Research report on ‘Cyber Terrorism’

Number of Words : 6606

Number of References : 15

Assignment Key : IO-8344

Contents

  • Content for this assignmentExecutive Summary 2
  • Content for this assignmentIntroduction 3
  • Content for this assignmentHistory 4
  • Content for this assignmentNature of Cyber Terrorism 5
  • Content for this assignmentStrategies 7
  • Content for this assignmentVictims and damage caused 8
  • Content for this assignmentMethods of Attack 9
  • Content for this assignmentExisting laws (Australian and International) and their shortcomings 10
  • Content for this assignmentOther issues in the field 14
  • Content for this assignmentCounter measures 16
  • Content for this assignmentConclusion/Findings 19
  • Content for this assignmentReferences 21

Description

Cyber terrorism is a complex issue that is influenced by and influences a number of other factors. It was born due mainly due to the inherent characteristics of the internet namely, its ease of use and anonymous communication. The integration and connectivity provided by the technology has only served the needs of terrorists. From an active use of the internet to cause harm to intended parties, cyber terrorism has evolved such that it is now used to carry out a number of additional functions. Tackling the issue of cyber terrorism has been accompanied by a number of obstacles and created a host of issues. Legislation is the central focus through which the problem is tackled, however, due to the global nature of the technology and the problem, cooperation within and among nations is a must. Those nations that have been hard on cyber terrorism have experienced issues such as those on civil liberty and freedom of expression. Therefore, due to the complex nature of problems associated with cyber terrorism it is important to act on multiple fronts and ensure the cooperation of a number of stakeholders in the scenario. Cyber terrorism, however, is only part of the bigger issue of terrorism. This implies that cyber terrorism requires a dual approach, an approach similar to dealing with cyber crime and one that deals entirely on the motives of terrorism. This in turn necessitates cooperation from the foreign affairs department of a nation. However, for the foreseeable future, cyber terrorism will be expected to evolve rapidly making use of sophisticated computer technology to launch attacks. Despite the absence of a large scale attack to date, there is no reason that an attack on a massive scale is not possible especially given the motivation and resources available to terrorists.

Ready Assignment

180 USD

Full Assignment with reference list delivered by email

Custom Assignment

360 USD

Assignment Uniquely made for you with Plagiarism Report, Delivery within 72 hours

References

20 USD

Reference list for this assignment will be delivered instantly.

Assignment Preview

Whatsapp contact