Cyber is relating
to electronic communication networks and virtual reality, while terrorism is the use of violence and intimidation
in the pursuit of political aims. Cyber
terrorism is the politically motivated use of computers and information
technology to cause severe disruption or widespread fear in the society. It can
be also be defined as the premeditated use of disruptive activities, or threat
thereof, in cyber space with the intention to further social, ideological,
religious, political or similar objectives or to intimidate any person in
furtherance to such objectives. There is much concern from government and media
sources about potential damages that could be caused by cyber terrorism, and
this has prompted official responses from the government agencies.
In
cyber terrorism, internet provides many different ways of anonymously meeting
with individuals in a (comparatively) safe way. Knowledge is very essential in
cyber terrorism; this means that if you want to do cyber terrorism one needs to
acquire knowledge. Computer can aid the task of terrorist, but real resources
are real required to execute the plan.
The
most likely weapon of the cyber terrorism is the computer, but this does not
mean that there should be the restriction of to the access of computers. Though
there are explosives and guns that are certainly not entirely relating to
computers.
The
following are the things that an organization can deal with the cyber
terrorism;
1. Secure
system with hardware and software protection ; this means install intrusions
detection systems and respond immediately to any intrusions. This can be done
the Computer Emergency Response Team
(CERT) which deal with computer threats.
Also CERT recommends that companies keep all programs together.
2. Affiliate
with defensive organizations; such as a public-private partinership to track
the threats without forgetting FBI as a resource to keep up with threats and
defense mechanisms. Make sure your system or network is secured with such
things as strong passwords and effective firewalls.Also install antivirus
systems, keep them updated and run regular checks to detect and remove any
problems.
3. Create
a firm security policy; this means that train your employees to guard against
such things as opening email attachments or responding to messages from unknown
sources. Institute regular checks to make sure security precautions are
followed. Follow news and computer information reports about new threats. Also
apply filters to screen out suspicious material or messages from known sources
of threats such as specific countries.
4. Test
your defense regularly; employ a testing or security service to routinely try
to invade your system or network and have it report any deficiencies. Use
secure encryption for any messages, internal or external, and install a
password system to regularly change passwords that include a combination of
numbers, letters and other characters and never store them in a computer. Also
change a system or network when vulnerability is identified.
Generally,
there is a need for clear laws and standards which require operators of large
networks of internet-connected computers to exercise appropriate due to diligence
in their upkeep and security.
BY: NYANGE LINDA
BAPRM-42653
No comments:
Post a Comment