16 Jan 2023

50

What is Cyberterrorism? - Definition

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1261

Pages: 5

Downloads: 0

Cyberterrorism refers to the tendency of unauthorized access to another organization's computer system and launching attacks into the computer system by either fraudulently accessing information or spoiling that information. According to Lewis (2002), cyberterrorism involves launching an attack on a computer system without knowing to cause havoc and paralyzing a nation's activities. Modern society widely uses computers in doing almost everything; thus, terrorists target computer systems to hurt countries and organizations. It has become the new form of terrorism and the modern crime that security organizations need to address. They include hacking computer systems, engaging in email-related crimes, and instilling computer viruses to destroy systems. 

Intentions for cyberterrorism 

Cyberterrorism comes in different forms, which are defined by the motivational factor behind cyber terrorism. Different cyberterrorists conduct crime for different reasons and target a different set of computer systems (Al Mazari et al., 2018). Security systems should know the intentions of cyber terrorists to understand their movements and be in a good position to protect computer systems from such attacks. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The first form of cyberterrorism is an attack on military forces, which targets a wide range of military systems, services, operations, infrastructure, and other capabilities (Al Mazari et al., 2018). Various terrorist groups use the internet to conduct cyber terror attacks against the United States, thereby creating a virtual battlefield between conflicting military parties. A case was reported in 2011 of cybercrime when the Pakistani Hackerz Club tarnished many US government websites, including the US Air Force Computing Environment and the White House website. Another form of cyberterrorism is an attack that targets the physical infrastructure of a government, whose intention is to destroy the operational ability of an enemy. Lewis (2002) records an incident in 2001 in the US root server when an unknown body attacked them using a Distributed Denial of Service that later shut down the servers for s specific time. Such attacks have been recorded by different countries, such as communications services attack in the US (1997), impersonation attack on the UAE's Ministry of Labor (2010), and debilitating attack on the US Commerce Department in 2006 (Al Mazari et al., 2018). 

Al Mazari et al. (2018) present a cyber-terrorism attack against the social and national entity as a form of cyberterrorism that targets misrepresent the reputation of a national entity or an organization. They take different forms, such as using email and social networks, to spread false rumors concerning a particular target entity and the organization's defacement. Cyberterrorists in this field targets to cause significant psychological and physical impacts on the national entities. Lewis (2002) explains an example of such an attack in 2000 at Ford Motor Company, where a computer virus disrupted their email services. Cyber-terrorism can also target critical national infrastructures such as energy facilities, media services, healthcare providers, transportation systems, educational institutions, postal facilities, telecommunication systems, water treatment systems, dams, and financial organizations. These national infrastructures are vulnerable to damage and disruption since they use communication networks, software systems, and computer hardware. Some other forms of cyberterrorism target private industries or entities that intimidate the government, and others are meant to create annoyance. 

Types of Cyberterrorism Attacks 

Albahar (2019) explains the various types of cyberterrorism attacks. The advanced structured attack is where a technically skilled hacker creates and uses some of the sophisticated tools to break into the target person's network. ICMP flood is an example of an advanced structured security threat. The aggressor in this type of attack possesses learning capability, command and control, and an elementary target analysis (Albahar, 2019). On the other hand, a simple unstructured attack is where an individual uses tools created by someone else to conduct basic hacks against individual systems. The complex-coordinated attack is another type of cyberterrorism attack, and it involves an individual's ability to conduct a coordinated attack that can cause mass-disruption against integrated defenses. Complex-coordinated attacks are always sponsored by states to create sophisticated hacking tools and to conduct target analysis. Other types of cyberterrorism attacks include denial of service, disinformation, incursion, destruction, and website defacements ( Albahar, 2019)

Incursion is a type of attack where an individual gains access or penetrate computer systems and networks to modify or get data. It has a high success rate since terrorists utilize the many loopholes that exist in insecure computer systems. Destruction attacks are primarily made in computer systems to inflict severe damages or destroy them. Disinformation is an attack where an individual spreads rumors about an organization, which always has adverse impacts on achieving their goals. Denial of Service attacks is meant to disrupt or disable a website's online operations by flooding the servers with several requests that distract them from processing normal requests. Lastly, website defacement involves changing the websites and displaying messages from the terrorists ( Albahar, 2019)

