StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Terrorism on the Internet - Essay Example

Cite this document
Summary
The paper "Terrorism on the Internet" analyzes that Cyber intimidation is formed by the combination of fright besides the internet. Cyberterror assaults are to be done at necessary frameworks and spots where the significant data, such as well-being, training, a political decision…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful

Extract of sample "Terrorism on the Internet"

Cyber intimidation is formed by the combination of fright besides the internet. Cyberterror assaults are to be done at necessary frameworks and spots where the significant data, such as well-being, training, political decision, correspondence, and security, are kept and handled and can be powerful enough to cause disorder all through the nation. Data advances are turning out to be progressively significant and quick improvements in the field power the frameworks of private or state foundations to change. This circumstance makes the enormous establishments ward to the web and web-based frameworks as much as individual clients. The assailants or assault gatherings, who know about this, direct the fear-based oppressor exercises employing the internet. The nations generally influenced by digital dread will be the most evolved ones. Considering countries, for example, Afghanistan, the pace of reliance on high innovation is very low. The situation, nations, when all is said in done, won't be influenced by the maltreatment of digital advances as much as created nations. Although the impacts of digital dread assaults are examined, the definition, system, degree, and effects of digital fear assaults are not completely clear. Therefore, it is tough to be forestalled and halted. The examinations led by administrative organizations and concerning this issue are excessively not many. The more significant part of the current investigations identifies with verbal articulations and makes the system distinguish pieces of proof. In a few surveys, the system and choice instruments are proposed to guarantee security. The point of this examination is to give data about digital dread assaults, their attributes, parts, and strategies. In this examination, the extent of digital dread will be resolved. This paper will like this to investigate the various strategies utilized in digital or cyber terrorism.

Following the literature reviews discussing the various cyber terrorism instances, several in-text citations have been used purposely to offer detailed information pertaining the cyber terrorism. Below are some of the in-text citations used in the literature review regarding the topic of cyber terrorism, illustrating the innumerable subgroups of the legal classification of the cyber-attacks. Besides, these in-text citation aids in describing commonly used approaches to minimize the incidence of the various forms of cyber terrorism. First and foremost, (Güntay, 2017) stipulates in describing the information war. In this case, the information war is defined as the act of completing an activity that will influence the information based processors, data frameworks, and data-based system frameworks having a place with the opposite side and to secure their own contexts. The study of (Ahmad & Yunos, 2012) defines cyberbullying, whereby it asserts that a group of individuals may be intended to help redundant antagonistic conduct to hurt others. It is acknowledged by utilizing data and correspondence advances, for example, sending messages, utilizing cell phone applications, utilizing texting applications, or distributing mortifying sites.

The study of (Hatipoğlu 2017) explores the cybercrime, which is characterized as "the utilization of a data innovation to encourage the treatment of unlawful acts or violations." The term PC wrongdoing alludes to all violations, including the utilization of PCs or potentially data advancements in the broadest sense. PC violations, cybercrime, data innovation wrongdoing, high innovation violations, and web wrongdoings are regularly utilized conversely. Infections, rationale bombs, worms are instances of this gathering. Additionally, the study (Ahmad et al, 2012). defines suggest cyber spying. This group incorporates malicious software, for example, Trojan horses and spyware, also, techniques for catching the objective framework. Digital spying is the illicit utilization of programming or techniques and the catch of significant data from unapproved or secret territories. Such activities can be performed by uniquely prepared government operatives, malignant programmers, or software engineers.

Further, a list of in-text citations aids in revealing how to act against the cyber-attacks, and they include; the study by (Richet, 2015) proposes a digital procedure lifecycle model. The creators propose a 5-phase life cycle approach for digital security. These are surveying, ensuring, checking, teaching, and observing. A Review of Research Studies on Cyber Terror The structure is intended to ensure basic digital security resources with five successive stages in this strategy. Every one of these stages is the continuation of the past one. Further, the study by (Rees et al, 2011) postulates framework has been created so as to ascertain the dubious hazard looked by a foundation under digital assault. A choice help framework has been proposed for debatable vulnerability tariffs besides impacts on resources. The outline exploits the genetic scheming to break down the greatest prudent techniques. The information gathered from assembling organizations present an outcome test under practical information conditions. Lastly, the study by (Conway, 2007) focuses on sites delegated to Foreign Terrorist Associations by the United States. Terrorist gatherings' abuse of the web, site substance, and media is the focuses that this investigation stresses. In view of the examination, the fear monger bunches utilized the web to impart between the gatherings and gathering by means of the Internet.

Integral references or citations refer to the act of placing inserting the name of the author within the sentence itself whereas the non-integral citations or references is the cat whereby the designation of the writer seems in digression immediately after the sentence, this usually uses only the authors' name and the year of publication. Thus the referencing technique used is primarily non-integral citations.

Therefore the most used referencing technique, in this case, is the non-integral citation. This is because all the names of authors appear in parenthesis. This depicts that the last name, together with the year of publication are in parenthesis.

The increased difficulties allied to the use of the integral citation are among the aspects that initiated the writer to use prefer using non-integral refining technique. The augmented difficulties incurred in using integral citations were mainly initiated by the increased necessity of the writers it restructures and cites all the sources correctly. Therefore the writer preferred the use of the non-integral citation due to the communication in competencies in citing the various sources accordingly. Further, the fact that the writer did not want to exert any effort and to insert their input subjected the writer to use a non-integral citation tactic. The fact that the writer lacks more input to put into their research or study, which might be initiated by the writers' limited linguistic resources and exploration skills. The linguistic repertoire assistances them in analyzing and synthesizing, hence being capable of including a few or even different citation patterns. This has greatly instigated the writer to use the non-integral referencing technique. Various investigation asserts that most of the noticeable problems impeding the progress of the writers to be attributed to the inadequate mastery of the four main language skills comprising; listening speaking, reading, and writing. Due to the absence of these skills, the writer ended up using the non-integral citation. Further several findings from different researches suggest that most of the writers lack the appropriate skills, which are essential in citing different sources appropriately. Therefore the augmented absence of the experience and knowledge subjected the writer to use the non-integral referencing technique.

The summary method of citation is has been used by the author in exploring the various aspects of the cyber terrorism. Most of the referencing techniques or citing used in this literature is mainly the summary. This is primarily because all the in text citation used are describing only the authors approach in several phases of the cyber terrorism. Therefore it is clearly evidenced in that the author has presented the findings regarding the sub groups of the cyber terrorism as well as the appropriate measures which need to be enacted to minimize incidence of such cyber-attacks. Therefore the presentation of these findings indicates the use of the summary citing method as all the results are summarized from the author’s findings. This therefore implies that the most common used citing technique is summary since it aids in presenting the authors investigation in a small portion.

This paper uses numerous reporting verbs in presenting the exploring the cyber terrorism. The most common reporting verbs include; postulates, proposes, focuses, suggests, stipulates, defines and explores. The tense which is used by these reporting verbs is mainly the present continuous tense. This tense has been greatly used in describing the cyber terrorism since most of the cyber-attacks are existing in daily lives and there is necessity of controlling them.

The increased use of the present continuous tense in the various clauses has been manly initiated by the act of the author discussing about the present once the speaker is referring to the something that is happening of or taking place in that moment as well as the something that is likely to occur after a certain time. Therefore since the cyber terrorism that the author explores about are likely to occur now as well as in future, and thus subjecting the writer to demonstrate the ongoing action is happening now, as the activities regarding the cyber-attacks may occur any time. Further the author has preferred using the present continuous tense inn discussing the cyber terrorism ,mainly to illustrate the possibility of an activity taking place in future. The unpredictable incidence of the cyber-attacks initiates the author to use present continues tense to indicate that the possibility of occurrence of such attacks.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Terrorism on the Internet Essay Example | Topics and Well Written Essays - 1500 words, n.d.)
Terrorism on the Internet Essay Example | Topics and Well Written Essays - 1500 words. https://studentshare.org/information-technology/2091692-terrorism-on-the-internet
(Terrorism on the Internet Essay Example | Topics and Well Written Essays - 1500 Words)
Terrorism on the Internet Essay Example | Topics and Well Written Essays - 1500 Words. https://studentshare.org/information-technology/2091692-terrorism-on-the-internet.
“Terrorism on the Internet Essay Example | Topics and Well Written Essays - 1500 Words”. https://studentshare.org/information-technology/2091692-terrorism-on-the-internet.
  • Cited: 0 times

CHECK THESE SAMPLES OF Terrorism on the Internet

Cost to Benefit Analysis of Counter-Terrorism Measures in the US

“The most common definition of counterterrorism (also spelled counter-terrorism) on the internet is the practices, tactics, techniques, and strategies that governments, militaries, police departments and corporations adopt in response to terrorist threats and/or acts, both real and imputed” (Kolodkin, 2011).... Cost to Benefit Analysis of Counter terrorism Measures in the US since 9/11 Name of Author Author's Affiliation Author Note Author note with more information about affiliation, research grants, conflict of interest and how to contact Topic: Cost to Benefit Analysis of Counter terrorism Measures in the US since 9/11, Can the benefits be improved with less cost?...
12 Pages (3000 words) Term Paper

How Modern Terrrorism Uses the Internet

...
1 Pages (250 words) Essay

Modern Terrorism and the Internet

Terrorist attacks on the internet chiefly cause economic damage, and there is very little scope for employing such attacks to cause physical harm (Why Terrorists Use the Internet, 2005).... In addition, technical information regarding the manufacture and use of explosives is readily available on the internet.... Modern Terrorism and the internet [Name of the Student] [Name of the University] Modern Terrorism and the internet The proliferation of the internet has simplified the task of terrorists in obtaining publicity....
3 Pages (750 words) Research Paper

Cyber Terrorists: Shutdown the Internet

Cyber terrorists: shutdown the internet Introduction: Terrorism has been the common agenda to people all around the modern world.... The breakdown of the cyber world will take place Types of cyber attacks: The most common form of cyber attack which was popular from the advent of the internet technology was hacking.... The concept of ethical hacking has lead to the upgradation of many soft wares and has even strengthened the security of the internet....
15 Pages (3750 words) Essay

The Value Of The Internet For Terrorists - Case Study Al-Qaeda

The study "The Value Of the internet For Terrorists - Case Study Al-Qaeda" aims to understand how the terrorists use the internet with particular reference to the Al-Qaeda and its associates.... hellip; While the danger that cyber-terrorism poses to the internet is frequently debated, surprisingly little is known about the threat posed by terrorists' use of the internet.... the internet has become a forum for terrorist groups and individual terrorists, both to spread their messages of hate and violence and to communicate with one another....
8 Pages (2000 words) Research Proposal

The Internet, Freedom of Expression, and Terrorism

Freedom of expression is assumed to be the default mode for everyone accessing the Internet except in the case of the evil individuals in which they use the same freedom on the internet to subvert government authority and to kill or harm or maim innocent people just to achieve their own political agenda or personal aims.... There is a clear need to balance the competing interests such as state security with freedom of expression on the internet; this freedom is not absolute (Cucereanu, 2008, p....
2 Pages (500 words) Assignment

Cyber Terrorists: Shutdown the Internet

The breakdown of the cyber world will take placeThe most common form of cyber attack which was popular from the advent of the internet technology was hacking.... The concept of ethical hacking has to lead to the upgradation of many soft wares and has even strengthened the security of the internet.... There is no dogmatic definition of cyber terrorism and its interpretation varies across society....
10 Pages (2500 words) Term Paper

Why People Become Terrorists

The paper "Why People Become Terrorists" highlights that poverty and lack of education can also act as a potential reason that can ensure people's association with terrorism in a comprehensive manner.... Apart from that, a large number of people also joins terrorism owing to their religious beliefs.... The issue of terrorism is prevailing in various nations of the world in an extensive manner.... It would not be ambiguous to state that almost every nation of the world in the present day scenario is under the influence of terrorism and its negative impacts....
14 Pages (3500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us