Cyber-Terrorism

968 Words2 Pages

Cyber-Terrorism Cyber-Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacency when none of them come to fruition. In all honesty if you have a top-level virus-scanning program such as Norton, or McAfee your machine will be safe from most of the little viruses that you will come across. There is a propensity to copy and mutate existing viruses among the hacker community so they are easily identified and defended against by the scanning programs. Many of the viruses are meant to be detected; it is a high tech game of cat and mouse between the hackers and the Tech security groups. For the most part hackers want their viruses to be caught before they cause major damage. The prestige lies within the acknowledgement that your “kung fu” is superior among your peers. It follows that a reported virus where the potential level of catastrophe is dire but there is minimal damage done holds far more esteem then crashing a multitude of systems without any knowledge of the super virus reaching the media. There is a high level of taunting and signature traits contained within the viruses that give leads but are just enough not to get caught, it becomes an adrenaline rush for these groups to push the envelope and toe the edge. These viruses are not what the government is concerned with and end up being nothing more then a... ... middle of paper ... ...wake of new war on terrorism.(Anti-terrorism Act of 2001) Jennifer Jones. InfoWorld, Oct 1, 2001 v23 i40 p24. Privacy: Too high a price? FBI and DOJ seek expanded authority to monitor communications. Carmen Nobel. eWeek, Sept 17, 2001 p16. Elec. Coll.: .A78542671. -- Text Available -- Cert.(summary of recent hacker attacks)(Brief Article) Computer Weekly, Sept 13, 2001 p44. Elec. Coll.: A78690482. -- Text Available -- Don't let monitoring tactics attack employee privacy. Ira Hobbs. Government Computer News, Sept 10, 2001 v20 i27 p72. Elec. Coll.: A78176683. -- Text Available – U.S. may face net-based holy war.(Industry Trend or Event) Dan Verton. Computerworld, Nov 13, 2000 p1. Elec. Coll.: A69544947.

More about Cyber-Terrorism

Open Document