Friday, July 8, 2016

Cyber Terrorism

                                                 Cyber-terrorism
Cyber is relating to electronic communication networks and virtual reality, while terrorism is the use of violence and intimidation in the pursuit of political aims. Cyber terrorism is the politically motivated use of computers and information technology to cause severe disruption or widespread fear in the society. It can be also be defined as the premeditated use of disruptive activities, or threat thereof, in cyber space with the intention to further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance to such objectives. There is much concern from government and media sources about potential damages that could be caused by cyber terrorism, and this has prompted official responses from the government agencies.
In cyber terrorism, internet provides many different ways of anonymously meeting with individuals in a (comparatively) safe way. Knowledge is very essential in cyber terrorism; this means that if you want to do cyber terrorism one needs to acquire knowledge. Computer can aid the task of terrorist, but real resources are real required to execute the plan.
The most likely weapon of the cyber terrorism is the computer, but this does not mean that there should be the restriction of to the access of computers. Though there are explosives and guns that are certainly not entirely relating to computers.
The following are the things that an organization can deal with the cyber terrorism;
1.      Secure system with hardware and software protection ; this means install intrusions detection systems and respond immediately to any intrusions. This can be done the Computer Emergency Response  Team (CERT) which deal with computer  threats. Also CERT recommends that companies keep all programs together.
2.      Affiliate with defensive organizations; such as a public-private partinership to track the threats without forgetting FBI as a resource to keep up with threats and defense mechanisms. Make sure your system or network is secured with such things as strong passwords and effective firewalls.Also install antivirus systems, keep them updated and run regular checks to detect and remove any problems.
3.      Create a firm security policy; this means that train your employees to guard against such things as opening email attachments or responding to messages from unknown sources. Institute regular checks to make sure security precautions are followed. Follow news and computer information reports about new threats. Also apply filters to screen out suspicious material or messages from known sources of threats such as specific countries.
4.      Test your defense regularly; employ a testing or security service to routinely try to invade your system or network and have it report any deficiencies. Use secure encryption for any messages, internal or external, and install a password system to regularly change passwords that include a combination of numbers, letters and other characters and never store them in a computer. Also change a system or network when vulnerability is identified.
Generally, there is a need for clear laws and standards which require operators of large networks of internet-connected computers to exercise appropriate due to diligence in their upkeep and security.
BY: NYANGE LINDA
         BAPRM-42653

No comments:

Post a Comment