Preview
Preview

The Dangers of Cyber-Terrorism Essay

:: 14 Works Cited
Length: 1452 words (4.1 double-spaced pages)
Rating: Blue      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

In the future, cyber crime will become the leading threat to the safety and security of the American people. Experts on cyber crime agree that cyber crime is an issue that needs to be focused on more in-depth because the wide-spread use of computers by the global economy has made the use of computers and internet vital to everyday life (Siegel, 2009; FBI, 2011). There are 3 major types of cyber crime which includes: cyber fraud, cyber vandalism, and cyber terrorism (Seigel, 2009; Thio, 2010). Cyber terrorism, the more dangerous of the 3, is defined as the use of digital equipment to bring down a country by tapping into its computer based programs and dismantling its infrastructure which includes but not limited to: banking networks, air traffic control systems, gas and oil production, transportation, and emergency services that all rely on computer networks to function (Thio, 2010). Director of National Intelligence, Dennis Blair and Thio (2010), both agree that it is America’s huge dependence on the cyber world for its critical life support functions that makes it severely vulnerable to succumbing to an unprecedented electronic attack. Just like a traditional attack, Cyber terrorism can lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss (Thio, 2010).
First of all, the thing that makes cyber terrorism intrinsically different from standard terrorism attacks is the fact that it is barrier proof and terrorists can bypass the American law because they can operate in countries that do not have laws against cyber terrorism (Siegel, 2009). Cyber terrorists can also use the internet as a supplement to regular attacks because they can obtain information about target countries an...


... middle of paper ...


...d War Is Raging".2011. CNNMoney.
Retrieved July 31, 2011. .
Nakashima, Ellen. (2010). "FBI Director Warns of 'rapidly Expanding' Cyberterrorism
Threat” Washingtonpost.com Retrieved July 23, 20011. http://www.washingtonpost.com/wpdyn/content/article/2010/03/04/AR2010030405066.html
"News Corp. to NY Post Staff: 'Preserve' Info Related to Hacks, Bribes”.2011.CNN.com
Retrieved July 25, 2011 .
Sproles, Jimmy, and Will Byars. "Cyber Terrorism".1998. Retrieved July 30, 2011.
.
Thio, Alex 2010. Deviant Behavior. Ally and Beacon: Boston 3rd ed.
Weimann, Gabriel.2004. “Cyberterrorism: How real is the Threat?”United States Institute of
Peace Special Report. Spring 2004 pp.(1-12)


Click the button above to view the complete essay, speech, term paper, or research paper








This essay is 100% guaranteed.


Title Length Color Rating  
Cyber Security and Technology Essay - ... You can make up to $90,000 a year but all of a sudden your bank account was $0.00 along with all your coworkers, bosses and the company stock dropped to zero. There would be panic, chaos and disorder due to everyone losing their money. The culprit of such a chaotic situation was a result of a cyber-attack by a hacker. The cyber attacker hacked into the system and caused the databases to transfer all of the money into some bank accounts elsewhere. This is just one example of cyber terrorism and all the damage it is can do to people lives....   [tags: information, cyberspace, access, internet]
:: 5 Works Cited
1109 words
(3.2 pages)
Better Essays [preview]
Stop Cyber Warfare Before It Happens Essay - Shortly after the horrendous violations of human rights by the Nazi’s, in 1949 the Geneva Convention was created. This fourth treaty was established to create the rules and regulations of what is expectable in times of warfare. It gives protection to civilians in times when war tares families and countries apart. President Obama speaking on the importance of the fourth Geneva Convention stated, “We lose ourselves when we compromise the very ideals that we fight to defend…And we honor those ideals by upholding them not when it's easy, but when it is hard” (“President”)....   [tags: International Conflict ]
:: 20 Works Cited
2500 words
(7.1 pages)
Powerful Essays [preview]
Discussion of Terrorism Essay - Discussion of Terrorism Terrorism, as defined by Title 22 of the United States code, section 2656f(d), is the "pre-meditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence and audience." Islamic terrorism is a serious problem for the United States because of the threat to national security, innocent civilians, and the foundations of democratic societies throughout the world....   [tags: Papers] 2337 words
(6.7 pages)
Strong Essays [preview]
Cyber Warfare: Defending Against a New Form of Terrorism Essay - ... New War Fighting Methods Cyber or Network attacking is being globally recognized as a unique domain of warfare that requires new offensive tactics and rules of engagement by the US government. The initial strategy for training within the government was to approach this new type of warfare as a physical one such as they do with the traditional domains of land, air, sea and space. The electronic devices used to communicate were thought of as physical manifestations of cyberspace (Refocusing cyber warfare thought, 2013)....   [tags: hackers, threat, cyber-attack]
:: 4 Works Cited
811 words
(2.3 pages)
Better Essays [preview]
Essay about Cyber Terrorism: A Threat to the United States - Scope This original product provides perspective and understanding of the nature and capacity of an emerging threat against the United States. This assists federal, state, local and tribal government agencies and authorities, and other entities develop priorities for protective measures and understanding relating to an existing or emerging threat to the national security of the United States. Key Terms: - Cyber Terrorism: “Any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in the violence against non-combatant targets by sub-national groups or clandestine groups.” A cyber terrorism attack is designed to inflic...   [tags: Terrorism, hackers, national security]
:: 14 Works Cited
2077 words
(5.9 pages)
Powerful Essays [preview]
Cyber-War and Cyber-Terrorism Defined Essay - ... Other known forms of threats also include: theft of data, alteration of data, hardware/software failure, and seizures in service due to system problems which include power failures, manmade/natural disasters and poorly protected systems. Cyber-war and cyber-terrorism pose a unique and set of challenges for security experts, not only in detecting and preventing intrusions but also in tracking down perpetrators and bringing them to justice. No organization or individual is or will ever be truly immune to cyber-crimes – if there is a benefit or value seen by infiltrating one’s personal data or an organizations there will always be a potential threat and cyber criminals seeking to gain the i...   [tags: attacks, internet] 2083 words
(6 pages)
Research Papers [preview]
Essay Traditional and Cyber Terrorism - ... One of the best examples of cyber terrorism is murder committed in 1998 in one of the hospitals of the U.S , where under the confidential security of FBI was very important witness, terrorist gained access to the hospital through the internet and transformed cardio stimulation machine, as a result of what patient died. Very often in contrast with traditional terrorist, cyber terrorists commit some acts for their own interest. While ordinary terrorists who commit acts for their country and nation and are considered to be heroes for their deeds....   [tags: bombs, modern technology weapon] 546 words
(1.6 pages)
Good Essays [preview]
Cyber-terrorism Essay - "It is now clear that cyber threat is one of the most serious economic and national security challenges we face as a nation," President Obama has said in one of his addresses to the nation. He would go on the say that "We know that cyber intruders have probed our electrical grid, and that in other countries cyber attacks have plunged entire cities into darkness." (Net Security.org, 2009) When the president of the United States puts this much emphasis into a subject it shows how important it is and how big of an impact it could have on the nation....   [tags: cyber attacks, 2015]
:: 3 Works Cited
1013 words
(2.9 pages)
Better Essays [preview]
Cyber Terrorism Essay - Cyber Terrorism Thus far we have scratched the surface of the ever-perplexing problem of terrorism. As it has evolved those in the position of countering it have also gained some valuable experience. Even with this knowledge it is very difficult, bordering on impossible to prevent terrorist acts from occurring. In the recent past there has been an extra element added to this confusing and dangerous equation, the Internet and other computer capabilities. Cyber-terrorism is a realistic possibility but is it as detrimental as other forms of conventional terrorism such as a car bomb....   [tags: Internet Web Cyberspace Terror Essays]
:: 4 Works Cited
1166 words
(3.3 pages)
Strong Essays [preview]
Cyber-Terrorism Essay - Cyber-Terrorism Cyber-Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacency when none of them come to fruition....   [tags: Papers] 968 words
(2.8 pages)
Strong Essays [preview]