25 Jan 2023

73

Cyberterrorism on Social Media: An Emerging Form of Cyberterrorism

Format: APA

Academic level: College

Paper type: Research Paper

Words: 548

Pages: 2

Downloads: 0

Cyberterrorism refers to the tendency of unauthorized access to another organization’s computer system and launching attacks into the computer system by either fraudulently accessing information or spoiling that information. According to Lewis (2002), cyberterrorism involves launching an attack on a computer system without their knowledge to cause havoc and paralyzing a nation’s activities. Modern society widely uses computers in doing almost everything; thus, terrorists target computer systems to hurt countries and organizations. It has become the new form of terrorism and the modern crime that needs to be addressed by security organizations. They include hacking computer systems, engaging in email-related crimes, and instilling computer viruses to cause destruction to systems. 

Intentions for cyberterrorism : Cyberterrorism comes in different forms, which are defined by the motivational factor behind cyber terrorism. Different cyberterrorists conduct crime for different reasons and target a different set of computer systems (Al Mazari et al., 2018). Security systems should know the intentions of cyber terrorists to enable them to understand their movements and be in a good position to protect computer systems from such attacks. Cyberterrorism targeting infrastructure- Intended at destroying the operational ability of an enemy. Cyberterrorism can be politically instigated- 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Meant for destroying the reputation of a country, an organization, or an individual. 

Cyberterrorism can also be conducted with the intention of persuading the targeted people or organizations to change their affiliation. 

Demonstrating might and capability of inflicting attack to one’s followers. 

Cyberterrorism for theft: accessing cryptocurrency and stealing funds from financial companies. 

Cyberterrorism is meant for intimidation of the government. 

Cyberterrorism is meant for the creation of annoyance. 

Types of Cyberterrorism Attacks  (Albahar, 2019): 

Advanced structured attack 

Simple unstructured attack 

Complex coordinated attack 

Denial of service 

Disinformation 

Incursion 

Destruction 

Websites defacement 

Cyberterrorism on Social Media: An emerging form of cyberterrorism : Social media platforms have become a common target and ground for cyber terrorists to advance their intentions. Social media platforms are continuing to attract more active users every day for their flexibility and simple nature (Parlakkılıç, 2018). This makes them an easy target for cyber terrorists. Individuals, organizations, and government agencies use social media for information dissemination. 

How social media is used for crime; distribution of malware and other tools of cyberterrorism, spreading malware for crypto-mining, bullying people. 

Categories of threat on social media cyberterrorism: Propaganda, financing, training cyberterrorists, planning for cybercrimes, and execution. 

Dealing with Cyberterrorism : There are various ways that security systems can employ in dealing with cyberterrorism attacks (Gordon & Ford, 2002). Dealing with them can either be in the form of preventing cyberterrorism or dealing with the aftermath. 

Prevention 

Developing security strategies. 

Being proactive. 

Installing security software (Gordon & Ford, 2002). 

Increasing security awareness. 

Dealing with the Aftermath: 

Prosecution of perpetrators. 

Establishment of disaster recovery plans. 

Conclusion

It is quite evident how cyberterrorism has emerged as a new form of terrorism used in the 21st Century. Technology, despite having a whole load of advantages, has come with challenges, cyberterrorism being a major one. Cyberterrorists execute their plans with different intentions, which define their motivational factors. The different intentions of cyber terrorists range from politically instigated attacks, theft, government intimidation, and the simple desire for the creation of annoyance. Cyber terrorism comes in different forms; the different types of attacks define how different attackers conduct their work. Social media is an emerging trend in cyber-terrorism that ought to be looked at. Due to its growing usage, cyber terrorists are using social media as a tool and target for their work. Fortunately, cyberterrorism can be managed. There are various ways through which cyberterrorism can be prevented or managed after the occurrence.  

References

Al Mazari, A., Anjariny, A. H., Habib, S. A., & Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies. In  Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications  (pp. 608-621). IGI Global. 

Albahar, M. (2019). Cyber attacks and terrorism: a twenty-first century conundrum.  Science and engineering ethics 25 (4), 993-1006. 

Gordon, S., & Ford, R. (2002). Cyberterrorism?.  Computers & Security 21 (7), 636-647. 

Lewis, J. A. (2002).  Assessing the risks of cyber terrorism, cyber war and other cyber threats . Washington, DC: Center for Strategic & International Studies. 

Parlakkılıç, A. (2018). Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach.  International Journal of Information Security Science 7 (4), 172-178. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Cyberterrorism on Social Media: An Emerging Form of Cyberterrorism.
https://studybounty.com/cyberterrorism-on-social-media-an-emerging-form-of-cyberterrorism-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 165

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 182

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration