Cyber Threats

Categories: AttackCyberTechnology

Before we get into the major cyber terrorism threats that we all have to deal with I wanted to first define what cyber terrorism is. According to the U. S. Federal Bureau of Investigation, cyber terrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents Unlike an annoying virus or computer attack that results in denial of service, a cyber terrorist attack could lead to physical violence or extreme financial harm.

According to the U. S. Commission of Critical Infrastructure Protection, possible cyber terrorism targets include the banking industry, military installations, power plants, air traffic control centers, and water systems. Cyber terrorism is often referred to as electronic terrorism or information war. Based on recent reports and the information presented to congress, America has a long way to go before security threats are adequately addressed. Almost half of 2,131 U. S. ompanies polled had no formal security policies in place, and most relied primarily on user passwords and multiple logons for protection.

Get quality help now
Verified writer

Proficient in: Attack

5 (339)

“ KarrieWrites did such a phenomenal job on this assignment! He completed it prior to its deadline and was thorough and informative. ”

+84 relevant experts are online
Hire writer

Only 49% of U. S. companies had plans to raise user awareness of policies and procedures in the next 12 month. Unbelievably only half of 150 companies surveyed by InformationWeek Research one week after the terrorist attacks said that they plan to reassess the security of their facilities in light of those events. We need more people to be doing more creative thinking about computer security, than those who are trying to attack us.

In December, 2000 the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction (aka The Gilmore Commission) released their second annual report which stated two possible cyber terrorist scenarios.

Get to Know The Price Estimate For Your Paper
Number of pages
Email Invalid email

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

"You must agree to out terms of services and privacy policy"
Write my paper

You won’t be charged yet!

First, “It is easy to envision a coordinated attack by terrorists, using a conventional or small-scale chemical device, with cyber attacks against law enforcement communications, emergency medical facilities, and other systems critical to a response. ” Second, “it is conceivable that terrorists could mount a cyber attack gainst power or water facilities or industrial plants – for example, a commercial chemical plant that produces a highly toxic substance – to produce casualties in the hundreds of thousands. ” The report adds that “the most likely perpetrators of cyber-attacks on critical infrastructures are terrorists and criminal groups rather than nation-states. ” Denning, 2003 So, what can be done proactively to prevent cyber terrorism and cyber crime attacks? The first and easiest thing for you to do is harden and secure your systems by establishing secure configurations.

Next you can prepare for intrusions by getting ready for detection and response. You also need to make sure you detect intrusions quickly when they do occur. You also need to respond to intrusions quickly to ensure you minimize the damage to your systems. Lastly you need to improve your security to help protect against future attacks. There are thousands of ways to help protect against cyber terrorism threats but I think the following are the simplest and most effective ways to start, Make sure all accounts have passwords and the passwords should be unusual, difficult to guess.

Be sure to change the network configuration when defects become known. Constantly check with venders for upgrades and patches that can be installed to help strengthen your defenses. You can also choose to audit systems and check logs to help in detecting and tracing an intruder.

Cite this page

Cyber Threats. (2016, Dec 08). Retrieved from

Cyber Threats

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment