The United States Is Vulnerable to Cyberterrorism

1393 Words3 Pages

"Information systems are vulnerable and it is possible for terrorists to utilize the vulnerabilities of information systems to attack their adversaries" (Hua & Bapna 2013). Since the events of 9/11 the world has watched as terrorism has slowly began to escalate not only in severity but frequency however, until recently nations including the United States have been more focused on traditional methods of terrorism and paid little effort to the growing concern of cyberterrorism. Hua and Bapta (2013) define cyberterrorism as: ”Attacks implemented by cyber terrorists via information systems to (1) significantly interfere with the political, social or economic functioning of a critically important group or organization of a nation, or (2) induce physical violence and/or create panic. We define hackers as individuals who (1) wish to access/modify data, files, and resources without having the necessary authorization to do so, and/or (2) wish to block services to authorized users. Cyber terrorists are individuals or groups who utilize computing and networking technologies to terrorize. In this paper, we study the behaviors of two groups of hackers: cyber terrorists and common hackers" (Hua & Bapna 2013). While there are several competing if loosely defined definitions of cyberterrorism, Hua and Bapta have clearly broken down the core elements to illuminate the nuances between traditional terrorism and an ordinary hacker. As Hua and Bapta aptly state, "modern economies are heavily dependent upon Information Technology (IT) based information systems for survival" (Hua & Bapna 2013). Given our dependence on Information Systems, some effort of consideration must be given to securing them. There currently exists no international cooperative ... ... middle of paper ... ...tors responsible for securing these systems. Hopefully preventative measures can be deployed before a critical attack occurs. Works Cited Hardy, K. (2011). WWWMDs: Cyber-attacks against infrastructure in domestic anti-terror laws. Computer Law & Security Review, 27(2), 152-161. doi:10.1016/j.clsr.2011.01.008 Hua, J., & Bapna, S. (2013). The economic impact of cyber terrorism. Journal Of Strategic Information Systems, 22(2), 175-186. doi:10.1016/j.jsis.2012.10.004 Janairo, E. (2002). States fight against cyber-terrorism: cyber-attacks could intensify a terrorism attack and severely damage the nation's ability to fight crime. (terrorism). State Government News, (3), 30. Zetter, K. (2012, September 26). Maker of Smart-Grid Control Software Hacked. Wired.com. Retrieved November 23, 2013, from http://www.wired.com/threatlevel/2012/09/scada-vendor-telvent-hacked/

More about The United States Is Vulnerable to Cyberterrorism

Open Document