StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Sciences & Information Technology - Cyberterrorism - Essay Example

Cite this document
Summary
The paper "Computer Sciences & Information Technology - Cyberterrorism" highlights that creating awareness and abandoning this crime at the community level will help us build a generation that would work together in eliminating this crime at the national and international level.
 …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Computer Sciences & Information Technology - Cyberterrorism
Read Text Preview

Extract of sample "Computer Sciences & Information Technology - Cyberterrorism"

‘Cyberterrorism hinges on the widespread use of computers by individuals, private industry and corporations, the military, and the government and its agencies.’ (Ching, 2010)  The main focus of the two articles is the spreading of this crime in recent years and the hype created by the mass media, political and economic forces against the threat of such crime. The lack of trial and reporting of such incidences makes this threat question itself. The articles have clarified the concepts of hacking, hactivism, cracking and their relation with and the comprehensive meaning of the word cyberterrorism.

 

In my opinion, the increasing use of information technology does make us vulnerable to cyberterrorism more than ever before. I agree with the writer where he talks about the more unconventional routes adopted by the terrorists for spreading terror because of the anonymity, cost-effectiveness and mass destruction capabilities. The book ‘Black Ice’ also shows the possibilities and realities of cyberterrorism and the vulnerabilities of the sectors to these crimes. The biggest fear is the ability of the terrorist to command the data once he gets into the system posing threats at the national level. In the absence of physical landscape and defying the constraints of the law of nature, cybercrime can be very tricky at times. The various religious groups fight for their right through cyber encroachment and history has also witnessed credit card threats and invasion of bank internet facilities through the cybercriminals. Apart from the above agreements, there are few points in the articles where I disagree with the writers. The point that no real cases of cyberterrorism are reported or witnessed, I still believe that the hype is not just for the sake of it. The hype for me is the call of awareness, the information required by the general public in order to foresee what is coming. Although no such incidence has happened the proactive human nature says awareness should be at every doorstep to fight what is as quiet as a snake and more devastating than an earthquake.

 

In real life, schools and universities can spend a part of their budgets on creating better firewalls for better protection of their data and discouraging the students who eye this glamorous crime by not giving them any means of success. A vigilant analysis of the data setup and monitoring the usage of the internet by the schools, universities and in homes is the need of the time. The students should be explained the difference between the use, misuse and offensive use of information technology.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summary Essay Example | Topics and Well Written Essays - 500 words - 93”, n.d.)
Summary Essay Example | Topics and Well Written Essays - 500 words - 93. Retrieved from https://studentshare.org/information-technology/1620908-summary
(Summary Essay Example | Topics and Well Written Essays - 500 Words - 93)
Summary Essay Example | Topics and Well Written Essays - 500 Words - 93. https://studentshare.org/information-technology/1620908-summary.
“Summary Essay Example | Topics and Well Written Essays - 500 Words - 93”, n.d. https://studentshare.org/information-technology/1620908-summary.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Sciences & Information Technology - Cyberterrorism

Computer Sciences and Information Technology

A paper "Computer Sciences and information technology" claims that both computer science and information technology augment each other's purpose.... The research focuses on the importance of information technology.... nbsp; … Clark French emphasized computer science is not the mirror image of information technology.... nbsp; Computer science is a science that is based on information theory.... Computer science incorporates mathematical concepts of computation as well as information....
5 Pages (1250 words) Research Paper

Computer Sciences and Information Technology

This paper ''Computer Sciences and information technology'' discusses about the motherboard and it functions, central processing unit and it functions, a printer, drive disks, disk storage, a floppy disk, CD-ROM or DVD drive, a hard disk drive  etc.... Upgradability: With the advancement in technology which see the emergence of new motherboards, it is a mater of fact that newer processors may experience compatibility problems with the hardware due to limitations of circuitry built-in to the board, which may not allow them to function....
11 Pages (2750 words) Term Paper

Computer Sciences and Information Technology

Name of author: Computer sciences and information technology 1.... It is impossible to counter cyber-attacks without censoring the information passed through internet.... Application Software comparisons Web applications can be easily accessible free of cost to anybody who has a computer and internet connection.... It is not necessary to install web applications in computer hard disks to use it.... hellip; On the other hand, application software needs to be purchased and installed in the computer hard disks before some body can use it....
5 Pages (1250 words) Essay

Digital Violence as a Terrorist Risk in Australia

Commission of Critical Infrastructure Protection, possible cyberterrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems.... But a new form of terrorism evolutes through the emerging technology, which has been intimidating the world through its malicious affects, finally took the form of “Cyber terrorism”.... With emerging technology, the governments have been relying more on the computers and their reliability is now taken advantage of....
3 Pages (750 words) Essay

Cyberterrorism - A Threat Or A Hoax

The purpose of the essay "cyberterrorism - A Threat Or A Hoax" is to assess and explore the concerns prevalent on the topic of cyberterrorism and to identify from this information the most rational perspective on the path for better understanding the topic.... hellip; Previous researchers and writers when addressing cyberterrorism have either been in support of one position or the other;  those who deem it to be a threat herald its potential impact on our society, and the opposition tends to view it as a farce propagated by the current presidential administration....
7 Pages (1750 words) Essay

The Issue of Invasion of the Right to Privacy of the Students

This is a major violation of the right to privacy as provided for in the According to privacy laws private information is owned by the person it describes this includes medical records and even school grades.... This information is deemed to be obtained illegally and cannot be used without permission from the owner.... Privacy law and protection of student's private life and information was affirmed in the class action suit of Robbins v.... imilar situations I have encountered include an online company accessing personal information of social media users and calling the users with the intention to defraud them....
2 Pages (500 words) Essay

Computer sciences and information technology

Computer Sciences and information technology Computer Sciences and information technology A switch is suitable for use in a situation where a large number of devices connected using a computer network exists.... According to Rivard (2013), the switch facilitates proper flow of information to an intended device through transmission of a message across the network.... According to Rivard (2013), the switch facilitates proper flow of information to an intended device through transmission of a message across the network....
2 Pages (500 words) Essay

Computer sciences and Information technology

hellip; The best locations are; insurance and risk management, information technology, legal department, operations or administrative services.... Computer sciences and information technology What functions constitute a complete information security program?... The best locations are; insurance and risk management, information technology, legal department, operations or administrative services.... here can an organization place the information security unit?...
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us