Cyberterrorism Essay

Masters
Essay
Technology
Pages 8 (2008 words)
Download 0
It is the purpose of this paper to asses and explore the concerns prevalent in the topic of cyberterrorism and to identify from this information the most rational perspective on the path to better understanding the topic. It is the hope of this author, that by the conclusion of this essay a clearer scope will be placed on this topic of which up till now has had a very vague identification in the public circles…

Introduction

Both sides have their valid points, this author tends to isolate what those points are and then use them against one another identify the most rational and sensible position. This will first bee done by identifying the most current societal understanding of cyberterrorism, and then the perspectives of the pinnacle players in its discussed arena. Finally, the facts and statistic on the topic will be assessed, before the summary and concluding argument of the author is presented. The position that this paper proposes is that cyberterrorism is not currently a threat, and used more as a tool to implement fear as a tactic for business and political purposes in this country; however, this does not mean it is not a potential threat. Research shows that there is enough technical capacity and probable cause that as American victories are attained in the war on terror cyberspace will be the next frontier for terrorist activity.
In his Washington Post article Consultant Hacks FBI's Computer System Martin H. Bosworth reports on a outside consultant hired by the Federal Bureau of Investigations (FBI) who breached the agency's computer network and gained access to over 38,000 employee's passwords. ...
Download paper
Not exactly what you need?

Related papers

Photography Essay
The earliest photos on record were made by French physicist Joeseph Nicephore Niepce and were called heliographs and were first made in 1827.…
Cyberterrorism Essay
Both sides have their valid points, this author tends to isolate what those points are and then use them against one another identify the most rational and sensible position. This will first bee done by identifying the most current societal understanding of cyberterrorism, and then the perspectives of the pinnacle players in its discussed arena. Finally, the facts and statistic on the topic will…
Information Security Essay
It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2…
Admission Essay Personal Statement
I believe that being an engineer will enable me to contribute my skills and competencies to the society by being in the forefront of lowering oil production costs and conceiving new technology which can further enhance production efficiency and promote environmental sustainability.…
Microsoft Essay
There has been a rapid growth in the number of products they manufacture. Microsoft released its first operating system. (Cusumano, Selby 1995).…
Cyberterrorism
It is thus, of utmost importance to a nation's economy and its national security.…
Typography Essay
The fine parts of art and craftsmanship began to dissipate in the hassle of making fast bucks. Before the Industrial revolution the printing technology took several significant turns, since everybody wanted to take control of the technology. The journalists, religious authorities and government were all trying to keep their hands of power on it.…