By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 1895 |
Pages: 4|
10 min read
Published: Feb 8, 2022
Words: 1895|Pages: 4|10 min read
Published: Feb 8, 2022
Throughout this informative essay we will be discuss the future of cyberterrorism and what we should be expecting in the nearby future. Sadly, technology is advance too rapidly cellphone corporations even announce a new phone every couple of months. People do not think much of digital crime whether the victim believe nothing can be done or law enforcement still are trying to figure out how to deal with these problems. It will be discussed too bey important topic that people should educated themselves with, but they can protect their own device at home known as risk analysis. Also, we will be reviewing how Integrity, Authenticity, Confidentiality & Availability come into play with digital crime. It will be mentioning the major factors issues that law enforcement it is facing and to end this paper the future of terrorist tactics whether they will be able to progress.
At the outset, the future is unpredictable and as time goes by people learn new things like technology itself. A decade ago, no one imagined that technology would have such an impact on us like it does today. There are even cars that drive for us, it is truly unexplainable the difference from now to years ago. However, just like anything good everything also has its risk like technology may be useful but also dangerous. Criminals will always try to find the easiest way to get what they want whether it is money or power. With more the reason people should learn what device they have at their disposal and how to keep it safe from criminals. By the looks of how technology is growing one day will may fully dependent on technology and could be too late to stop those misuse it.
One of the major principles of risk analysis firstly, would be assessment and evaluation. Risk assessment and evaluation mean revising the various information assets on hardware, software, database, or computers. Its purpose is to identify, analyze, and evaluate any risk ensuring that the cyber security function works appropriately against the risks you may encounter such as error, virus or malicious codes. The risk analysis must be correctly assessed and evaluate the existing information of technology systems (the computer functions) by including organizational, managerial, and administrative procedures relevant to IT systems. Having information relating to purchase of future IT equipment and systems. Having strategic expanding infosec parameters as the system grows and changes.Then, you will move forward to identifying threats facing an organization which is anything that can potentially damage your cyber infrastructure. For example, this can be picking up an error or on the last you evaluation your results were different from that last time you checked. If that is the case, then it could mean that something wrong and it would not hurt to have it looked at. Resources expended to eliminate risks in a cost-effective manner.
To continue, Integrity involves preserving consistency, accuracy, and trustworthiness of data in order words having data as authentic as possible. Under no circumstance can the data be changed in transit; therefore, these steps must be taken to ensure that data is not distort by illicit people. Therefore, no one other than the user can have access including file permissions and user access controls. It would be a violation of the breach of integrity, because the user information has been distorted without their authorization. An example of malfunction integrity is when the user attempt to logs into a webpage; however, a malicious attacker redirects your into a different page in other words, letting you know they have complete control. This is the easier way to know whether a website is genuine or not. Moreover, authentication is a process in which the records are compared to database file. Meaning that authorized users' the revealing information within an verification server. When the route is completed showing a match then the users is permitted authorization for access. Moving forward, confidentiality is a highly serious matter to any situation which it is parallel to secrecy. Therefore, measures are conducted to guarantee the confidentiality intended to counteract classified information from reaching in the wrong hands and only users have access to it. Brought into failure to sustain confidentiality means that a hacker or unwanted user manage to gain access purposely but trying to hack into it. This fiasco of concealment is also known as a breach and cannot be recovered whatsoever. In other words, once it has been expose it is almost impossible to take it back. Just imagine this you personally tell someone an intimate secret but they person reveals this information out there it cannot be undone. This work exactly the same with technology that once it has been revealed, there's no way to un-reveal it. For example, if you social security number or finance information were to be posted on social media or on the internet everyone seeing it. It just makes hacker or identity frauds jobs much easier because it is not like that can unsee that information. That is why it is particularly important to support all that information private and carefully check what you are posting online. Additionally, availability is best guaranteed by meticulously keeping all hardware intact. This mean that all repairs at once must be conduct as necessary to have a precisely working operating system free of software conflicts like virus or malicious codes. Even those annoying upgrade reminders are important the user must have all software and functions updated. An alternative to avoid having a data loss (it constantly happens) is to always backup your information by making a copy store it to a sure place always from any danger to it in case you main sources damages. To more security you have the better there are a couple of equipment that can be used such as “firewalls and proxy servers can guard against downtime and unreachable data due to malicious actions such as denial-of-service (DoS) attacks and network intrusions”.
Next, the biggest problems the criminal justice system is facing in the area of computer crime is for several reason. One is the countless unreported computer crime sometimes it is hard for victim to make of are report over someone who cannot be trace. Let us not forget that computer science is still fresh into the criminal justice world, it cannot be compared to the countless way to solve a homicide. Now on the 21st century that people so overuses technology it should be researched more and investigated. Another issue with this that computer homes are using broadband access to the internet without promising good security towards your devices making it easier for hacker to hack, “These finding would suggest that the risk of victimization increases with time and the penetration of computer and the Internet within any particular society.” In other words, it is strongly urged to keep up with precipitous changes in technology that occur on daily. This is way the criminal justice system is lacking lack of workforce needed to complete investigations because some people believe it is not an issue. The criminal justice system really needs to enforce better communication with other agencies for example more agencies like the NCSD. The NCSD contains agencies like the Software Assure Program or the Cyber Strom should be able to work under should be working with other departments not just Homeland Security.
Lastly, cyberterrorist use technology to obtain access to the infrastructure such as classified information and database. A common scenario would be they goes through all this trouble to obtain access to nuclear or missile hacking into them. In upcoming future terrorist organizations will use computers to threat posing cyberattacks preferably by governments and international organizations. For example, targeting the NATO itself; however, the NATO itself is prepared for any potential attacks. Especially, since the NATO rely completely on informative technology, therefore, they are aware that they have to specific laws of differing efficiency distributing with computer-related crimes and cyberattacks. Social media and private webs (like personal blogs) are used constantly by many people in fact, some people live from social media. Terrorist can use that to communicate and organize attacks to see out a message to society. “ Some experts are reluctant to label as cyberterrorism the simple use of computer networks and the Internet by terrorist groups” (2019) It has been seen before that some terrorist who keep people hostage goes on live stream to send out a message. Additionally, they will be spreading propaganda to recruit new members maybe convincing people or brainwashing they will be feared and respected. Cyber terrorist is not common as regular terrorist, which they will be looking for people to join them. “Quite simply, they are exploiting modern tools to perform common terrorist actions such as internal communication and co-ordination, propaganda and misinformation, recruitment and financing, information and intelligence gathering.” Maybe looking for more people who are expert into networking or are high top professional hackers that would do the unthinkable, terrorist will want them in them to their dirty work. (2019) Another reason would Fund raising yes, fund rising because in order to be able to do any of this you need money for equipment “These more loosely affiliated, transnational terrorist groups usually rely on various means for funding and logistical support, as well as on self-financing criminal activities. Their networks of support include legitimate businesses, associations and non-governmental organizations.” (2019) They can have their online business online sometimes even pornography but keep in mind terrorist must be careful therefore, it can be easy to assume they can get their funding by online shopping. Some honorable mentions on the type of tools they use to attack through the network would be like a Electromagnetic pulse (EMP) and High Energy Radio Frequency (HERF). The EMP makes sure to disables electrical devices as a result of a huge electromagnetic field created by a nuclear blast or can be created by generating HERF. Lastly, Malicious software which they are numerous types of malicious software that can get the job whether it can be DoS or the trojan viruses.
In conclusion, throughout this informative research script we have discuss several topics related to the future of cyberterrorism. Truth is, no one can predict what will occur in the future or how much further technology will advance. People should not have to be some dependents towards technology or have the need to post everything single detail of their daily activities. Why? Well, it makes a person too comfortable to technology easily being blinded by the dangers of technology. People should inform themselves by the risks they are can exposing their personal information which is why people should also shut up to the problem. Having proper education about your computers and how to maintain it secure can actually help more that you can ever think. The criminal justice system needs to take this topic much more seriously to get more personnel involved and trained to get the job done. One days, just like how people do not have to pay with cash on day, criminals can also commit crime through the web.
Browse our vast selection of original essay samples, each expertly formatted and styled