Steem Skillshare | Dangers of Cyber Terrorism | club5050 | By @qaisali49

in hive-197809 •  3 years ago 

Introduction

Nowadays the security issue on the internet is one of the global issues that we are facing. Terrorism has taken new dimensions and we are facing the worst form of terrorism popularly known as "*Cyber Terrorism*".Today I will discuss the various forms of cyber terrorism and will explain how to deal with cyber terrorists. I will also mention the laws regarding cyber security.

image.png
Source

What is Cyberterrorism?

Cyberterrorism means an intentional ,negative and harmful use of *Information Technology*(IT) for producing destructive and harmful effects to someone else's property. For the sake of simplicity,hacking of a computer system and then deleting valuable and business information of the rival is known as cyberterrorism.

image.png
Source

Various forms of Cyberterrorism

  • Privacy Violation

  • Data Theft

  • Demolition of E-governence base

  • Network damage

Privacy Vioaltion

Cyberterrorism completely goes against this law because an individual's privacy is being violated with various cyber attacks in the world.

image.png
Image Source

Data Theft

IT can be misused for appropriating the valuable government secrets and data of private individuals and government agencies.A computer network owned by the government may contain valuable information concerning defense and other top secrets, these top secrets are targeted by the terrorists to facilitate their activities, including the destruction of properties.

image.png
Source

Demolition of E-governance base

*Cyberterrorism* targets the E-governance database to damage the connection between the people and the government. As result, Cyber terrorists can reveal the secrets of the government including the trading secrets.

image.png
Source

Network damage

The main aim of cyber-terrorist activities is to cause network damage and disruptions.This process involves a combination of computer tampering, virus attacks, hacking, and many many more. After the attack, the network gets collapsed and resulting in the network system being offline.

image.png
Source

Cyber Attacks in the World!

image.png
Source

Here above it is visible to us that the rate of cyber attacks and malware infections has grown exponentially high. As it was only 61.9% in the year 2014 but as the world is evolving and every daily work is dependent on the internet and computer devices, these cyber crimes have also increased.

Topics in Cyber Security

  • Data Theft and Data Loss

  • Ransomware

  • Internet Frauds

  • Denial of Service Attack

  • Cyberterrorism

  • Prevention

Secure systems should be designed to counter these terrorists and these systems should be launched so that no one can attack that, or if launched, they would cause no damage encouraging people to report malicious cyber activities, and for international cooperation in of problems.
  • Managemnet

To prevent penetration of the system at risk from the outside, we try to erect hammers and otherwise harden it. If the system is penetrated from the outside, the next line of defense is internal compartmentalization and containment.
  • Consequence Management

Government should take strict actions against these and should be very keen so that they don't slip under their noses.It is an Active form of defense.

image.png
Source

  • How to deal with Cyberterrorism

  • Use of various technologies and products like firewalls, cryptography, intrusion detection.
  • Encourage people to report malicious cyber activities to the cyber cell.
  • Implement new encryption techniques like end-to-end encryption.

image.png
Source

Conclusion

Cyberterrorism is a very global issue and every individual person around the world should be very safe from this cyber-terrorist and the government should ensure their safety. It is very important that we take action against these gangs and mafias and remain highly vigilant and protect their privacy at any cost.

REGARDS: @qaisali49

My Introduction:

Achievement

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

image.png

Congratulations, your nice post has been upvoted by the steem.skillshare curation trail!
If you wish to join as well our trail and support our community, other users, and earn the curation reward, please check out this post:
steem.skillshare curation trail post

trail.jpg