The Impacts Of Cyber Terrorism

Improved Essays
Cyber Terrorism is defined as an attack that targets the information held in computers, or a network that leads to a threat of violence against the property or a person (Weimann, 2004). The information that has been exposed on WikiLeaks has damaged careers and the reputation of organizations. These leaks have also exposed information that threaten the relationships of countries. The breaches can be considered acts of Cyber Terrorism, and understanding how to safe guard all organization from these threats is vital.
The Reason behind the Breaches WikiLeaks has released information that has damaged many reputations, including organizations and countries. Nicks (2014) reports that WikiLeaks threated to release information regarding what records
…show more content…
Computer security should be the focus for every organization. Organizations can combat cyber terrorism by implementing a recovery process (Easttom, 2012). This recovery process will let an organization that undergoes a security issue recover data, and also recover the entire network if needed. If a security incident occurs because an employee or an outside attacker deletes key information, an organization can quickly recover those files (Easttom, 2012). Further, an organization needs to assess the information they have and decide which information is sensitive, or critical to business operations (Easttom, 2012). This could include identifying the information that has patient information, employee information, or sensitive customer information in it. This will help an organization define a security process for this information that would be stricter than other less secure information. This will save an organization time and …show more content…
Data needs to be protected, and these leaks have shown that this information is not protected. Organizations and nations need to look at policies that will protect this information moving into the future. Technology is growing, and the use of it has made cyber terrorism the new form of terrorism. Organizations need to identify their sensitive information and protect it. Further, organizations need to have a recovery process in place to replace data that may be compromised. National policies are also needed. These should include stiffer penalties for computer crimes. In addition, there should be one site that all organizations and national officials can go to and report a security incident. These steps will help secure data moving into the

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    Cyber Ark is an enterprise application cyber security company based in Israel with offices worldwide. The United States headquarters is in Newton, MA. with regional sales offices in Ft. Lauderdale, Houston, Las Angles and Chicago. The company is well known in the IT Security Company with a quality product designed to secure data in the enterprise as well as the cloud.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Edward Snowden, Hero or Traitor I can see how this issue could strike anger in some people’s minds and fear in others, in just the first few sentences of this story. This person that swore an oath to protect his country, first as a solider, then as an agent of the CIA and NSA. Those oaths mean more to most of us, than just about any other commitment we make in our lifetimes. They are important, because the person taking these oaths are swearing to take care of all of us.…

    • 1101 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Miller, J. and J. Miller., (2009). 21st Century Criminology: A Reference Handbook. 1st ed.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In the summer of 2013 an English newspaper, The Guardian, revealed the largest leak of government secrets in history. The repercussions of this information slip can still be felt today as the US government tries to deal with the fallout and arrest the man who initiated it all. Edward Snowden was a high school dropout that attended Anne Arundel Community College to study computers on two separate occasions. It was after his second time attending the college that he received his job as a security guard with the National Security Agency, which then turned into a job at the CIA with an information-technology job. He left the CIA two years later to work for both Dell and Booz Allen as a private contractor and subsequently in both places as a subcontractor…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    According to George Gao, 56% of Americans disapprove of the NSA collecting phone records and text messages, but that means the other, almost half, of Americans feel the need to give up some of their freedom to protect national security. (Civil Liberty in America, May 29 2015) WikiLeaks, the notorious website that finds and exposes government information, poses a real threat to the national security. While a popular website today due to its high credibility, it has revealed highly classified information that has hurt not only national security but foreign relations as well as reveal military info that they could use against terrorism in the middle east. There was a small public outrage over the censorship, or rather “un-censorship”, in a St. Louis sexual assault case.…

    • 875 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    The ability of the homeland security system to assess and respond to future threats can at times be uncertain. This is due to the ever evolving nature of the threats posed to the country. As new threats are addressed more is learned about resources are needed for each type of manmade or natural event. Since, September 11, 2001 many steps have been taken to address this country’s vulnerability to terrorist attacks and Hurricane Katrina demonstrated the need for improvements in the country’s ability to respond to natural or mass casualty disasters. The Department of Homeland Security was created to assess these threats and establish procedures to improve the resiliency of the country.…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    While some may argue that government surveillance programs are necessary to insure public safety, to allow the infringement of the rights guaranteed by the US Constitution is too high a price to pay. September 11, 2001 should not be just remembered as the beginning of America’s “War on Terrorism,” it should also be remembered as being the first “cybersecurity war.” The terrorists who had used the internet for their recruitment, and communications, on many occasions, were subsequently identified, were hacked by counter-terrorist computer specialists of the CIA and the National Security Agency. Upon October 26, 2001 the United States Congress passed the Patriot Act. This law authorized both civilian and military counterterrorism agencies the…

    • 1668 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    In 2013, Edward Snowden uploaded classified information from the United States government onto the internet. The documents highlighted the extent to which the government was gathering information from the public without having warrants or a reason linking them to terrorism. This act has condemned Snowden as a traitor to the United States. Nonetheless, it brought public attention to the activities of the government that could be considered unconstitutional as well as a breach of privacy and trust. It is imperative that citizens hold the government accountable and many consider Snowden’s actions heroic.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Cyberwarfare Report

    • 809 Words
    • 4 Pages

    Cyberwarfare is defined as a new generation of war that uses computers and software to attack networks and acquire data or damage important infrastructures to get advantage in a military campaign. Nowadays, cyber espionage to obtain access to data bases is common. By using viruses or spyware hackers can invade military or governmental networks to get classified information in order to gain intelligence. An example was the cyber spy GhostNet supposedly used by China in 2009. According to the report presented by the National Security Institute (NSI) (2009), there is “documented evidence of a cyber espionage network—GhostNet—infecting at least 1,295 computers in 103 countries, of which close to 30% can be considered as high-value diplomatic, political,…

    • 809 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    The Obama years have accelerated the use of these systems and brought forth the dilemma where people working for the government started to question the authority and rights of the government for the people. This increase in data collection and these programs has led to some agents from these programs to go out in public and release information. The most recent figure is known as Edward Snowden. Due to Snowden’s leaks and many others starting to pop up, it has brought forth political obligation into question. More people are becoming aware of the practices that are occurring and thanks to his attempts governments around the world have started to show more of the information that they are collecting and what they are doing with it.…

    • 2374 Words
    • 10 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Think about the balance of power between strong and weak countries/terrorist groups and countries and individuals, as illustrated in the Bradley Manning affair (see article). As the case of Bradley Manning proved, the Internet has made it possible for one person having access to classified information to jeopardize the national security of the United States. Even if Manning’s intent was not to aid the enemy, the Internet has made it possible for the stolen classified information to become available to anyone, including as we further see, Osama bin Laden and his…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays