in cyber world are as follows:

  1. i) Internet: This is the most important technology in today’s world. Internet provides everything to the world. It has made the world smaller by providing the best applications. Similarly, in cyber terrorism, Internet is the most important technology required (Akhgar, Staniforth & Bosco, 2014). Without Internet, the terrorists cannot do anything illegal. Everything is controlled, operated and managed by this Internet.
  2. ii) Mobile Phones: This is the second most important technology in modern world. Mobile phones has brought whole world in the hands of an individual. Any body can contact another person in fewer seconds (Eid, 2012). These phones are even used by the cyber terrorists for their illegal acts. They hack the phones of innocent citizens and utilize their identity for wrong deeds.

Computer Systems:  Internet is either operated through mobile phones or through several systems (Dawson, 2015). The cyber terrorists for conducting their terrorism and affecting other people utilize this technology.

Cyber terrorism creates an extremely strong impact on the social, economic, political and legal sectors of any nation. This type of terrorism affects the entire nation and all the citizens are shaken by this kind of terrorist attack. All fields are controlled by systems. These systems include all the necessities of a society (Jarvis, Macdonald & Whiting, 2015). The infrastructure of these systems include several utilities like the electricity and water supplies, finance, banking, transport systems, controlling of air traffic and many more. The other utilities that are attacked are the information technologies, supply networks and other physical facilities. These utilities are either destroyed or degraded for a certain period of time. The main sufferers of this type of attacks are the citizens of the nation. The social sector of the country is affected (Bogdanoski & Petreski, 2013). The second impact is on the economic sector. This type of terrorism mainly affects the economic sector of the nation. In many cases, it is seen that after attacking in a bank or organization’s website, the terrorists are demanding ransom for their act. This affects a lot on the economic side of the country. The third impact is on the legal sector. All nations have their own rules and regulations. Whenever, this type of attack takes place, everybody blames the legislation of the country. The fourth impact is on the political sector of the country. Most of the cyber attacks take place because of the act of revenge on the political parties, acting on the nation (Bowman-Grieve, 2015). It is seen in various cases that political parties from other countries organize and hire cyber terrorists for attacking on any other nation.

Impact of Cyber Terrorism

According to me, cyber terrorism is a dangerous crime that should be avoided and mitigated on the highest priority. I have got the lesson that any kind of breaching of data or harm caused to a nation is known as cyber terrorism. This has become a serious problem in modern cyber world. I have learnt that they are several challenges and issues of cyber terrorism like absence of legislation, lack of communication and cooperation agency and many more. I have also learnt that various technologies are used in this type of terrorism and there is various impact of these attacks. The most important lesson that I have learnt from the above discussions is that nobody should be involved in any cyber breaches or threats as this is illegal and lead the person to prison.

Conclusion

Therefore, from the above discussion it can be concluded that, cyber terrorism is one of the most vulnerable threat for cyber world. The utilization of Internet has provided various advantages to the society. At the same time, this Internet has also turned out to be a terror for the society. All kinds of crime in today’s world are conducted through Internet. Cyber terrorism can be defined as the violent and cruel acts that are conducted for threatening or harming an individual or sometimes an entire nation. This is done by using the Internet to disrupt the networks of computer or to conduct various terrorist activities. These are done deliberately with the intention of causing harm. The above report provides a detailed discussion about the challenges, problems, relevant technologies and the applications to those technologies related to cyber terrorism. It also helps to understand the impact of this terrorism in the modern world. The report further provides the most important lesson that can be learnt from this discussion.

References

Ahmad, R. (2012). Perception on cyber terrorism: A focus group discussion approach. Journal of Information Security, 2012, 3, 231-237.

Ahmad, R., & Yunos, Z. (2012). A dynamic cyber terrorism framework. International Journal of Computer Science and Information Security, 10(2), 149.

Ahmad, R., & Yunos, Z. (2012). The application of mixed method in developing a cyber terrorism framework. Journal of Information Security, 2012,.

Ahmad, R., Yunos, Z., & Sahib, S. (2012, June). Understanding cyber terrorism: The grounded theory method applied. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on(pp. 323-328). IEEE.

Akhgar, B., Staniforth, A., & Bosco, F. (Eds.). (2014). Cyber crime and cyber terrorism investigator’s handbook. Syngress.

Awan, I. (2014). Debating the Term Cyber-terrorism: issues and problems. Internet Journal of Criminology. ISSN, 2045(6743), 1-14.

Awan, I., & Blakemore, B. (Eds.). (2016). Policing cyber hate, cyber threats and cyber terrorism. Routledge.

Bogdanoski, M., & Petreski, D. (2013). Cyber terrorism–global security threat. Contemporary Macedonian Defense-International Scientific Defense, Security and Peace Journal, 13(24), 59-73.

Bowman-Grieve, L. (2015). 5 Cyberterrorism and Moral Panics. Terrorism online: Politics, law and technology, 86.

Dawson, M. (Ed.). (2015). New threats and countermeasures in digital crime and cyber terrorism. IGI Global.

Eid, M. (2012). Cyber-terrorism and ethical journalism: A need for rationalism. In Ethical Impact of Technological Advancements and Applications in Society(pp. 263-283). IGI Global.

Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. The Journal of Strategic Information Systems, 22(2), 175-186.

Jarvis, L., Macdonald, S., & Whiting, A. (2015). Constructing cyberterrorism as a security threat: a study of international news media coverage. Perspectives on Terrorism, 9(1).

Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.

Tehrani, P. M., Manap, N. A., & Taji, H. (2013). Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. Computer Law & Security Review, 29(3), 207-215.

Uma, M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), 390-396.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP