Cyber terrorism, in this case, involves sending of viral messages, presentations, magazines, and recorded videos developed by terrorist organizations and their sympathizers. Through the propaganda, violence is promoted hence affecting the audience. Internet propaganda also includes the use of video footage of violent acts of terrorists’ activities that simulates terrorist acts. Cyber terrorism involves the promotion of extremist rhetoric encouraging violent acts through networking platforms such as Facebook and Twitter. Terrorist propaganda poses a challenge of recruitment, radicalization, and incitement to terrorism. Terrorist propaganda may be used to manipulate individuals to undermine their belief in certain …show more content…
Healthcare institutions used to have self-centered caregivers with information kept in paper files. Information and telecommunication technologies have led to a shift in the method of keeping data from the paper files to online storage. The security and privacy of information stored in the cyberspace have been of a major concern to most managers due to the current increase in cyber activities that promote terrorism. In the healthcare, for instance, huge amounts of sensitive data are exchanged daily between public organizations’ networks. The interconnectivity of information systems is therefore increased, exposing a growing number of data to a variety of threats and vulnerabilities due to the increase in the cyber crimes. Organizations are therefore forced to develop methodologies that address the changes in information security and provide information assurance that is effective, consistent, and continuous. Security policies and guidelines will hence be useful in dealing with cyber terrorism, not only in the United State of America but the entire world. Organizations have come up with different ways of preventing and managing the terrorist threat, and risk assessment included. The risk assessment identifies threats and vulnerabilities, hence should be