blog




  • Essay / The United States is vulnerable to cyberterrorism

    “Information systems are vulnerable, and it is possible for terrorists to use vulnerabilities in information systems to attack their adversaries” (Hua and Bapna 2013). Since the events of September 11, the world has watched as terrorism slowly begins to intensify, not only in severity but also in frequency. However, until recently, countries, including the United States, focused more on traditional methods of terrorism and paid little effort in the face of growing concern. of cyberterrorism. Hua and Bapta (2013) define cyberterrorism as: “Attacks implemented by cyberterrorists via information systems to (1) significantly interfere with the political, social, or economic functioning of a group or organization of critical importance to a nation, or (2) provoke physical attacks. violence and/or create panic. We define hackers as individuals who (1) wish to access/modify data, files, and resources without having the necessary authorization to do so, and/or (2) wish to block services from authorized users. Cyberterrorists are individuals or groups who use computer and networking technologies to terrorize. In this article, we study the behavior of two groups of hackers: cyberterrorists and ordinary hackers” (Hua & Bapna 2013). While there are several competing if vaguely defined definitions of cyberterrorism, Hua and Bapta have clearly broken down the central elements to illuminate the nuances between traditional terrorism and a run-of-the-mill hacker. As Hua and Bapta rightly put it, “modern economies rely heavily on information technology (IT)-based information systems for their survival” (Hua and Bapna 2013). some thoughtful effort must be made to secure them. There is currently no international cooperation...... middle of paper ...... those responsible for securing these systems. Hopefully, preventive measures can be deployed before a critical attack occurs. .Works citedHardy, K. (2011). WWWMDs: Cyber-attacks on infrastructure in domestic anti-terrorism laws. Computer Law & Security Review, 27(2), 152-161. , J. and Bapna, S. (2013). The economic impact of cyberterrorism. Journal of Strategic Information Systems, 22(2), 175-186. doi:10.1016/j.jsis.2012.10.004Janairo, E. (2002). States are combating cyberterrorism: Cyberattacks could escalate a terrorist attack and seriously harm the country's ability to fight crime. (terrorism). State Government News, (3), 30. Zetter, K. (September 26, 2012). Maker of hacked smart grid control software. Wired.com. Retrieved November 23, 2013 from http://www.wired.com/threatlevel/2012/09/scada-vendor-telvent-hacked/