Paper Details  
 
   

Has Bibliography
3 Pages
799 Words

 
   
   
    Filter Topics  
 
     
   
 

Cyber Terrorism

Cyber-Terrorism is a reality in the modern age of rapid technological advancement. As fast as new technology is established, people find ways to hack and corrupt it. Many times there is malicious intent behind such actions. These acts can include everything from computer viruses to contraband network servers to pirated IP addresses and credit account fraud. All of the stories we hear and those annoying emails that warn of a multitude of viruses can lull us into complacency when none of them come to fruition. In all honesty if you have a top-level virus-scanning program such as Norton, or McAfee your machine will be safe from most of the little viruses that you will come across. There is a propensity to copy and mutate existing viruses among the hacker community so they are easily identified and defended against by the scanning programs. Many of the viruses are meant to be detected; it is a high tech game of cat and mouse between the hackers and the Tech security groups. For the most part hackers want their viruses to be caught before they cause major damage. The prestige lies within the acknowledgement that your kung fu is superior among your peers. It follows that a reported virus where the potential level of catastrophe is dire but there is minimal damage done holds far more esteem then crashing a multitude of systems without any knowledge of the super virus reaching the media. There is a high level of taunting and signature traits contained within the viruses that give leads but are just enough not to get caught, it becomes an adrenaline rush for these groups to push the envelope and toe the edge. These viruses are not what the government is concerned with and end up being nothing more then annoyances to the Intelligence Establishment. There is however a very real possibility of a worm type CIF virus that has a purely malicious intent and is created as a stealth virus. Such a virus could go undetected for hours, days o...

Page 1 of 3 Next >

    More on Cyber Terrorism...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA