StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Convergence of Terrorism and Cyberspace - Case Study Example

Cite this document
Summary
The paper entitled 'The Convergence of Terrorism and Cyberspace' presents the fast pace of technological development that has spanned the current century, one is intrigued by the way criminal activities have used technological media to perpetuate havoc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
The Convergence of Terrorism and Cyberspace
Read Text Preview

Extract of sample "The Convergence of Terrorism and Cyberspace"

? Cyber Terrorism Case Study Cyber Terrorism Case Study Introduction With the continuing fast pace of technological development that have spanned during the current century, one is intrigued by the way criminal activities have used technological media to perpetuated havoc. The emergence and widespread use of the Internet globally has made this medium vulnerable to various threats and acts of violations of both personal and organizational privacy and security. Termed as cyber terrorism, the definition of which was revealed to have spurred difficulties in taxonomies, its meaning is hereby quoted by Gordon as: “Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination or severe economic loss would be examples” (Denning, 2000, p.1). Two other definitions of the term were created by the U.S. Federal Emergency Management Agency (FEMA) and Coleman whose definitions are as follows: “unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives” (Wilson, 2008); and “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives” (Coleman, 2003). All definitions have emphasized the purpose of furthering social, political, or ideological interests or objectives in these terrorist attacks. In this regard, the current case study aims to proffer pertinent issues relative to specific case on cyber terrorism through the Pakistan – India conflict over Kashmir that defaced a considerable number of Indian and Pakistani websites over a period of three years (between 1999 and 2001). Statement of the Purpose The purpose of the current case study is to present details on cyber-attack that had persisted between Pakistan and India over their territorial conflict on Kashmir. According to Vatis (2001), “this conflict illustrates the vulnerability of critical infrastructure systems to cyber attacks and the increasing willingness of groups to target sensitive systems during political conflicts” (p. 5). The case study, therefore, enhances awareness on conflicting parties’ increased vulnerabilities to cyber terrorist attacks and, thus, should focus on installing increased protection and security measures to prevent destructive disruptions. Description of the Subject The case covered the conflict between India and Pakistan over a territory: Kashmir. Historical events have traced the geopolitical dispute after the British occupation in 1947. Armed conflicts were used through the years before 1998 to resolve problems, after that the dispute eventually resorted to electronic warfare ranging from hacking incidents to web defacements that disrupted websites in both private and public sectors of India and Pakistan. Chronology of the Case Study The India – Pakistan conflict over Kashmir could be traced from the end of the British occupation in 1947, when, according to a summarized discourse: “two countries stood where there once was one. Pakistan separated with the intention of being the nation for the Muslims of India. Kashmir, the roots of the boundary dispute between the two nations, was an autonomous state under British rule and remained so post-partition, when initially given a choice between Pakistan and India. Eventually though, in October of 1947, the ruling prince of Kashmir made a decision in favor of India. This decision was viewed as fraudulent, unfair, and completely unrecognized by the Pakistani government” (Summary: India-Pakistan Conflict over Kashmir, n.d., par. 1). From armed conflicts, in 1998, as revealed by Billo and Chang (2004), “the Indian authorities announced a shift in military doctrine in 1998 to embrace electronic warfare and information operations” (p. 8). Therefore, Pakistan and India have resorted to different hacking and web defacement attacks that immobilized both private and public sectors within their domain (Billo & Chang, 2004). From an initial identified number of 45 websites in India being defaced in 1999, the number have escalated to 275 in 2001 without India’s immediate installation of security measure to prevent the attack which caused significant disruptions. Results The article written by Vatis (2001) visually illustrated the number of attacks from 1999 to 2001 through the figure below. As shown, the India – Pakistan territorial conflict have led to innumerous web site defacements in India starting from 45 sites in 1999 to 275 in 2001. This proves that, when left unabated, the number of disruptions could significantly immobilize various private and public organizations. Source: Vatis, 2001, p. 5 On the other hand, on the part of Pakistan, Billo and Chang (2004) cited the report from The Hindu written by Anand (2003) as disclosing that “Earlier this year, newspaper reports had indicated that an unnamed virus launched by a secretive Indian hacker group had rendered 200 Pakistani websites inaccessible for several days and erased the hard disks of scores of computer [sic] in the Pakistani Government as well as the private sector in that country” (Anand, 2003; cited in Billo and Chang, 2004, p. 41). The case results indicate that cyber terrorism attacks, if left unattended and without proper installation of security protocols, could continue to disrupt various sectors of the economy through defacing websites and immobilizing continue operations of affected organizations. Lessons Learned The India – Pakistan conflict over a territorial concern is an appropriate example of how the dispute escalated to electronic warfare due to the availability of opportunities and vulnerabilities posed by the technological developments of the World Wide Web. As initially revealed, one of the purposes of cyber terrorism is to cause severe losses; in this case, due to the dispute over Kashmir. Without arriving at any conclusive agreement over the territory, and with more sophistication being developed to intrude various websites, there would be continued risks and threats that need to be addressed and mitigated. To address the dilemma, both countries must ultimately forge a treaty to end their dispute. Otherwise, both private and public organizations in both countries must enforce more stringent security applications with regular updating, monitoring and installation of “high fidelity intrusion detection systems (IDS) and firewalls” (Vatis, 2001, p. 19). Regular risk assessment and identification of potential critical infrastructures must be part of an incident management system that must be developed and intensified by all private and public organizations in these identified countries. Likewise, their experience should provide lessons for other countries to apply the same depth in focus and in installing the required security measures to prevent cyber-attacks. Conclusion The current case study effectively presented pertinent issues relative to the cyber terrorism attacks exchanged by India and Pakistan due to geopolitical conflict over Kashmir. Through identifying the purpose, description, a chronology of events, the results and lessons learned, one recognizes that vigilance and focus on cyber security must be a continued governmental priority. References Anand, G. (2003). “Indo-Pak hacker war comes here too.” The Hindu. Billo, C., & Chang, W. (2004). Cyber warfare: An analysis of the means and motivations of selected nation states. Institute for Security Technolgy Studies. Retrieved March 15, 2012 from http://www.ists.dartmouth.edu/docs/cyberwarfare.pdf Coleman, K. (2003). Cyber terrorism. Retrieved March 15, 2012, from http://www.directionsmag.com/articles/cyber-terrorism/123840 Denning, D. (2000). Cyberterrorism. Retrieved March 15, 2012, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html Gordon, S. (n.d.). Cyberterrorism? Symantec Security Response. Retrieved March 15, 2012, from http://www.symantec.com/avcenter/reference/cyberterrorism.pdf "Summary: India-Pakistan Conflict over Kashmir." (n.d.). Retrieved March 15, 2012, from http://userpages.umbc.edu/~nmiller/POLI388/SUMMARIES/SOMA.htm Vatis, M. (2001). Cyber attacks during the war on terrorism: A predictive analysis. Institute for Security Technology Studies. Retrieved March 15, 2012, from http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA395300 Wilson, C. (2008). Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for congress. Retrieved March 15, 2012, from http://www.fas.org/sgp/crs/terror/RL32114.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Terrorism Case Study Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1445113-cyber-terrorism
(Cyber Terrorism Case Study Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/information-technology/1445113-cyber-terrorism.
“Cyber Terrorism Case Study Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1445113-cyber-terrorism.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Convergence of Terrorism and Cyberspace

