RIDLEYmmmmmmmmmmmmmmmmmmm.edited.docx - Cyberterrorism is the conveyance of cyberspace and terrorism Thus cyberterrorism is the unlawful attacks and

RIDLEYmmmmmmmmmmmmmmmmmmm.edited.docx - Cyberterrorism is...

This preview shows page 1 - 2 out of 3 pages.

Cyberterrorism is the conveyance of cyberspace and terrorism. Thus, cyberterrorism is the unlawful attacks and threats of threats against computers and networks, leading to the misuse of the data and information. For an attack to qualify as cyberterrorism, there is a necessity for the attract to cause upsurge into the violence against persons or property or the competence of causing harm ire injury, which may result in not fear. Cyber terrorism refers to the administratively motivated use of computers and information technology hence initiating the incidence of severe distraction or even widespread fear in society. The threat, which is mostly caused by cyber terrorism, has grabbed the attention of social media, the security community, as well as the information technology industry. Most hackers are not interested in goals that initiate terrorists, which indicates that most hackers are usually inspired by similar objectives that initiate terrorists. This infers that the hackers have the aptitude of acquiring access to the sensitive data or information stored in the computer systems and henceforth using the data to operate crucial operations within a particular organization. The hackers' illegal access to the data and data stored in the computer systems is contradictory to the threats attack. This is because cyber terrorism involves the act of the terrorists to break into the computer systems owned by the government and the private sector. The augmented dependence of the information has eased the increase of new forms of vulnerability hereafter, giving terrorist access to sensitive systems such as traffic control systems. Karim, K. F. K. (2017). The causes, effects, and how to deal with cyber-terrorism From an Islamic and international perspective. QALAAI ZANIST JOURNAL , 2 (5), 661-683. According to Karim (2017), there has been an extensive occurrence of cyber terrorism cases in the current digital era because of the intensified use of technology systems and the excessive access to the internet, which has made masses of people worldwide to be connected. However, the logic of this article is that due to the increased internet connections and use of cyberspace has created opportunities for hackers to intrude and even break down the structure. However, the author of this article underscores that the newest and modern categories of terrorism are cyber terrorism. Moreover, he added that the
Image of page 1
Image of page 2

You've reached the end of your free preview.

Want to read all 3 pages?

  • Summer '20
  • theft, cyberterrorism

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes