The purpose of the essay "Cyberterrorism - A Threat Or A Hoax" is to assess and explore the concerns prevalent on the topic of cyberterrorism and to identify from this information the most rational perspective on the path for better understanding the topic…
Where a cyber-terrorist acts with the intent of severely impacting the economy or civil morale of the country, a hacker merely causes nonessential or at the most costly damage. For every publication produced that argues cyber-terrorism is a major threat, there is another that comes out claiming it is a hoax. Many of these authors who hold this position argue it is a form of presidential propaganda. In his article, Cyberterrorism: There are many ways terrorists can kill you—computers aren’t one of them, Joshua Green argues that the Bush administration’s infatuation with preaching the dangers of cyberterrorism is one that has become a pattern since September 11th. None are more exemplary of exploiting the public’s misunderstanding of the term, along with their fears, than Homeland Security Director Tom Ridge, which Green proves with this quote by Ridge: Terrorists can sit at one computer connected to one network and can create worldwide havoc," warned Homeland Security Director Tom Ridge in a representative observation last April. "[They] don't necessarily need a bomb or explosives to cripple a sector of the economy, or shut down a power grid. (Green, 2002)" Green further points out that Ridge’s propaganda is not without merit considering that a survey of 725 cities conducted by the National League of Cities for the Anniversary of the 9/11 attacks showed that cyberterrorism ranked with biological and chemical weapons at the top of a list made by officials of the single most feared threats (2002)....
Green recognizes that all of these actions would be reasonable responses to an actual looming threat, but they fail to muster any sort of rationale considering that, as he states, there is no such thing as cyberterrorism--no instance of anyone ever having been killed by a terrorist (or anyone else) using a computer (2002). In his article Cyberterrorism: How Real Is the Threat? Gabriel Weimann acknowledges that the potential threat of cyberterrorism is the cause for its apparent alarm in society; but with not one single recorded instance of authentic cyberterrorism, one is left to wonder if there is really a threat (Weimann, 2004). Weimann identifies the public concerns over cyberterrorism as the most pinnacle form of trivial propaganda. He best relays this idea with the argument, Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term "cyberterrorism." The fear of random, violent victimization blends well with the distrust and outright fear of computer technology. He further points out that this unprecedented type of fear somewhat existed before 9/11, and it was identified through a number of U.S. military exercises which revealed many vulnerabilities in the American network. After 9/11 cyberterrorism was promoted to contribute to fear tactic propaganda of the president and it was enhanced by those who Weimann refers to as interested actors from the political, business, and security circles (2004). Despite all of this, he does not completely disregard cyberterrorism as just a propaganda scare. The Symantec Corporation, founded in 1982, is an international corporation known for selling security and information management computer software. For the companies 2003 security response titled Cyberterrorism? Sarah Gordon and Richard Ford assess all of the facts about cyberterrorism for the purpose of increasing common knowledge about prevention. ...
Cite this document
(“Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from https://studentshare.net/technology/274229-cyberterrorism-essay
(Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 Words)
“Cyberterrorism - A Threat Or A Hoax Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.net/technology/274229-cyberterrorism-essay.
Many Nations of the world have witnessed the chaos left behind by this evil practice of terrorism. With many measures in place and laws laid down, terrorism has been subsided. But a new form of terrorism evolutes through the emerging technology, which has been intimidating the world through its malicious affects, finally took the form of “Cyber terrorism”.
Human made environmental disturbances such as deforestation, increased mining activities, and unscientific quarrying activities adversely affect the geological as well as ecological structure of the earth. Evidently, the undesirable structure transformation is the root cause of majority of small to medium scale disasters including fires and land sliding.
What if the same concept was applied to a live animal, such as a kitten
II. Credibility Statement: The Humane Society of the United States has received numerous complaints about the website since its very beginning. After performing research, they found that it was a hoax "that describes how to stuff kittens into glass containers to warp their bodies into the shape of the container.
Cyberspace is defined as "The electronic medium of computer networks, in which online communication takes place." It is made up of millions of interconnected networks, servers, computers, and fibre optic cables which help control the entire infrastructure.
s research also aims to investigate how the repercussions of such legislation can be moderated through a balance of the law coupled with other measures that can work in tandem with the law. Some of the measures recommended in this study include a more active role for
Is the National Response Framework being followed by local and state government’s emergency response units? Should revisions be made to the framework so that it will also address the current threat on “cyberterrorrism”?
Emergency and disaster planning for state
Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files. The misuse of the computer may involve the falsification of computer signatures through
The internet has become a valuable tool that is relied on by almost every country in the world. It leads to the interconnection between different countries on various important issues. Moreover, the internet continues to play a valuable role in national and international space. It plays a role in the linkage of different networks of computers.
3 Pages(750 words)Essay
GOT A TRICKY QUESTION? RECEIVE AN ANSWER FROM STUDENTS LIKE YOU!
Let us find you another Essay on topic Cyberterrorism - A Threat Or A Hoax for FREE!