Published on Feb 12, 2016
Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us,it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least.
Description of Cyberterrorism
The difference between the conventional approaches of terrorism and new methods is primarily that it is possible to affect a large multitude of people with minimum resources on the terrorist's side, with no danger to him at all. We also glimpse into the reasons that caused terrorists to look towards the Web, and why the Internet is such an attractive alternative to them. The growth of Information Technology has led to the development of this dangerous web of terror, for cyberterrorists could wreak maximum havoc within a small time span. Various situations that can be viewed as acts of cyberterrorism have also been covered. Banks are the most likely places to receive threats, but it cannot be said that any establishment is beyond attack. Tips by which we can protect ourselves from cyberterrorism have also been covered which can reduce problems created by the cyberterrorist.
We, as the Information Technology people of tomorrow need to study and understand the weaknesses of existing systems, and figure out ways of ensuring the world's safety from cyberterrorists. A number of issues here are ethical, in the sense that computing technology is now available to the whole world, but if this gift is used wrongly, the consequences could be disastrous. It is important that we understand and mitigate cyberterrorism for the benefit of society, try to curtail its growth, so that we can heal the present, and live the future…
What the Cyberterrorist can do?
Terrorist groups engaging in cyberterrorism are noted for threats to commerce, public safety and national security. These threats can take any number of forms, but are generally seen as computer versus computer confrontations (While the current discussion focuses on the use of "high tech" applications in terrorist operations, "low tech" operations against a victim's "high tech" infrastructure should not be ignored.) Terrorist groups use their own computer technology to threaten or attack a victim's computer resources. This can take the form of threats or attacks against national infrastructures that have become heavily reliant and interconnected to computer networks. Activity of this sort is tangible in nature and thus, generates most of the interest we have in cyberterrorism today.