Essay about Cyber Terrorism: A Threat to the United States

:: 14 Works Cited
Length: 2077 words (5.9 double-spaced pages)
Rating: Blue      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

This original product provides perspective and understanding of the nature and capacity of an emerging threat against the United States. This assists federal, state, local and tribal government agencies and authorities, and other entities develop priorities for protective measures and understanding relating to an existing or emerging threat to the national security of the United States.

Key Terms:
- Cyber Terrorism: “Any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in the violence against non-combatant targets by sub-national groups or clandestine groups.”

A cyber terrorism attack is designed to inflict physical violence or financial destruction. Possible cyber terrorist targets include banking facilities, military bases, power plants, air traffic control centers and water systems.

- Cyber Attack: “An assault against a computer system or network.”

A cyber attack has the potential to create extreme economic damage that is out of proportion to the low cost of initiating the attack. A successful cyber attack targets vulnerable computers, forcing them to malfunction or become disabled, whereby businesses, financial institutions, medical institutions and government agencies are not able to use them.

Key Question(s)

* Could cyber terrorism be the next threat to the national security of the United States?
- What is the background of cyber terrorism? What can the past tell about cyber terrorism and its threat to the United States?
- What effect can cyber terrorism have on the United States?
- What is the likelihood of a cyber terrorism attack? Are critical infrastructures vulnerable to an attack and are te...

... middle of paper ...

...tent. 21 January 2010.
Cyber Terrorism. Directions Media. October 2003.
Cyber Terrorism: The Past, the Present, and the Future. Associated Content. 21 January 2010.
Cyberterrorism. Georgetown University, Dorothy E. Denning. 23 May 2000.
Cyberterrorism: How real is the threat?. United States Institute of Peace. December 2004.
Leftwing Extremists Likely to Increase Cyber Attacks Over Coming Decade. DHS Assessment. 26 Jaunuary 2009.
Cyber Terrorism Attacks. IGI Global. 20 January 2010.
In a doomsday cyber attack scenario, answers are unsettling. Los Angeles Times. 17 February 2010
In a doomsday cyber attack scenario, answers are unsettling. Los Angeles Times. 17 February 2010
Officials Warn al-Qaeda ‘Certain’ to Try Attack Soon. U.S. News. 03 February 2010.

Click the button above to view the complete essay, speech, term paper, or research paper

This essay is 100% guaranteed.

