Introduction
Nowadays the security issue on the internet is one of the global issues that we are facing. Terrorism has taken new dimensions and we are facing the worst form of terrorism popularly known as "*Cyber Terrorism*".Today I will discuss the various forms of cyber terrorism and will explain how to deal with cyber terrorists. I will also mention the laws regarding cyber security.
What is Cyberterrorism?
Cyberterrorism means an intentional ,negative and harmful use of *Information Technology*(IT) for producing destructive and harmful effects to someone else's property.
For the sake of simplicity,hacking of a computer system and then deleting valuable and business information of the rival is known as cyberterrorism.
Various forms of Cyberterrorism
Privacy Violation
Data Theft
Demolition of E-governence base
Network damage
Privacy Vioaltion
Cyberterrorism completely goes against this law because an individual's privacy is being violated with various cyber attacks in the world.
Data Theft
IT can be misused for appropriating the valuable government secrets and data of private individuals and government agencies.A computer network owned by the government may contain valuable information concerning defense and other top secrets, these top secrets are targeted by the terrorists to facilitate their activities, including the destruction of properties.
Demolition of E-governance base
*Cyberterrorism* targets the E-governance database to damage the connection between the people and the government. As result, Cyber terrorists can reveal the secrets of the government including the trading secrets.
Network damage
The main aim of cyber-terrorist activities is to cause network damage and disruptions.This process involves a combination of computer tampering, virus attacks, hacking, and many many more. After the attack, the network gets collapsed and resulting in the network system being offline.
Cyber Attacks in the World!
Here above it is visible to us that the rate of cyber attacks and malware infections has grown exponentially high. As it was only 61.9% in the year 2014 but as the world is evolving and every daily work is dependent on the internet and computer devices, these cyber crimes have also increased.
Topics in Cyber Security
Data Theft and Data Loss
Ransomware
Internet Frauds
Denial of Service Attack
Cyberterrorism
Prevention
Secure systems should be designed to counter these terrorists and these systems should be launched so that no one can attack that, or if launched, they would cause no damage encouraging people to report malicious cyber activities, and for international cooperation in of problems.
Managemnet
To prevent penetration of the system at risk from the outside, we try to erect hammers and otherwise harden it. If the system is penetrated from the outside, the next line of defense is internal compartmentalization and containment.
Consequence Management
Government should take strict actions against these and should be very keen so that they don't slip under their noses.It is an Active form of defense.
How to deal with Cyberterrorism
- Use of various technologies and products like firewalls, cryptography, intrusion detection.
- Encourage people to report malicious cyber activities to the cyber cell.
- Implement new encryption techniques like end-to-end encryption.
Conclusion
Cyberterrorism is a very global issue and every individual person around the world should be very safe from this cyber-terrorist and the government should ensure their safety. It is very important that we take action against these gangs and mafias and remain highly vigilant and protect their privacy at any cost.
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Congratulations, your nice post has been upvoted by the steem.skillshare curation trail!
If you wish to join as well our trail and support our community, other users, and earn the curation reward, please check out this post:
steem.skillshare curation trail post
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit