Transformation of terrorism from traditional method to modern methods – Artificial Future

Transformation of terrorism from traditional method to modern methods

Abstract

(Transformation of terrorism from traditional method to modern methods) cyber security is becoming significant for the whole world security with every day and major reason of the cyber terrorism was started at local level which does not reached the state level but states are involved in this type of terrorism for securing their own nationalities and interests. Cyber terrorism is much safer, low cost and easily operate able from anywhere of the world which make it more toxic and destructive. cyber terrorism has made its place in terrorism quite fastly and make the security issues more complex and hard to solve and to adopt a strong counter cyber terrorism policy and mechanism is highly necessary for every state for its own security interests

Transformation of terrorism from traditional method to modern methods

Cyber terrorism is the new way to spread terrorism among the people who security connected through mobiles and computers because these days the goal of terrorism is to create a feeling of terror in the minds of the people. And this will transform terrorism from traditional method to modern method.

Transformation of terrorism from traditional method to modern methods

They do this by disruptions of computer networks using computer viruses, or physical attacks using malware and hack everthing like credit cards pin, private documents, and projects details.

 




Categories Cyber Terrorism

Intent (Cyber terrorism)                                       Intent (Hacking)
• Cyber computer                                               combat Hacktivism
• computer spies                                                Internet-wide disruptions
• Cyber computer defense                                   Communications disruption

 

Techniques use by cyber terrorists

Syntactic Attacks :- The user use this attack for spreading viruses, worms and trojan horses by using software and apps.

Types of Syntactic Attacks

1. Viruses
Viruses are self originationg program they can hide itself any where in the memory of system and find an appropriate program for themselves and get attach to it.

2. Worms
Worms are self sustaining running program which replicate over a network using protocols.

3. Trojan Horses
Trojan horses attack user media files and their hard disks to copy all the data or slow down the computer untill no use.




4. Malware
Malware is any computer code that is used to destroy the computer and steal private information.

Semantic Attack :- This attack is used to provide an user a wrong information which can harm it directly or by send user to wrong direction to track their path.

Denial-of-service Attack(Dos Attack):- This attack only focus on interruption of network. they do this by send large amount of traffic to a particular network till it become overloaded.

Why People Use cyber attacks For spreading Terrorism

Cyber terrorist have at least four different advantages for the cyber attack. First, Making fake domains on internet make cyber terrorists less expensive than traditional methods. Second, terrorist organization extend new types of weapons. Third, it was difficult to track the real location and identity of terrorists. Fourth, they can do this by remotely from anywhere and harm large amount of users at the same time.

Transformation of terrorism from traditional method to modern methods

Old security techniques Such as firewalls, contingency planning and encryption are now not enough to defend dangerous infrastructure. Computer professionals need to be aware of the whole array of vulnerabilities. An helpful defense will require a intensive effort from the government and business executives. otherwise there is a risk to every size of businesses are at risk to a terrorist attack because people would hear about the attack. Such businesses include Microsoft IBM, GE, GM, WalMart and IBM.



How to Prevent Cyber terrorism

Cyber attacks are increasing as Internet is becoming more and more smart to attackers.  Preventing some things should decrease the damaged caused by network crackers. It should be effective in stoping many types of cyber terrorism. Important networks like military systems and computer networks of CIA and FBI, are not connected to the Internet by doing this we can attract many cyber attackers.

Transformation of terrorism from traditional method to modern methods

With the increasing in internet usage, cyber crime is challenging law agencies.  However, there are no laws to protect people from cyber attacks. we should only do little smart work to protect ourselves. Attentiveness is the best defense. Preparedness must begin at the low level since local agents such as the police will be the first to arrive at the scene of attack and respond to terrorism. There must be a public education program for people to be aware of cyber attacks.

Conclusion

In the moden age the increasing development of telecommunications, computers and other technologies has led to the growth of new forms of trans-national crimes known as “cyber crimes”. Cyber crimes have virtually no limit and may affect every country. Cyber Security are those crime which is done with the help of computer, with the purpose of influence the performance of computer systems. it is necessary to recognize it as a part aspect of the wider social, political and economic reconstructing currently affecting countries world wide. Free flow of unrestricted information on networks and web-sites is as attractive to insurgents and extremists groups as it is to proclaim their human rights just as crimes have changed with the growth of information technology so have the categories of criminals who engage in such crimes.

1 COMMENT

LEAVE A REPLY

Please enter your comment!
Please enter your name here