preview

Cyberterrorism Essays

Better Essays

Cyberterrorism

Introduction

Cyberterrorism is the convergence of terrorism and cyberspace. It is generally

understood to mean unlawful attacks and threats of attack against computers,

networks, and the information stored therein. Possibly to intimidate, influence a

government or its people to further political or social gain. To qualify as

cyberterrorism, an attack should result in violence against persons or property, or

generate fear. Attacks that lead to death or bodily injury, explosions, plane

crashes, water contamination, or severe economic loss would be examples, serious

attacks against important infrastructures could be acts of cyberterrorism,

depending on their impact. This essay will …show more content…

Individual protection
Currently there are no foolproof ways to protect a system. The completely secure system can never be accessed by anyone. Most government and militarie classified information is kept on machines with no outside connection, as a form of prevention of cyber terrorism. Apart from such isolation, the most common method of protection is encryption. The wide spread use of encryption is inhibited by the governments ban on its exportation, so intercontinental communication is left relatively insecure. The
American president administration team and the FBI oppose the export of encryption in favour of a system where by the government can gain the key to an encrypted system after gaining a court order to do so. Encryption's draw back is that it does not protect the entire system, an attack designed to cripple the whole system, such as a virus, is unaffected by encryption. Others promote the use of firewalls to screen all communications to a system, including e-mail messages, which may carry logic bombs or email bombs. Firewall is a relatively generic term for methods of filtering access to a network. They may come in the form of a computer, router other communications device or in the form of a network configuration. Firewalls serve to define the services and access that are permitted to each user. One method is to screen
user

Get Access