Cyber Security Threat Posed by a Terrorist Group - Essay Example

Only on StudentShare

Extract of sample
Cyber Security Threat Posed by a Terrorist Group

The government should, at this juncture, start three important steps; the first one to secure vital governmental, defense, and nuclear installations from a possible cyber attack, the second to protect the nationally important infrastructure and industries, and the third to protect common users from cyber attacks and also to help the ‘compromised’ get rid of the malware.
In order to ensure future prevention of attempts of cyber attacks on defense, government departments, and nuclear installations, it is necessary to develop an agency similar to the Joint Functional Component Command for Network Warfare developed by the US Department of Defense. It should be provided access to data from various governmental law enforcement agencies and private sector as required in its operations. In addition, as already found, certain nations are highly involved in cyber attacks. So, the agency should be allowed to utilize its resources for both offensive and defensive purposes. In other words, military and various other law enforcement agencies can make use of the expertise of this agency as and when required.
In total, by adopting the above steps, it will be possible for Australia to ensure maximum cyber safety in case of a future cyber terrorist attack. This will ensure an adequate level of security at all the levels of the nation ranging from the government departments, defense, various industries, and the common users. Considering the rising levels of cyber attacks on Australia, the earlier the strategies are adopted, the better the future will be. ...Show more


This essay discusses that the rising number of cyber attacks in Australia indicates that Australia is facing the serious threat of cyber terrorism. Sparse cyber attacks only cause annoyance, the present situation in Australia is facing a considerable degree of such attacks…
Author : jordane50
Cyber Security Threat Posed by a Terrorist Group essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Cyber Security Threat Posed by a Terrorist Group"
with a personal 20% discount.
Grab the best paper

Related Essays

Cybersecurity threat posed by a terrorist group
Considering the fact that nations like China and US have already taken stringent steps to prevent any cyber attacks on them, and also to utilize cyber attack as a positive warfare, it is highly necessary to adopt policies at the earliest to prevent such further attacks on Australia, especially when there is a rise in the attacks
9 pages (2250 words) Essay
Twelve Security Attack Trends of 2011
GSM Security 15 7. References 19 PART I 1. Twelve Security Attack Trends of 2011 The first security threat is from the man in the browser (MITB). It is the attack on browser software used for accessing internet. Leading browsers are Microsoft Internet Explorer 8.0, Chrome from Google, etc.
9 pages (2000 words) Essay
Cyber Terrorists: Shutdown the Internet
It marked the beginning of Terror frightened world with numerous mishaps to follow. The major security forces of the world have strengthened their operation and have manipulated every possible measures to encounter the brutal acts of terrorist, but not very often they did managed to escape from the parasitism of terror.
5 pages (1250 words) Essay
National Security Strategy
Both documents together adequately articulate the ‘ways’ and ‘means to implement the administration’s view with regards to the national security as defined in the 2010 National Security Strategy (NSS). Threats to American security and interests have become more defuse, harder to anticipate and more difficult to combat.
5 pages (1250 words) Essay
Managing information risk and security
However,as much as it has fared sophistication in this knowledge-based economy,organizations have likewise put up imperative measures to safeguard critical IS assets from system abuse and misuse by constantly upgrading and installing firewalls,anti-virus,use of encryption keys,protectors,use of comprehensive monitoring system
17 pages (4250 words) Essay
Internet Risk and Security - Cyber Threat (Identity Fraud) in a Finance Organisation
In such context, this paper will try to shed light on pertinent issues regarding identity fraud in financial organization through cyber space. In the first section, the paper will try to demystify the nature of identity fraud in financial organizations and what are the pertinent factors that create difficulty for users to detect the fraud.
12 pages (3000 words) Essay
Black Criminality and Terrorist Threat
There are conflicting views about the argument that social, economic and political inequalities in the society have led to the black criminality and terrorism. Out of two, this work feels that black terrorism might have a higher claim over terrorism. There are two ways of approaching any community; here Black community, while finding out the crime rates due to some reason or other that has made the community a stereotype victim.
8 pages (2000 words) Essay
Cyber Security
Ensuring cyber security is the role of every individual as it’s everyone’s duty to ensure it is safer, more secure and resilient (Marshall, 67). Cyber security refers to the body of
1 pages (250 words) Essay
Cyber Security
The paper aims at providing detailed information on how Stuxnet was introduced to Iran’s and Russian power plants, how it spread to the International Space Station, the lost information as well as the technological improvements that need to be employed in preventing its recurrence.It is known that Stuxnet is a product of the U.S and Israel project.
3 pages (750 words) Essay
Cyber Security
This would automatically result into losses, especially if the problem is serious (Mishra, 2013). Experts suggest deleting the infected files as the worst option an antivirus can resort
1 pages (250 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email