Cyberterrorism

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside the development of information technology,[1] cyberterrorism involves acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism.[2] Some authors opt for a very narrow definition of cyberterrorism, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach.[3] By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.[4]

Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives. Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government systems and might leave a country in fear of further attacks.[5] The objectives of such terrorists may be political or ideological since this can be considered a form of terror.[6]

There is much concern from government and media sources about potential damage that could be caused by cyberterrorism, and this has prompted efforts by government agencies such as the Federal Bureau of Investigation (FBI), National Security Agency (NSA), and the Central Intelligence Agency (CIA) to put an end to cyber attacks and cyberterrorism.[5]

There have been several major and minor instances of cyberterrorism. Al-Qaeda utilized the internet to communicate with supporters and even to recruit new members.[7] Estonia, a Baltic country which is constantly evolving in terms of technology, became a battleground for cyberterrorism in April 2007 after disputes regarding the relocation of a WWII soviet statue located in Estonia's capital Tallinn.[4]

  1. ^ Qasemi, Hamid Reza (2016). "Chapter 12: Iran and Its Policy Against Terrorism". In Dawoody, Alexander R. (ed.). Eradicating Terrorism from the Middle East. Policy and Administrative Approaches. Vol. 17. Springer International Publishing Switzerland. p. 201 - 206. doi:10.1007/978-3-319-31018-3. ISBN 978-3-319-31018-3.
  2. ^ "Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress". www.everycrsreport.com. Retrieved 5 September 2021.
  3. ^ Canetti, Daphna; Gross, Michael; Waismel-Manor, Israel; Levanon, Asaf; Cohen, Hagit (1 February 2017). "How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the Wake of Cyberattacks". Cyberpsychology, Behavior, and Social Networking. 20 (2): 72–77. doi:10.1089/cyber.2016.0338. PMID 28121462.
  4. ^ a b Hower, Sara; Uradnik, Kathleen (2011). Cyberterrorism (1st ed.). Santa Barbara, CA: Greenwood. pp. 140–149. ISBN 9780313343131.
  5. ^ a b Laqueur, Walter; C., Smith; Spector, Michael (2002). Cyberterrorism. Facts on File. pp. 52–53. ISBN 9781438110196.
  6. ^ "India Quarterly : a Journal of International Affairs". 42–43. Indian Council of World Affairs. 1986: 122. The difficulty of defining terrorism has led to the cliche that one man's terrorist is another man's freedom fighter {{cite journal}}: Cite journal requires |journal= (help)
  7. ^ Worth, Robert (25 June 2016). "Terror on the Internet: The New Arena, The New Challenges". New York Times Book Review: 21. Retrieved 5 December 2016.

From Wikipedia, the free encyclopedia · View on Wikipedia

Developed by Nelliwinne