We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Cybersecurity threat posed by a terrorist group - Essay Example

Comments (0) Cite this document
Summary
Though sparse cyber attacks only cause annoyance,the present situation is that Australia is facing considerable degree of such attacks that create fear in the minds of people, and evidently,the government is startled by the pace at which these miscreants get access to nation’s secrets…
Download paper
GRAB THE BEST PAPER
Cybersecurity threat posed by a terrorist group
Read TextPreview

Extract of sample
Cybersecurity threat posed by a terrorist group

Though sparse cyber attacks only cause annoyance, the present situation is that Australia is facing considerable degree of such attacks that create fear in the minds of people, and evidently, the government is startled by the pace at which these miscreants get access to nation’s secrets breaking the barriers erected by the government and various companies. Considering the fact that nations like China and US have already taken stringent steps to prevent any cyber attacks on them, and also to utilize cyber attack as a positive warfare, it is highly necessary to adopt policies at the earliest to prevent such further attacks on Australia, especially when there is a rise in the attacks. The solution to the problem can be identified in the steps taken by America and Japan on the face of cyber terrorism. One step is to have a separate department of defense that is solely responsible for protecting categorized government departments, defense installations, and nuclear technology from cyber attacks. The second step is to have an agency that monitors the cyber activities of nationally important sectors and companies using sensors in the networks. This will help identify cyber attacks and take effective steps before the systems are attacked and information is stolen. Thirdly and most importantly, there should be a national program that works in collaboration with all the ISPs. It should be made mandatory for the ISPs to identify the already compromised computers and direct such customers to the agency for removal of the malware. This is very necessary as most of the time, the compromised computers are used by attackers to commit crimes. Identifying such remotely controlled computers is the first step in preventing cyber attacks. Background Nations throughout the world including US are struggling to save their cyber sphere from the cyber attacks. The factor that makes things worse in the cyber world is that the terrorists get a chance to operate from other nations or geographic areas, thus making the arrest and punishment of terrorists a difficult task. According to Taipei Times (31 May 2011) records, Australia is one of the most targeted nations in the world. The companies, government departments, and persons that came under cyber attack in the recent past range from the Australian parliament, Australian Prime Minister Julia Gillard, Australian Defense Minister Stephen Smith, Japanese conglomerate Sony, Woodside petroleum of Australia, to mention but a few. Ironically, Chinese intelligence agencies are suspected by many nations and companies for such attacks. Anyway, according to McClelland, the Australian Attorney general, “it is better to deal with the threat, to address the vulnerability.” (Taipei Times, 31 May 2011). According to reports, there were 400 cyber attacks on the Australian government networks in the past year; a number too high to ignore. In addition, the Director General of the Australian Security Intelligence Organization David Irvine (cited Staff Writers, Energy Daily, 30 May 2011), points out that Australia experiences constant cyber efforts to steal the nation’s secrets. In the opinion of Irvine, the cyber terrorists not only try to steal the nation’s secrets, but they also aim critical national industries and infrastructures. This claim is substantiated by the fact that Australian miners are vehemently targeted by terrorists. Thus, it becomes evident that it is high time to address the issue. In fact, Australian government has already taken a few steps in this regard, though not so effective. One such step is the ... Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity threat posed by a terrorist group Essay”, n.d.)
Retrieved from https://studentshare.net/information-technology/531-cybersecurity-threat-posed-by-a-terrorist-group
(Cybersecurity Threat Posed by a Terrorist Group Essay)
https://studentshare.net/information-technology/531-cybersecurity-threat-posed-by-a-terrorist-group.
“Cybersecurity Threat Posed by a Terrorist Group Essay”, n.d. https://studentshare.net/information-technology/531-cybersecurity-threat-posed-by-a-terrorist-group.
  • Cited: 0 times
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Cybersecurity
For comparing two symmetric algorithms I have chosen Stream Ciphers and Block Ciphers Encryption Algorithms. Stream Ciphers is a symmetric encryption algorithm that encrypts the bits of data and information. Additionally, this type of encryption is performed on one bit at a time (or occasionally 1 byte at a time) of data at some particular time.
5 Pages(1250 words)Essay
Terrorist Group Hezbollah
Hezbollah refers to a Muslim militant group and political party based in Lebanon. The word Hezbollah literally means Party of God (Burgan, 2010). The group receives political and financial support from Syria and Iran. Its paramilitary wing is thought to be a resistant movement throughout the Muslim and Arab world.
3 Pages(750 words)Essay
Cybersecurity
This being a recent but rapidly growing specialty, there has been the need to identify, educate, recruit and retain appropriate workforce. The National Initiative for Cybersecurity Education, is a national effort comprising of more than twenty Federal agencies and departments, industry and academia seeking to raise cybersecurity awareness in America.
3 Pages(750 words)Essay
Profile of a Terrorist Group
Their campaign for independence from the rest of Russia has seen the development of two devastating wars, and currently, an insurgency in the republic. The separatist movement advocates for the independence of the region as it does not want to be governed under Russian law.
5 Pages(1250 words)Essay
Terrorist group
It was found in 1990 by Hafez Saeed Abdullah Azaam and is the most active terrorist group in South Asia and it operates from Pakistan. It was formed as a consequence of Kashmir –India war and has an aim of attacking and resisting Indians in Kashmir. The main reason for its formation was to liberate Muslims living in Kashmir, India and to establish an Islamic state in the South Asia.
6 Pages(1500 words)Research Paper
The threat posed to the United States by nuclear terrorism from Al Qaeda
In Paul Wilkinson's article called Terrorism and the Rule of Law terrorism is defined like "the systematic use of murder, injury and destruction or threat of the same to create a climate of terror, to publicize a cause and to intimidate a wider target into conceding to the terrorists' aims" (12).
11 Pages(2750 words)Essay
Black Criminality and Terrorist Threat
There are conflicting views about the argument that social, economic and political inequalities in the society have led to the black criminality and terrorism. Out of two, this work feels that black terrorism might have a higher claim over terrorism. There are two ways of approaching any community; here Black community, while finding out the crime rates due to some reason or other that has made the community a stereotype victim.
8 Pages(2000 words)Essay
As WWII unfolded, which enemy posed the greater threat to American interests, Germany or Japan
Started in the central and eastern parts of Europe in 1939, the war captured the whole world under its fold and no area of the globe could be escaped from the ruins of the tragic war. World War II
4 Pages(1000 words)Essay
The new terrorist threat and geographical locations
It was founded in mid 1980s in Sri Lanka, based on the following ideology; gaining unjustifiable political powers to the Tamil population which is not large enough to represent the majority of the voters (Potters, 2013). The complete list of terrorist entities in
1 Pages(250 words)Essay
Article Review: Assessing and Managing the Terrorist Threat
Hence, being different to what ensued after the bombing of WTO (1993) and Murrah Building (1995), which in history and especially as per the annals of security documentations are highly profiled as memorable incidents (Leson, 2005). This is because then they could
4 Pages(1000 words)Essay
Let us find you another Essay on topic Cybersecurity threat posed by a terrorist group for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us