Cyberterrorism on Social Media: An Emerging Form of Cyberterrorism 

Social media platforms have become a common target and ground for cyber terrorists to advance their intentions. Social media platforms are attracting more active users every day for their flexibility and simple nature (Parlakkılıç, 2018). It makes them an easy target for cyber terrorists. Individuals, organizations, and government agencies use social media for information dissemination. Social media is a suitable place for cyberterrorism since it is easily accessible and are affordable. Therefore, terrorists can easily access these social platforms to achieve their uncouth objectives, both locally and internationally. Parlakkılıç (2018) explains various categories of threat on social media, which includes propaganda, financing, training cyberterrorists, planning for crimes, and execution. Social media uses virtual tools to spread the ideas of cyber terrorists, which has increased its publicity. Social media is used for crime by distributing malware and other tools of cyberterrorism, spreading malware for crypto-mining, and bullying people (Parlakkılıç, 2018). 

Dealing with Cyberterrorism 

It is essential for security systems to expect that cyber-attacks can be initiated anytime, sooner or later. Therefore, the issue that such entities should address is how to deal with cyberterrorism. There are various ways that security systems can employ in dealing with cyberterrorism attacks (Gordon & Ford, 2002). Dealing with them can either be in the form of preventing cyberterrorism or dealing with the aftermath. Prevention measures include developing security strategies, being proactive, installing security software, and increasing security awareness (Gordon & Ford, 2002). Governments conduct most active defense types by developing active defense strategies in sectors like the exchange of intelligence. In cases where active defense is run by private organizations, they are always mistaken for terrorists. Installation of security software can help deal with viruses, worms, and distributed denial of service attacks experienced by an entity (Gordon & Ford, 2002). There are several ways in which an organization can increase its cybersecurity awareness. First, start with CEO leadership since a strong CEO leadership helps an organization to develop a culture of increased cybersecurity awareness. Also, to successfully create an effective security awareness program, an organization should identify its top risks and evaluate its threat landscape ( Parlakkılıç, 2018)

Some measures are meant to deal with the consequences of cyberterrorism after their occurrence. The first way is to prosecute the perpetrators. The effective prosecution of these crimes requires the existing criminal law to protect physical documents and tangible items from manipulation. Several challenges hinder the prosecution of cyber terrorists. For instance, if a terrorist creates illegal content in some nations but not in the country of operation, it will be difficult or impossible to prosecute them. The establishment of disaster recovery plans is another way to deal with the aftermath. To build a strong disaster recovery plan, an organization should involve the team in attack mitigation plans, stay safe from insider threats, and document, implement and regularly update the recovery plan ( Parlakkılıç, 2018)

Conclusion 

It is quite evident how cyberterrorism has emerged as a new form of terrorism in the 21st Century. Technology, despite having a whole load of advantages, has challenges, cyberterrorism being a major one. Cyberterrorists execute their plans with different intentions, which define their motivational factors. The different intentions of cyber terrorists range from politically instigated attacks, theft, government intimidation, and the simple desire for the creation of annoyance. Cyber terrorism comes in different forms; the different types of attacks define how different attackers conduct their work. Social media is an emerging trend in cyber-terrorism that ought to be looked at. Due to its growing usage, cyber terrorists use social media as a tool and target for their work. Fortunately, cyberterrorism can be managed. There are various ways through which cyberterrorism can be prevented or managed after the occurrence. 

References 

Al Mazari, A., Anjariny, A. H., Habib, S. A., & Nyakwende, E. (2018). Cyber terrorism taxonomies: Definition, targets, patterns, risk factors, and mitigation strategies. In  Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications  (pp. 608-621). IGI Global. 

Albahar, M. (2019). Cyber attacks and terrorism: a twenty-first century conundrum.  Science and engineering ethics 25 (4), 993-1006. 

Gordon, S., & Ford, R. (2002). Cyberterrorism?.  Computers & Security 21 (7), 636-647. 

Lewis, J. A. (2002).  Assessing the risks of cyber terrorism, cyber war and other cyber threats . Washington, DC: Center for Strategic & International Studies. 

Parlakkılıç, A. (2018). Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach.  International Journal of Information Security Science 7 (4), 172-178. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). What is Cyberterrorism? - Definition.
https://studybounty.com/what-is-cyberterrorism-definition-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 166

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration