Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Cyber Terrorism Recent Study - 1,258 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

The face of global terrorism as we knew it to be 50 odd years ago is changing rapidly with the advancement of technology in today? s society. Be it a kid trying to get his kicks bypassing the security or his local Internet Service Provider, or an established terrorist trying to get classified information, the amount of funds we put into protecting ourselves from cyber terrorism is not nearly enough if we were to think about what could be at harm. The vulnerability of commercial systems to cyber attacks is repeatedly demonstrated by events portrayed in the media and, there is no evidence that non-government systems are any more or less vulnerable than government ones, or that the security posture of either group, as a whole, is generally improving despite the availability and use of a growing supply of information security tools. In a recent study conducted by PricewaterhouseCoopers (PwC) of 4900 IT professionals across 30 nations found that this year alone 39, 363 human years of productivity will be lost worldwide because of viruses and hacking. In total, the cheque this year to US firms with more than 1000 employees for viruses and computer hacking will amount to $ 266 billion, or more than 2. 5 per cent of the nations gross domestic product.

The price tag worldwide soars to $ 1. 6 tn, according to the PwC study. The real effects of viruses are not as much as everybody shouts about. That said, I know of two cases where clients of ours have picked up contracts because their competitors were hit by the Love Bug, said Shipp. Its really difficult to estimate how much viruses cost. In the area of hacktivist, which involves the use of hacking tools and techniques of a disruptive nature of government or commercial systems, the Internet will serve mainly to draw attention to incidents, as such incidents are regularly over portrayed by news media. Whether that attention has the desired effect of changing policy decisions related to the issue at hand is much less certain. ?

Hackers may feel a sense of power, because they can do it. Others do it for the challenge of the problem, using a protected system as just another playground to tune their skills. But some just do it for the recognition, hoping that someone will notice them and make the famous in the media. These people usually don? t last very long in the grand scheme of things. ? In April of 1999, Yahoo! , CNN and other prominent media web sites got hit by a organized and severe DOS (Denial Of Service) attack.

The attack was done through university servers, in Canada and the US, which were hacked and made to be puppets of the perpetrators of the attack. The attack sent the affected companies stocks plummeting because they could not continue their daily business. While this is an extreme situation, similar situations happen almost daily. Packet sniffers are set up on networks to catch unencrypted passwords and logins, Trojans are planted to allow a hacker to gain access to you files without the user being even aware of it.

With such lack or security evident among the bases of our society, what would happen if a hostile nation waged a cyber war on us? In the 1980 s, Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, coined the term cyber terrorism to refer to the merging of cyberspace and terrorism. Mark Pollitt, special agent for the FBI, offered a definition: Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents. Politically motivated attacks that cause serious harm, such as severe economic hardship or sustained loss of power or water, might also be characterized as cyber terrorism. Like most other groups, terrorist groups are using the Internet extensively to spread their message and to communicate and coordinate action. However, there have been few if any computer network attacks that can match up to the terrorist acts caused by non electronic warfare.

The 1998 e-mail bombing by the Internet Black Tigers against the Sri Lake embassies was perhaps the closest thing to cyber terrorism that has occurred so far, but the damage cause by the flood of e-mail, for example, is relatively nothing in comparison to the deaths of 240 people from the physical bombings of the U. S. embassies in Nairobi and Dar es Salaam in August of that year. So is cyber terrorism the way of the future? For a terrorist, it would have some advantages over physical methods. It could be conducted remotely and anonymously, it would be cheap, and it would not require the handling of explosives or a suicide mission.

It would likely attract massive media coverage, as journalists and the public alike are fascinated by practically any kind of computer attack, as we saw in recent times with the? I Love You, ? visit and others similar to it. A recent study of the risks of computer systems began with a paragraph that concludes Tomorrows terrorist may be able to do more with a keyboard than with a bomb. There are off course drawbacks to terrorists using cyber weapons over physical ones. Because systems are complex, it may be harder to control an attack and achieve a desired level of damage.

Unless people are injured, there is also less drama and emotional appeal, which as you can imagine works wonders in the media. Further, terrorists may be disinclined to try new methods unless they see their old ones as inadequate. The main impact of cyber threats on foreign and domestic policy relates to defending against such acts, particularly attacks against critical infrastructures. At the international level, several countries, including Canada and the U. S, have been addressing such issues as mutual legal assistance treaties, extradition, the sharing of intelligence, and the need for uniform computer crime laws so that cyber criminals can be successfully investigated and prosecuted even when their crimes cross international borders, as they so often do. The Internet offers a powerful tool for communicating and coordinating action.

It is inexpensive to use and increasingly pervasive, with an estimated 201 million on-line as of September 1999. Groups of any size, from two to millions, can reach each other and use the Net to promote an agenda. Their members and followers can come from any geographical region on the Net, and they can attempt to influence foreign policy anywhere in the world. Government systems which hold anything from your medical records, to doomsday nuclear launch codes are regularly access by unauthorized users, and commercial companies loose extreme amounts of money to hackers who are just having fun.

With this kind of security it leaves the public wondering what would happen when someone got serious and intended to do some real harm to our, so called, technologically advanced society. BibliographBarry Colin, The Future of Cyberterrorism, Crime and Justice International, March 1997 2) Economic Espionage, Cyberterrorism &# 038; Information Assurance, DIANE Publishing, January 1998 3) Cyber Terrorism, about. com, web 4) Statistics USA, US Gov, Sept 1999, web 5) Hackers and viruses to cost business $ 1. 6 tn, VNUnet. com, John Leyden, 11 / 07 / 2000, web 6) Barry Colin, The Future of Cyberterrorism, Crime and Justice International, March 1997 7) Mark M. Pollitt, Cyberterrorism B Fact or Fancy? , Proceedings of the 20 th National Information Systems Security Conference, October 1997 325


Free research essays on topics related to: recent study, e mail, march 1997, computer systems, cyber terrorism

Research essay sample on Cyber Terrorism Recent Study

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com