.

Friday, April 19, 2019

Cyber Terrorism and other types of terrorism in Australia Research Paper

Cyber Terrorism and otherwise types of terrorism in Australia - Research Paper ExampleThe practical difficulty in controlling cyber crimes do it one of the most dangerous terrorist activities of modern era. Since most of the critical beas of human life are reservation use of computers and internet at present, cyber rape can affect the social life drastically at heart a second. For practice session, transporting systems, power supply, military operation and telecommunication systems etc are relying heavily on computers and internet for its human activity jobs and functions at present. Any problems occurred in the functionality of computers and internet can affect these areas negatively and pee-pee immense redress to public life. This paper analyses the terrorism threats faced by Australia in general and cyber threats in particular. It is not essential that cyber attacks may create physical ham alone to Australia. In fact cyber attacks can be utilise to defame a country sim ilar Australia in front of others. The most common form of hacktivism is the defacing of vane pages to carry a message to the audience of that web site. The site shown in Figure below an Australian business defaced to accuse Australia of being a terrorist country, is a recent example of hacktivism as well as illustrating the tensions of the war on terror being transferred to the electronic realm (Ellsmore, p.5) The above webpage is a clear example of how the cyber attacks happening against Australia. Australia is a strong supporter of war on terror which is going on in Iraq and Afghanistan. Terrorists target all the countries which support war on terror in some way. Since most of the countries like Australia have strengthened the security measures against a physical or direct terrorist attack terrorists now adopting take of indirect attack. Cyber attacks give them the luxury of attacking their targets from a distance and the chances of arrest or punishment are extremely rare. Ev idence exists to suggest that al-Qaeda have also been using the Internet to collect & compare nurture about potential critical infrastructure targets (Ellsmore, p.6). Internet is an ocean of information. It is not necessary to piffle a place to collect information about it. All the details about all the places in the world are available on internet at present. It is easy for terrorist groups to collect and analyze this information before planning an attack on a particular target. The electronic information can be used for cyber attacks or even for physical attacks. According to the CERT Co-ordination Centre, the number of reported computer security incidents increase from 9,859 in 1999 to 52,658 in 2001, and we are on track for almost 100,000 in 2023. Similarly, the 2002 Australian Computer offense and Security Survey found that 67% of respondents suffered a security incident, twice the level of 1994 (Ellsmore, p.8). The above statistics are clear indications of growing threats f aced by Australia from cyber terrorism. Cyber attacks can affect the productivity of organizations and employment losses to the employees. In other words, cyber attacks can destroy affect the financial systems more than the lives of the people. The expenses needed to conduct a cyber attack are extremely cheaper compared to the expenses needed for a physical attack. At the same time cyber attacks can cause more damages to the target than a physical attack. Moreover, the publicity generated by cyber attacks may create little terror and disgust among the people. The above facts motivate terrorist in selecting cyber medium for their future channel of attack.

No comments:

Post a Comment