Discussion Cyber Terrorism Critique

March 8, 2022
Want your Assignment Done? Order NOw you can do it easy.

Discussion Cyber Terrorism Critique

Discussion Cyber Terrorism Critique

Cyber terrorism is the modern-day terrorism attacks. This type of terrorism comes in many different forms such as malicious attempts to disrupt or damage a computer system, network, and access files. It could also include attempting to infiltrate and steal data (SecureWorks, 2017). There are different areas of cyber terrorism that go as targeted and untargeted. Different attacks that the firm should be aware of include:

Phishing – Through malicious links usually sent by emails.
Watering Hole – Where there is a fake webpage that attacks visitors that go onto it.
Ransomware – This infects a system by encrypting files and locking user access to these systems.
Scanning – This is where they can test for vulnerabilities.
Spear-Phishing- This is where a phishing attack is directed towards a specific person.
Distributed Denial of Service – This deploys a mass amount of packet requests usually from a botnet to overload a system and prevents regular access by real users.
Supply chain – Attacks an element of an organization before it arrives.
Zero-day – Bespokes the exploitation of a system that has specific vulnerabilities that the author does not know about.

Many acts of terrorism are often synonymous with acts of cybercrime and this also means they attacks can be implemented by terrorists and or by regular cybercriminals. Cyber terrorism is one of the fastest-growing threats that doesn’t only target individuals, but it’s also targeting private and public organizations and nations as a whole! Prevention is possible with gathering preliminary reconnaissance on potential threats while managing current threats (Littlefield, 2017). Cybersecurity professionals need to be able to be prepared for imminent threats that could be acts of terrorism. This organization needs to be able to answer questions such as 1. What do we foresee terrorists wanting to do in cyberspace? 2. How can we prevent these actions? 3. How can we be proactive against these actions?

Click here to ORDER an A++ paper from our Verified MASTERS and DOCTORATE WRITERS: Discussion Cyber Terrorism Critique

Terrorists look to utilize cyberspace in order to support their motivation, whether that be their religious, social, cultural, political, or economic beliefs. Attacking critical infrastructures and services in society and utilizing cyberspace to inflict harm to others (Littlefield, 2017). In addition to this, it’s also important to state that cyber terrorists may also employ cyberspace not only to cause harm but also to facilitate their activities, including the likes of laundering of finances, encrypted communications, recruitment, and promotion of their activities. A valuable method of developing prevention against cyber-terrorist threats before they could happen is by implementing security as one of the integral parts of development in software and devices. When discussing prevention methods against cyber terrorism as appose to that of cybercrime, the methods must be considered differently due to the perspective of the attacker (Littlefield, 2017).

Specifically, when it comes to cyber-terrorist hitting the financial industry in today’s time they are faced with highly motivated criminals looking to make financial gains. From 2017-2018 these criminals were able to generate billions of dollars worth of profits and causing grosses losses to reach over $1 trillion to the markets because of their attacks (Intsights, 2018). Their attempts at targeting these banks comes from going after major bank transfer platforms, phishing emails, phishing websites that trick users into giving up their credentials, fake mobile applications, mobile malware, ATM scamming methods, Point of Sale attacks, and attacks against e-banking interfaces. Bank account logins, financial information, IP addresses, domain names, and any other financial record are considered valuable details that can be used by the cybercriminal (Intsights, 2018). Leaked banking information has had a 135% increase in financial data that was being sold on the dark web black markets. On average that is 3.8 incidents per week per bank.

Although the possibilities for cyber-terrorist to make an impact is at large there are recommendations for reducing the chances of being victimized but these groups of people such as using threat intelligence to take a proactive approach to our security program, evaluate risks and not just compliance to increase security, leverage automation tools, track threats, and never underestimate the power of cybersecurity training (Intsights, 2018).

 

Did you find apk for android? You can find new Free Android Games and apps.
PLACE THIS ORDER OR A SIMILAR ORDER WITH ALL NURSING ESSAYS TODAY AND GET AN AMAZING DISCOUNT  ordernowcc-blue
Posted in nursing by Clarissa