Cyber Terrorism

??Cyberterrorism is The Convergence of Terrorism and Cyberspace.... A research has found that the various terrorist groups and organizations make regular use of the internet and the information available on it to carry out attacks on the integrated software system and people, to communicate with the world and to plan and support the different acts of terrorism.... The advantages that the global internet offers as a weapon of terrorism are manifold....
10 Pages (2500 words) Research Paper

Components of Cyber-Terrorism

However, the increasing influence of cyberspace has extended into the area of terrorism.... This essay "Cyber-Terrorism" is about the mingling of cyberspace with terrorism.... But the basic, and perhaps the most important, part of any infrastructure today is 'cyberspace', which acts like the nervous system which connects and controls all the other functions of a country.... cyberspace is defined as 'The electronic medium of computer networks, in which online communication takes place....
8 Pages (2000 words) Essay

The Regulation of Cyberspace Activity

This research provides a report on issues like cyberspace regulation and the problem of its regulation through laws.... This paper tells that digitalization of information has produced a highly amorphous medium known as cyberspace where territorial jurisdiction is difficult to apply.... The pervasiveness of the electronic medium and the facility of connectivity across geographical boundaries through the Internet have resulted in a vast space where users communicate, that may be referred to as cyberspace....
16 Pages (4000 words) Essay

Cyber Terrorism Attacks

Mainly, the newly born type of terrorism seeks to harm the social media through the development of malware.... Further, cyber war is an inclusion to cyber terrorism since it involves the activities of terrorism organizations prying rival governments' information and destroying it to bar them from achieving profound goals in anti-terrorism activities.... However, the threat of this mode of communication is at large, citing to the emergence of computer terrorism....
10 Pages (2500 words) Essay

The US Army and the Cyber Domain

From the paper "The US Army and the Cyber Domain" it is clear that aimed at greater efficiency and soundness in cyberspace activities, the US army has proposed a plan to integrate a program with their international partners so that they can enhance the collective cybersecurity.... The cyberspace has also been an ever-growing network wherein the technology base of the cyber has been a very complicated domain, which needs continuous exploration and development....
6 Pages (1500 words) Case Study

Digital Crime and Digital Terrorism

The introduction and improvement of information technology throughout the world have led to the growth of terrorism and transnational crime where criminals hire specialists to do illegal transactions through the use of information technology (Baggili, 2011).... It also looks at the role and responsibilities of law enforcement agencies, various laws, and legislation supporting law enforcement against digital crime and digital terrorism and procedures for investigating these crimes....
6 Pages (1500 words) Report

Internet and International Relations

the convergence of media promoted by the growth of the internet is changing global news coverage and changing relations among nations.... The tripartite association of public, policy-makers and news media has been made tighter by the web's convergence powers.... The idea of this paper "Internet and International Relations" emerged from the author's interest and fascination with how internet has changed international relations....
10 Pages (2500 words) Literature review

Factors That Make Cyberspace Different to Terrestrial Cyber Security

The paper 'Factors That Make cyberspace Different to Terrestrial Cyber Security ' is a meaty variant of a literature review on information technology.... cyberspace can be defined as the man-made domain that is created when connections involving computers, routers, switches, wireless devices, fiber optic cables, satellites are made to transfer huge amounts of data at high speeds.... The paper 'Factors That Make cyberspace Different to Terrestrial Cyber Security ' is a meaty variant of a literature review on information technology....
11 Pages (2750 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us