Transformation of terrorism from traditional method to modern methods – Artificial Future

Transformation of terrorism from traditional method to modern methods


(Transformation of terrorism from traditional method to modern methods) cyber security is becoming significant for the whole world security with every day and major reason of the cyber terrorism was started at local level which does not reached the state level but states are involved in this type of terrorism for securing their own nationalities and interests. Cyber terrorism is much safer, low cost and easily operate able from anywhere of the world which make it more toxic and destructive. cyber terrorism has made its place in terrorism quite fastly and make the security issues more complex and hard to solve and to adopt a strong counter cyber terrorism policy and mechanism is highly necessary for every state for its own security interests

Transformation of terrorism from traditional method to modern methods

Cyber terrorism is the new way to spread terrorism among the people who security connected through mobiles and computers because these days the goal of terrorism is to create a feeling of terror in the minds of the people. And this will transform terrorism from traditional method to modern method.

Transformation of terrorism from traditional method to modern methods

They do this by disruptions of computer networks using computer viruses, or physical attacks using malware and hack everthing like credit cards pin, private documents, and projects details.


Categories Cyber Terrorism

Intent (Cyber terrorism)                                       Intent (Hacking)
• Cyber computer                                               combat Hacktivism
• computer spies                                                Internet-wide disruptions
• Cyber computer defense                                   Communications disruption


Techniques use by cyber terrorists

Syntactic Attacks :- The user use this attack for spreading viruses, worms and trojan horses by using software and apps.

Types of Syntactic Attacks

1. Viruses
Viruses are self originationg program they can hide itself any where in the memory of system and find an appropriate program for themselves and get attach to it.

2. Worms
Worms are self sustaining running program which replicate over a network using protocols.

3. Trojan Horses
Trojan horses attack user media files and their hard disks to copy all the data or slow down the computer untill no use.

4. Malware
Malware is any computer code that is used to destroy the computer and steal private information.

Semantic Attack :- This attack is used to provide an user a wrong information which can harm it directly or by send user to wrong direction to track their path.

Denial-of-service Attack(Dos Attack):- This attack only focus on interruption of network. they do this by send large amount of traffic to a particular network till it become overloaded.

Why People Use cyber attacks For spreading Terrorism

Cyber terrorist have at least four different advantages for the cyber attack. First, Making fake domains on internet make cyber terrorists less expensive than traditional methods. Second, terrorist organization extend new types of weapons. Third, it was difficult to track the real location and identity of terrorists. Fourth, they can do this by remotely from anywhere and harm large amount of users at the same time.

Transformation of terrorism from traditional method to modern methods

Old security techniques Such as firewalls, contingency planning and encryption are now not enough to defend dangerous infrastructure. Computer professionals need to be aware of the whole array of vulnerabilities. An helpful defense will require a intensive effort from the government and business executives. otherwise there is a risk to every size of businesses are at risk to a terrorist attack because people would hear about the attack. Such businesses include Microsoft IBM, GE, GM, WalMart and IBM.

How to Prevent Cyber terrorism

Cyber attacks are increasing as Internet is becoming more and more smart to attackers.  Preventing some things should decrease the damaged caused by network crackers. It should be effective in stoping many types of cyber terrorism. Important networks like military systems and computer networks of CIA and FBI, are not connected to the Internet by doing this we can attract many cyber attackers.

Transformation of terrorism from traditional method to modern methods

With the increasing in internet usage, cyber crime is challenging law agencies.  However, there are no laws to protect people from cyber attacks. we should only do little smart work to protect ourselves. Attentiveness is the best defense. Preparedness must begin at the low level since local agents such as the police will be the first to arrive at the scene of attack and respond to terrorism. There must be a public education program for people to be aware of cyber attacks.


In the moden age the increasing development of telecommunications, computers and other technologies has led to the growth of new forms of trans-national crimes known as “cyber crimes”. Cyber crimes have virtually no limit and may affect every country. Cyber Security are those crime which is done with the help of computer, with the purpose of influence the performance of computer systems. it is necessary to recognize it as a part aspect of the wider social, political and economic reconstructing currently affecting countries world wide. Free flow of unrestricted information on networks and web-sites is as attractive to insurgents and extremists groups as it is to proclaim their human rights just as crimes have changed with the growth of information technology so have the categories of criminals who engage in such crimes.



  1. I am typically to running a blog and i actually appreciate your content. The article has actually peaks my interest. I am going to bookmark your web site and hold checking for brand new information.

  2. You can definitely see your expertise within the article
    you write. The arena hopes for even more passionate writers such as you who are
    not afraid to mention how they believe. At all times go after your heart.

  3. This is really interesting, You are a very skilled blogger.
    I’ve joined your feed and stay up for in the hunt for extra of
    your excellent post. Additionally, I have
    shared your site in my social networks

  4. This is a free auto approve list that I made two days ago. It’s my hope to post new free lists daily. I’m not sure that I’ll be able to do them seven days a week. That’s the goal right now. Thanks for taking the time to read this and get to work building some backlinks!

  5. Hi there, just changed into alert to your weblog through Google, and located that it is really informative. I gonna be careful for brussels. I’ll appreciate in case you continue this in future. Lots of folks will probably be benefited out of your writing. Cheers!

  6. Howdy! Someone in my Myspace group shared this website with us so I came to take a look. I’m definitely enjoying the information. I’m bookmarking and will be tweeting this to my followers! Outstanding blog and outstanding design.

  7. My spouse and I absolutely love your blog and find nearly all of your post’s to be just what I’m looking for. Would you offer guest writers to write content available for you? I wouldn’t mind producing a post or elaborating on many of the subjects you write in relation to here. Again, awesome blog!

  8. Your Blog is really awesome. I can pass International certification on behalf of you. I am certified Google Adwords Professional. You can donate me whatever you want.I want to earn some part time income Email me for details [email protected]

  9. I just want to tell you that I am just all new to blogging and seriously savored your web blog. Likely I’m planning to bookmark your website . You actually have incredible stories. Regards for revealing your webpage.

  10. I would like to thnkx for the efforts you have put in writing this website. I am hoping the same high-grade website post from you in the upcoming as well. In fact your creative writing abilities has encouraged me to get my own website now. Actually the blogging is spreading its wings quickly. Your write up is a great example of it.


Please enter your comment!
Please enter your name here