Question

In: Computer Science

Using the Web or other resources, research an example of Cyber Terrorism. Write a brief Discussion...

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it's aftermath. Comment on ways the attack could have been prevented.

Post between 300 and 400 words.

Solutions

Expert Solution

What is Cyber Terrorism?

There is typically an oversized quantity of confusion on what cyber terrorist act is. a lot of specifically, what cyber attacks will we have a tendency to truly outline as acts of terrorism? the web has allowed for a massive exchange of knowledge. so has created computer network within which each criminal and terrorists will implement attacks/communications. This use of computer network leads to there not being merely a physical threat of terrorist act. after we think about what cyberwar truly is, we have a tendency to should 1st perceive the motivations behind cyber attacks. Cyber attacks will are available in several different forms, and it's these forms that facilitate the United States perceive whether or not the attack is of crime or terror. Figure one shows the distribution of cyberattacks across cultural, social, economic and political motivations. Gandhi et al. (2011) discuss {that typically|that always|that usually} these dimensions of motivations will often cross over and also the motivating factors behind cyberattacks ar required to be fastidiously thought of after we discuss cyber terrorist act.


What is being done to stop cyber terrorism?

We should be cheap in forwarding the potential threats mentioned so far during this report may be actioned at any time, rapidly. Most of our digital infrastructure already contains a great deal of defence, as elaborated by Beggs, (2004); current technologies embrace the likes of: firewalls, watchword protection systems, key coding (e.g 3DES, RSA), stenography, intrusion detection systems, Secure Socket Layer (SSL), IPsec, access management lists etc. once discussing acts of terrorist act normally, the responsibility of hindrance commonly falls to governments and national organisations, our national security is lead by our Intelligence Services like the Ministry of Defence, Government Communications Headquarters, Military Intelligence Section five and half-dozen. Addressing this, British people government categorize cyber attacks as a Their One threat to national security (“2010 to 2015 government policy: cyber security”, 2015). These services cowl investigations into acts of the cyber-terrorist act, analysis and the police investigation of potential threats. Addressing the growing concern of cyber attacks from not solely acts of a terrorist act, however conjointly crime, a subdivision of GCHQ the National Cyber Security Centre (NCSC) was launched in 2017. Head of NCSC, Ciaran Martin, declared that the organisation had already handled 188 high-level cyber attacks against the state across 3 months before NCSC gap (“Britain to enter ‘new era of on-line opportunity’”, 2017). Organisations like international organisation are taking action against cyber-terrorist act threats, with allies creating a ‘Cyber Defence Pledge’ in July 2016 (“Cyber defence”, 2017). Taking a proactive response to threat intelligence, the govt. conjointly launched the Cyber security data Sharing Partnership (CiSP) in 2013 that allowed for a bigger level of communication between personal sector and public sector security professionals (“2010 to 2015 government policy: cyber security”, 2015). Moreover, the Centre for the Protection of National Infrastructure conjointly addresses its work with organisations that support the United Kingdoms digital infrastructure like that mentioned in section three.4. The intention of this is often to greatly improve communication between each government bodies and personal organisations, so as to strengthen our networks against cyber attacks. within the cupboard Office’s annual report on the United Kingdom’s Cyber Security Strategy, the govt. addresses their actions against cyber attacks to the state and details their defrayal review on cyber security.


Related Solutions

Electronic Commerce Hardware and Software Using the Web or other resources, find an article that describes...
Electronic Commerce Hardware and Software Using the Web or other resources, find an article that describes a successful Web service(s) software and the hardware necessary to support this application. Describe how the company implemented Web service(s) software and hardware and explain why using this combination of software and hardware is better than using an alternative approach to solve the problem.

Using information from these web sites, along with other resources, prepare a report that addresses the...
Using information from these web sites, along with other resources, prepare a report that addresses the following issues for your selected country: (1) compare and contrast the corporate governance principles of your selected country with the United States, (2) identify the relevant corporate governance parties and their roles, (3) describe recent challenges related to the corporate governance for your selected country, and (4) list and describe recent corporate governance activities in your selected country.
Research the web for an example of a business using a cloud infrastructure. What were the...
Research the web for an example of a business using a cloud infrastructure. What were the main reasons for choosing a cloud infrastructure? What alternatives did the business have?
Research information on how Python is used for Web applications and accessing resources on the Web?...
Research information on how Python is used for Web applications and accessing resources on the Web? Please help me for short discussion. Thanks in advance.
Using internet and other resources, research a current theory of causes of SIDS To what extent...
Using internet and other resources, research a current theory of causes of SIDS To what extent is there a single "cause" of SIDS? Alternatively, consider the proposition that SIDS is merely a term of convenience used by pathologists when they are unable to determine the cause and that the term "unascertained" is a preferable, and more honest, approach.
Define crime. Perform an on-line research and share an example of a recent cyber crime. Please...
Define crime. Perform an on-line research and share an example of a recent cyber crime. Please read your colleagues examples before you choose yours. No duplications, please!
Do a web search to find out information on the abuse of dextromethorphan. Write a brief...
Do a web search to find out information on the abuse of dextromethorphan. Write a brief summary 300 words of what you have learned. please I need quick help these question. its due after one hour .thanks
Find an example of a company that recently decreased its dividend, give a brief discussion of...
Find an example of a company that recently decreased its dividend, give a brief discussion of the situation, and how the stock has fared since.
Find an example of a company that recently increased its dividend, give a brief discussion of...
Find an example of a company that recently increased its dividend, give a brief discussion of the situation, and how the stock has fared since.
Find an example of a company that recently split its stock, give a brief discussion of...
Find an example of a company that recently split its stock, give a brief discussion of the situation, and how the stock has fared since.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT