})(window,document,'script','dataLayer','GTM-55V2NQQ6');

Cyberterrorism: Stepping On The Razor’s Edge

954 words | 4 page(s)

Is cyberterrorism a serious threat that can potentially affect us all? The issue is observed from both theoretical and empirical perspectives as in the digital age every Internet user is a potential victim of cyber terrorists.

Various definitions of the term imply to the fact that cyberterrorism presents a hazardous threat to individuals and institutions as there is a permanently existing possibility of cyber attacks on infrastructural objects, financial systems, as well as everyday computing in any part of the world. Compared to other everyday digital attacks such as spam or phishing, cyberterrorism is regarded as a rather sinister enterprise that synergizes cyberspace and terrorism (Holland 25). It involves threats of attack and unlawful attacks against computers, information systems and networks, and all the data stored therein. Cyber attacks are aimed to coerce organizational and government operations and cause turmoil in the operation of information systems that serve strategically important objects (Stone 154-155).

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Cyberterrorism: Stepping On The Razor’s Edge".

Order Now
Promocode: custom20

Proper comprehension of the essence and potential threat of cyberterrorism consists in the consideration of two factors. First, it is important to know whether there are targets vulnerable to such attacks that can cause severe harm and violence. Second, it is important to identify actors capable to carry such attacks out (Whiteback 148-150).

Even though many weak spots in computerized systems can be eliminated, it is virtually impossible to cope with all of them. Despite modern technologies are offering sound security, they are frequently modified and configured, which makes them open to cyber attacks. Furthermore, the intervention of insiders is always possible. They can act alone or together with outside terrorists and misuse their access powers (Denning 3). Considering the increasing interconnectivity of the modern society and its unprecedented dependence on the information and communication technologies, the attacks of cyber terrorists are not less hazardous than those made by their real-world counterparts. Not less devastating and costly are the consequences of cyber attacks as their potential ranges from endangerment of personal computers to blocking the operations of state and national security systems. Hence, cyberterrorism is a serious business that assumes the destruction of the information infrastructures and their actual machinery and remote disruption of information technologies that are vital for the Internet functions and connectivity, operation of government computer networks, as well as vitally important civil systems including mass media and financial networks (Crenshaw 4). Furthermore, cyber terrorists often misuse computer networks to operate the machines that control such strategic infrastructural objects as power plants, traffic lights, and dams to cause chaos among unsuspecting populations (Collin 16).

Just as all other acts of terror, cyberterrorism is well motivated and executed by small illegal groups of tech gurus to influence public, decision-makers and governments, as well as to call public attention, spread fear, or influence the society in any other manner. Compared to physical terrorists who act by small groups and advantage limited resources; cyber terrorists implement virtual attacks throughout the Internet and other open and publicly accessible networks. At that, the cyber attackers remain invisible while their location cannot be identified. It often takes years of special operations to uncover cyber schemes and the groups involved (HLS 9).

Acts of cyberterrorism are hazardous as they are initially oriented at the disruption of social reliance on telecommunication networks and computers by threatening the digital infrastructure that maintains computer networks regulating such essential functions as water supply, flow of power, financial services, telecommunication networks, medical care, and transportation systems. Thus, public and private sectors should never underestimate the potential hazards and costly consequences of cyber attacks since the overwhelming dependence on information and communications systems, networks and computers implies that modern infrastructure is rather vulnerable to cyber attack from any spot on Earth. The hazardous consequences cannot be predicted as cyber terrorist attacks are often hardly different from singular hacker-type incidents since the tools for cyber attacks are readily available, easily used, and widely advertised (Whitelaw 46).

In reality, cyber attacks are virtually one-step forward above the measures taken by the responsible authorities that should warn and prevent it. Mostly, cyber attackers are experienced tech gurus who previously gained practical experience in prestigious organizations. Thus, as a rule, every cyber attack is a shock to a targeted organization and wide public overall. Unfortunately, cyberterrorism is a permanently existing hazard as so far we can only cope with its consequences rather than effectively prevent the attacks.

Reflection
In this article, I presented proper comprehension of the essence of cyber terrorism by analyzing the core motives and potential threats of this hazardous endeavor. I used the data from a vast variety of up-to-date sources to prove the outlined arguments right and provide proper evidence. My opinions generally coincide with those of the authors I have cited. Their arguments were objective and unprejudiced. The sources I used present theoretical importance in the way we understand cyberterrorism and are capable to differentiate it from other computer attacks and physical acts of terror. Theoretical definitions and argumentative analysis enabled me to come up with personal conclusion that cyberterrorism cannot be properly prevented so far.

    References
  • Collin, B. The Future of Cyberterrorism, Crime and Justice International, March 1997, pp.15-18. 1997.
  • Crenshaw, M . How Terrorism Ends. US Institute of Peace Working Group Report, 1999.
  • Denning, D., “Cyberterrorism”, Testimony before the Special Oversight Panel of TerrorismCommittee on Armed Services, US House of Representatives, 2000.
  • HLS, National Strategy for Homeland Security. Office of Homeland Security. July 2002.
  • Holland, J. Investigators look into how library computers may have linked terrorists. South Florida Sun-Sentineel. Miami, FL. 2001.
  • Stone, V. Social interaction and social development in virtual environments. Teleoperators
    and Virtual Environments, Vol. 2. pp. 153-161. 1993.
  • Whiteback, C.Virtual environments: Ethical issues and significant confusions. Teleoperators
    and Virtual Environments, Vol. 2. pp. 147-152. 1993.
  • Whitelaw, K.. Terrorists on the Web: Electronic ‘Safe Haven’. US News & World Report, Vol.124, p. 46. 1998.

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now