Threats and Implications of Cyber Terrorism


The potential for mass destruction as a result of cyber terrorism is a serious concern in the modern world. Cyber terrorists have at their disposal a wide variety of tactics they can use to injure their targets. Computers are an integral part of modern life in the world. However, with this technology has come a threat of its use as a weapon of terrorism. Cyber terrorists use a variety of tactics to cause fear and panic in others. Their motives are often to simply create terror, although money also motivates cyber terrorists to attack.


Cyber terrorists use many different methods ranging in complexity. Each terrorist group has a different agenda and can tailor the tool they use to fit their goals. The effects of a cyber terrorism attack could be widespread and very detrimental to life as we know it. Cyber terrorism ranges from hacking into a computer and destroying it to spreading viruses in order to obtain information. Cyber terrorists can infect many computers with viruses that can destroy a computer or just damage certain components. They also can plant Trojan horses, which a executable that can allow a remote user to control the computer, collect personal information and passwords, or destroy a hard drive. Another common method is placing worms, a program which can spread itself, on a machine or a network. Often these tactics are accomplished through email or other network vulnerabilities.


One of the worst aspects of cyber terrorism is the amount of potential economic impact to the target in proportion to the low cost to the terrorist of initiating an attack. The financial costs to the economy include the loss of intellectual property and trade secrets, fraud, productivity losses. This is not including intangible losses such as damage to reputation and lost opportunity costs. A single virus can cause widespread injury and huge financial losses. The Love Bug Virus was estimated to have caused losses of between three and fifteen billion dollars. In comparison, hurricane Andrew, the most expensive natural disaster in history, cost around eleven billion dollars.

Web: New weapon for Terrorists

Based on the recently researchs which published in FBI official website, The use of the Internet by terrorists has increased in the past nine years and the number of websites operated by terrorist organizations has increased from 12 in 1998 to more than 4,800 today.




After a search on the Internet and reading articles about cyber terrorism, I find that terrorists use the Internet in some areas like data mining, networking with a wrong purpose, mobilization, the distribution of online manuals and instructions, planning for their target and try to have a corporation with other terrorists. They draw information from personal and government sites and communicate with others through e-mail and chat rooms. Based on some reports one of the major way which terrorists most of the time relies on that is the process of hiding data inside other data, for instance, hiding the map of a targeted building in a digital song file.




Now the question is that what is the solution?
Based on all of these assumption, government organizations find a way for hyper computers to remain safe,reliable and trustable. They isolated defense and intelligence computers and physically not connected them to the Internet. In the other hand, businesses and individuals protect their computers through firewalls

Cyber terrorism


When I read articles which are related to cyber terrorism, I found that behind legal ways which we can prevent crimes in cyber spaces ,at this time there are some ways to protect a system completely which can never be accessed by anyone. Most of the governmental and military information is kept on secure databases (software) with no outside connection, to prevent any act which in case happens as a cyber terrorism act. Beside of these kinds of isolation, the major way which is certified by scientists for safe procedure of protection is encryption. Encryption is that it does not protect the entire system, an attack designed to disable the whole system, such as a virus, is unaffected by encryption.


Other way is the use of firewalls to screen all communications to a system, including e-mail

messages. Firewall is a common and familiar term for methods of filtering access to a network.

They may come in the form of a computer, router other communications device or in the form of

a network configuration. One method is to screen user requests to check if they come from a

previously defined domain or Internet Protocol (IP) address. Another method is to prohibit

Telnet access into the system.


Copyright © 2010 Amazing world All rights reserved.
Wp Theme by Templatesnext . Blogger Template by Anshul