Title Length Color Rating  
State and Non-state Actors that Pose the Greatest Cyber Threat to the United States - ... Infrastructures can be physical architecture or a logical component and although cyberspace and information and communication technologies (ICT) is oftentimes considered as a distinct segment, it’s encompassed into every segment thus invalidates its singular entity. When dependencies extend into global boundaries, this creates fluctuating interests and incentives in a predominately commercial space. (Clemente, 2013). Subsequently, policy and decision-making isn’t in the hands of the government only, but the private and public sectors that are notably interlinked....   [tags: homeland security, terrorism, ]
:: 22 Works Cited
1669 words
(4.8 pages)
Powerful Essays [preview]
The Dangers of Cyber-Terrorism Essay - In the future, cyber crime will become the leading threat to the safety and security of the American people. Experts on cyber crime agree that cyber crime is an issue that needs to be focused on more in-depth because the wide-spread use of computers by the global economy has made the use of computers and internet vital to everyday life (Siegel, 2009; FBI, 2011). There are 3 major types of cyber crime which includes: cyber fraud, cyber vandalism, and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the more dangerous of the 3, is defined as the use of digital equipment to bring down a country by tapping into its computer based programs and dismantling its infrastructure which incl...   [tags: Terrorism Without Borders]
:: 14 Works Cited
1452 words
(4.1 pages)
Powerful Essays [preview]
Global Threat Assessment Essay - I. Introduction The United States is in an era where technology is advancing at a quicker pace than the education of society and its users can understand. This is a problem because the economic woes and critical infrastructures are included in every aspect of this fast paced evolution of technology. Threat topics will be discussed using multiple sources from the Internet and online library. An additional main source will be pulled directly from reports from the Director of National Intelligence, James R....   [tags: Global Threat Intelligence]
:: 3 Works Cited
1133 words
(3.2 pages)
Strong Essays [preview]
Essay on CyberCrime and Terrorism - Throughout the years, there has been a steady increase in the amount of cyber crime committed. Technology is a constantly changing entity, constantly evolving, always progressing. Naturally this can make it hard to stay on top of things. In turn, law enforcement runs into various issues regarding cyber crime and cyber terrorism. Cyber crime and terrorism is so complex of a crime that it can be hard to break down the barriers that can lead to justifying the action. Major issues that are prominent in cyber crime and terrorism are that laws vary greatly from country to country....   [tags: Internet Crime, Cyber Crime Essays] 1081 words
(3.1 pages)
Strong Essays [preview]
From Hacking to Cyber Terrorism Essay - From Hacking to Cyber Terrorism Introduction Information technology (IT) is evolving everyday and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time we are also observing explosive growth in the darker side of the IT - regarding hacking and cyber crimes....   [tags: Computers Software Hackers Essays]
:: 12 Works Cited
3979 words
(11.4 pages)
Powerful Essays [preview]
Cyber-terrorism Essay - "It is now clear that cyber threat is one of the most serious economic and national security challenges we face as a nation," President Obama has said in one of his addresses to the nation. He would go on the say that "We know that cyber intruders have probed our electrical grid, and that in other countries cyber attacks have plunged entire cities into darkness." (Net, 2009) When the president of the United States puts this much emphasis into a subject it shows how important it is and how big of an impact it could have on the nation....   [tags: cyber attacks, 2015]
:: 3 Works Cited
1013 words
(2.9 pages)
Better Essays [preview]
Essay on Domestic and Mass Surveillance - Domestic surveillance has been active in the United States for years now. The Foreign Intelligence Surveillance Act (FISA) was the first step taken by our government to help secure our nation electronically. The Foreign Intelligence Surveillance Act of 1978 is a United States federal law which prescribes procedures for the physical and electronic surveillance collection. Over the years domestic surveillance has evolved due to terrorists act on U.S soil. The September 11 attack in which four coordinated terrorist attacked the twin towers and pentagon that took place in New York and Washington, D.C....   [tags: Terrorism, Civil Liberties, Threat]
:: 12 Works Cited
1458 words
(4.2 pages)
Powerful Essays [preview]
Cyber Security Departments Essay - As the use of technology has increased drastically over the last two decades, so has our need for technology. Technology has become a part about our everyday life and we can find technology being used nearly everywhere. Most systems in today’s countries and societies rely on technological infrastructure; these systems include transport systems, factory systems, power plant systems and water sanitation systems. This brings on the question of to what extent have governments developed their cyber security departments, what evidence is there of governmental involvement in malware attacks and why should governments be concerned about cyber security....   [tags: Threats, Government, Technology]
:: 29 Works Cited
1888 words
(5.4 pages)
Term Papers [preview]
The Threat of Cyberwarfare and Cyberterrorism Essay - In the United States, the Federal Bureau of Investigations (FBI) regards terrorism as forceful and violent acts used for coercion and directed at the government, civilian population, or any portion of either for the purpose achieving either a political or a socially relevant goal (Schmalleger & Pittaro, 2009). However, with the advent of the internet acts of coercion and intimidation can be accomplished without the use of force or violence (Schmalleger & Pittaro, 2009; Stohl, 2007). Weimann (2005) defined cyber-terrorism as act performed with cyber-network tools to “shut down critical national infrastructures…” (Cited in Stohl, 2007, p....   [tags: Cyberterrorism Essays]
:: 13 Works Cited
1684 words
(4.8 pages)
Powerful Essays [preview]
Cyber-Terrorism Essay - Cyber-Terrorism Cyber-Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacency when none of them come to fruition....   [tags: Papers] 968 words
(2.8 pages)
Strong Essays [preview]