Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Cyber Terrorism Holy War - 1,205 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

Cyber-Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacency when none of them come to fruition.

In all honesty if you have a top-level virus-scanning program such as Norton, or McAfee your machine will be safe from most of the little viruses that you will come across. There is a propensity to copy and mutate existing viruses among the hacker community so they are easily identified and defended against by the scanning programs. Many of the viruses are meant to be detected; it is a high tech game of cat and mouse between the hackers and the Tech security groups. For the most part hackers want their viruses to be caught before they cause major damage.

The prestige lies within the acknowledgement that your kung fu is superior among your peers. It follows that a reported virus where the potential level of catastrophe is dire but there is minimal damage done holds far more esteem then crashing a multitude of systems without any knowledge of the super virus reaching the media. There is a high level of taunting and signature traits contained within the viruses that give leads but are just enough not to get caught, it becomes an adrenaline rush for these groups to push the envelope and toe the edge. These viruses are not what the government is concerned with and end up being nothing more then annoyances to the Intelligence Establishment.

There is however a very real possibility of a worm type CIF virus that has a purely malicious intent and is created as a stealth virus. Such a virus could go undetected for hours, days or months as it worked its way throughout a particular system and then strike at a pre-selected time. For the entire computer operated portions of American society this is a threat, this extends from mass transit to police and bank records and correctional facilities. Massive destruction both physical and theoretic could easily occur and quite frankly September 11 th could be seen as precursor to the uniform and grave situation systematic mainframe crashes would cause. This would be a case of international espionage and would be a drastic move from the normal programs the tech security groups deal with on a daily basis. This type of attack could slide under existing defense and not be identified until it was too late thus rendering the attempts to defend helpless.

A comparison would be the 9 / 11 attacks and how they were almost indefensible because of the suicide bomber mentality of the attackers. Similarly, the new age Cyber-Terrorists would not want the viruses to be detected and have no desire to impress their peers as is the case with their traditional counterparts. Since this is a new type of cyber warfare, there is no consensus on how to deal with theses issues. In a story reported by PC Mag, the FBI has contacted many of the individuals who they have identified as suspected hackers across America as well as a handful of those convicted for fraud / hacking into secure government sites. The intent of this contact was to solicit their services by playing on their Patriotism and their avarice, calling for their help in this turbulent time and praising their technological superiority. From what I can gather, the Intelligence agencies seriously fear this technological assault and are scared that they will be caught sleeping on this front if they do not prepare sufficiently.

Internet and networking technologies are areas where America is clearly dominant but extremely susceptible to attack. The fear lies in the jealousy of American superiority and a chance to bring them down to the level of the nation where the particular Cyber-Terrorist hails. The irony of this as pointed out by the informational piece is that to pull off such an attack would take a vastly superior hacker familiar with a number of coding languages and networking intricacies, thus defeating the notion that only America and its allies have such a viable technological background. There are many questions yet to be answered but the heightened security has led to tighter inspection of mainframes and a new generation of firewalls and encryption are already being rushed to the marketplace and implemented in many government agencies. Bibliography Boehlert To Introduce Cyber-Terrorism Bill Within Weeks. (Sherwood L. Boehlert) (Brief Article) Congress Daily/A.

M. , Oct 18, 2001 pNA. Elec. Coll. : . A 79214426. Text Available Japan to Establish Team to Fight Cyber-Terrorism.

Xinhua News Agency, Oct 10, 2001 p 1008283 h 2589. Elec. Coll. : A 79014364. Text Available U.

S. may face net-based holy war. (Industry Trend or Event) Dan Verton. Computerworld, Nov 13, 2000 p 1. Elec. Coll. : A 69544947. Abstract and Text Available High-Level, National Cyber-Terrorism Plan Announced.

Kernan Chaisson. Journal of Electronic Defense, March 2000 v 23 i 3 p 15. Elec. Coll. : . A 61893816. Text Available Man faces cyber terrorism charges.

United Press International, Oct 25, 1999 p 1008298 u 1072. Elec. Coll. : A 56887249. Text Available World Wide Weapon. (computer crimes) (Brief Article) Christopher H. Schmitt and Joellen Perry.

U. S. News &# 038; World Report, Nov 5, 2001 p 60. Elec. Coll. : . A 79572626.

Text Available Cyberterrorism is a serious threat. (Industry Trend or Event) Joseph E. Maglitta. Computerworld, April 19, 1999 p 35 (1). Elec. Coll. : . A 54416768.

Abstract and Text Available Worms Find New Ways to Snare Your PC. (through Microsoft MSN Messenger and Adobe Acrobat) STUART J. JOHNSTON. PC World, Nov 2001 v 19 i 11 p 63. Elec. Coll. : A 79353265. Text Available PREPARING FOR A CYBER-ASSAULT. (the worries about future terrorist attacks include concern about the Internet) (Brief Article) Business Week, Oct 22, 2001 i 3754 p 50.

Elec. Coll. : A 79247832. Text Available Net routers still feeling effects of Code Red, Nimda. (Industry Trend or Event) (Brief Article) Ellen Mesmer. Network World, Oct 15, 2001 p 14. Elec. Coll. : A 79203543.

Text Available Feds eye more surveillance They also try to allay privacy concerns in wake of new war on terrorism. (Anti-terrorism Act of 2001) Jennifer Jones. InfoWorld, Oct 1, 2001 v 23 i 40 p 24. Privacy: Too high a price? FBI and DOJ seek expanded authority to monitor communications. Carmen Nobel. eWeek, Sept 17, 2001 p 16.

Elec. Coll. : . A 78542671. Text Available Cert. (summary of recent hacker attacks) (Brief Article) Computer Weekly, Sept 13, 2001 p 44. Elec. Coll. : A 78690482.

Text Available Dont let monitoring tactics attack employee privacy. Ira Hobbs. Government Computer News, Sept 10, 2001 v 20 i 27 p 72. Elec. Coll. : A 78176683. Text Available U.

S. may face net-based holy war. (Industry Trend or Event) Dan Verton. Computerworld, Nov 13, 2000 p 1. Elec. Coll. : A 69544947. 325


Free research essays on topics related to: holy war, 2001 p, high level, 1999 p, cyber terrorism

Research essay sample on Cyber Terrorism Holy War

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com