Technological advancement has led to several cyber-related crimes that negatively affected cyber security. However, the world has never experienced a real state of cyberterrorism and might never experience it. Cyberterrorism refers to cyberattacks of computer systems that target a bigger audience and may cause physical harm and property destruction (Kenney, 2016). The world may never experience cyberterrorism because any form of cyberattack is an opportunity for the cybersecurity to advance in complexity. Technology developers are always on high alert to avert any forms of cyberattacks by developing more complex software to counterattack those cyberattacks. For instance, the United States has never experienced cyberattacks similar to the ones experienced on its financial institutions in 2012 because reliable measures to prevent such kind of attacks have since been put in place. Technology is ahead of the threats facing cybersecurity, thus, the possibility of hackers dominating the technology world are very minimal.
Cyberterrorism is more of a fiction than a reality in a world where technology is advancing at an alarming rate. The perpetrators of cyberterrorism as well as the target audience are unreliable (Jarvis, Macdonald, & Whiting, 2016). For cyberterrorism to be successful, the target audience must be using technology prior to the attack. Suicidal bombs attacks and other forms of physical attacks to a large audience have succeeded because the parameters for attack are well planned and easy to execute. However, for cyberterrorism the parameters for a successful attack are unclear because everything is done through the internet. Therefore, for a cyberterrorism attack to transcend through a system that is highly guarded is difficult. Reliable cybersecurity measures have been put in place and any form of attack can easily be traced and counterattacked before causing harm to data or persons. It might take many centuries before the world witnesses a real cyberterrorism.
Delegate your assignment to our experts and they will do the rest.
References
Jarvis, L., Macdonald, S., & Whiting, A. (2016). Unpacking Cyberterrorism Discourse: Specificity, Status, and Scale in News Media Constructions of Threat. 2(1): 64 – 87.
Kenney, M. (2016). Cyberspace. p. 129-171. file:///C:/Users/User/Downloads/_8_Kenney%20M%20_2015_.pdf