Paper Details  
 
   

Has Bibliography
3 Pages
799 Words

 
   
   
    Filter Topics  
 
     
   
 

Cyber Terrorism

r months as it worked its way throughout a particular system and then strike at a pre-selected time. For the entire computer operated portions of American society this is a threat, this extends from mass transit to police and bank records and correctional facilities. Massive destruction both physical and theoretic could easily occur and quite frankly September 11th could be seen as precursor to the uniform and grave situation systematic mainframe crashes would cause. This would be a case of international espionage and would be a drastic move from the normal programs the tech security groups deal with on a daily basis. This type of attack could slide under existing defense and not be identified until it was too late thus rendering the attempts to defend helpless. A comparison would be the 9/11 attacks and how they were almost indefensible because of the suicide bomber mentality of the attackers. Similarly, the new age Cyber-Terrorists would not want the viruses to be detected and have no desire to impress their peers as is the case with their traditional counterparts. Since this is a new type of cyber warfare, there is no consensus on how to deal with theses issues. In a story reported by PC Mag, the FBI has contacted many of the individuals who they have identified as suspected hackers across America as well as a handful of those convicted for fraud / hacking into secure government sites. The intent of this contact was to solicit their services by playing on their Patriotism and their avarice, calling for their help in this turbulent time and praising their technological superiority. From what I can gather, the Intelligence agencies seriously fear this technological assault and are scared that they will be caught sleeping on this front if they do not prepare sufficiently. Internet and networking technologies are areas where America is clearly dominant but extremely susceptible to attack. The fear lies in the jealousy of Amer...

< Prev Page 2 of 3 Next >

    More on Cyber Terrorism...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA