Cyber Terrorism: Meaning and Its Nature

Meaning of Cyber Terrorism

Cyber terrorism refers to attacking computers, networks, and other electronic technological capabilities to either damage the cyberspace infrastructure itself or to damage some other target, motivated by terrorism. Such attacks may undermine faith in government and in the security of the critical infrastructures of the country. It is well known that many terrorist groups such as Osama Bin Laden organization and the Islamic militant group Hamas have adopted new information technology as a means to conduct operations without being detected by counter terrorist officials.

Currently, the term cyber terrorism more often refers to the act of attempting to damage or exploit cyber networks and their connected computers or the act of attempting to use cyber networks (especially the internet) to wreak havoc and destruction on other targets, which they access through cyber networks.

The expression “cyber terrorism” includes an intentional negative and harmful use of the information technology for producing destructive and harmful effects to the property, whether tangible or intangible, of others. For instance, hacking of a computer system and then deleting the useful and valuable business information of the rival competitor is a part and parcel of cyber terrorism.

Nature of Cyber Terrorism Attacks

Cyber terrorism is the employment of computing resources to intimidate or coerce another (government) to achieve some political goals. Cyber attacks involve activities that can disrupt, corrupt, deny, or destroy information stored in computers or computer networks. Cyber terrorism attacks can be cyber attacks or physical attacks both affecting the informational infrastructure.

Information technology offers new opportunities to terrorists. A terrorist organization can reap-low-risk, highly visible payoffs by attacking information systems. By using cyberspace as the new conflict medium, terrorists can obviate the distance between themselves and their targets. They no longer need to be physically present at the location to execute acts of violence. Terrorists could target digital information systems in pursuit of political goals and in order to attract the attention of the public they could perpetrate their acts with the media at the forefront of their strategy.

By using the Internet, the terrorist can affect much wider damage or change to a country than one could by killing some people. It could range from disabling a country’s military defences to shutting off the power in a large area or disrupting the financial networks. The terrorist can thus affect more people at less risk to him or herself, than through other means. A terrorist organization intending to carry out an electronic attack needs to build up the necessary technical expertise and buy the equipment to disrupt, damage or destroy target information systems. Alternatively, it could always hire people proficient in network attacks.

——————–

Also Read ATM Fraud: Causes and Techniques/Types
Also Read What is Malicious Code?
Also Read Victims of Cyber Crimes
Also Read Credit Card Fraud
Also Read What is Online Defamation?
Also Read Nature and Scope of Cyber Crime
Also Read Liability of Cyber Cafe Owner if a Customer downloads any Obscene Material
Also Read Relation between Cyber Crime and Conventional Crime
Also Read Crime of Identity Theft
Also Read Forms of Cyber Fraud
Also Read Email Fraud
Also Read Cyberbullying: A crime on internet
Also Read Email Bombing: Causes and Effects
Also Read Phishing Email: Defences available against Phishing Scams
Also Read Email Spoofing: Working and Process
Also Read Elementary Problems Associated with Detection of Cyber Crime
Also Read Different Modes and Manners of Committing Cyber Crimes
Also Read Cyber Terrorism: Meaning and Its Nature
Also Read Cyber Gambling : A Brief Introduction
Also Read What is Cyber Crime?
Also Read Characteristics of Cyber Crime
Also Read Categories of Cyber Criminals
Also Read Scope of Cyber Law

Leave a Comment