Wednesday, April 24, 2019
Discuss some of the treats that Cyberterrorism pose. How can Essay
Discuss some of the treats that Cyberterrorism pose. How domiciliate cyberattacks be prevented - Essay ExampleThis new pattern of threats has been termed as cyber threats, and in the present scenario, there is no section of society that can afford it. The modus operandi of cyber threats entails the appointment of computing device technology to perpetrate fraud, heinous crimes and other harmful acts against society. These threats are principally aimed at destroying the inherent modulate of society. Thus, cybercrime can be understood as crimes that are committed through computer networks or by using the Internet (Brenner 381 - 383).Terrorists harvest money and indulge in other criminal objectives via computer technology. Their requirements for conducting such nefarious activities are a personal computer with an internet connection. With this arsenal, even smalltime cyber terrorists can go through with other members in their group and their opponents. They utilize the internet to share novel methods to employ in their incoming attacks and other important information. Terrorists have created their own intelligence networks through the internet and the expenditure incurred by them, in gathering intelligence is negligible, in comparison to the amount spent by most nations for collecting intelligence. Furthermore, terrorists can easily plan and execute their operations through computer networks. These terrorist groups assist each other, in order to enhance their cyber capabilities and they interact with each other, for the purposes of planning and commissioning their projects. They have the capability to attack the Global education Grid and the systems connected to it. Their ultimate aim is to destroy critical infrastructure. The general perception is that terrorists are associated with sensible violence and death. However, in marked variance to this general view about terrorists and their operations, several terrorists are super educated and capable of h andling the highly sophisticated computer technologies. These
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.