The Impacts Of Cyber Terrorism

Improved Essays
Cyber Terrorism is defined as an attack that targets the information held in computers, or a network that leads to a threat of violence against the property or a person (Weimann, 2004). The information that has been exposed on WikiLeaks has damaged careers and the reputation of organizations. These leaks have also exposed information that threaten the relationships of countries. The breaches can be considered acts of Cyber Terrorism, and understanding how to safe guard all organization from these threats is vital.
The Reason behind the Breaches WikiLeaks has released information that has damaged many reputations, including organizations and countries. Nicks (2014) reports that WikiLeaks threated to release information regarding what records
…show more content…
Computer security should be the focus for every organization. Organizations can combat cyber terrorism by implementing a recovery process (Easttom, 2012). This recovery process will let an organization that undergoes a security issue recover data, and also recover the entire network if needed. If a security incident occurs because an employee or an outside attacker deletes key information, an organization can quickly recover those files (Easttom, 2012). Further, an organization needs to assess the information they have and decide which information is sensitive, or critical to business operations (Easttom, 2012). This could include identifying the information that has patient information, employee information, or sensitive customer information in it. This will help an organization define a security process for this information that would be stricter than other less secure information. This will save an organization time and …show more content…
Data needs to be protected, and these leaks have shown that this information is not protected. Organizations and nations need to look at policies that will protect this information moving into the future. Technology is growing, and the use of it has made cyber terrorism the new form of terrorism. Organizations need to identify their sensitive information and protect it. Further, organizations need to have a recovery process in place to replace data that may be compromised. National policies are also needed. These should include stiffer penalties for computer crimes. In addition, there should be one site that all organizations and national officials can go to and report a security incident. These steps will help secure data moving into the

Related Documents

  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher). These attacks can come in any shape or form over the internet and with the little regulation over cyber threats internationally it needs to be a constant cause for alarm for agents. Verizon showed its 2013 data breach investigation report that 95 percent of the advance attacks came through emails that were containing malicious attachments which gave the attackers a a stepping stone into the host networks computers and network devises which then exposed the valuable and/or private…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    My main goal is to conduct a CIA Triad (Confidentiality, Integrity, and Availability) to the information system by providing and ensuring this is practiced by my employees. But before being able to manage these goals I would have to look deep into the company vulnerabilities and reduce any possible risk to an acceptable level. There are several decisions I can make upon the risk findings discover such as Risk Mitigation. In this process patches may be install to help reduce the risk or fix the problem that originated. With the standards, regulations, and policies implemented a guidebook will be form that will show the guidance to take if certain threats arise that can harm the company.…

    • 700 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber Attack Case Study

    • 956 Words
    • 4 Pages

    1a. Strategic planning to prevent and/or fight off cyber attacks Preventing Cyber Attack-Identifying Top Risks Strategic planning begins with the prevention or minimizing the attack to a business. Businesses are a value and because a business has value, there will always be a threat for business information, and this is what makes a business vulnerable. Businesses need to be aware of what risks are available and how that information can be protected. Once the critical business information is identified, a planned response needs to be identified as to how to protect that information.…

    • 956 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Cybercrimes, as well as cyber terrorism proceed to be the most accelerated threat to citizens of the United States. The cyber security outbreak is a forthcoming danger when it comes to the protection and surveillance of not only us, but also our community and our country, as well (Nozzolio, 2015). Technological advances such as smart household devices and vehicles that power themselves are just a couple of the things that can not only potentially put our information secrecy in danger, but put our information virtue and the progression of these services at risk. Eventually, undercover agents from other countries may be capable of taking advantage of the expansion and perplexity of devices to administer supervision, mark whereabouts, spot informants for future enlistments, or obtain entry to systems or consumer documents. When it comes the government, there are five things that they are going to make their priority when it comes to attempting to stop or at least decreasing the number of cyber-attacks; these five things are as follows: protecting the nation 's critical infrastructure, improving our ability to identify and report cyber incidents, engaging with international partners, securing federal networks and shaping a cyber-savvy workforce.…

    • 1118 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Because of the negative effects that cyberbullying creates, it has become a largely debated issue whether an individual’s actions online should be prosecuted. Some would say this argument is outrageous. However, actions online should be prosecuted because of how common cyberbullying is, the terrorizing effects on victims, the increased amount of cyberbullying not being taken seriously, and how the effects are being multiplied by the web. In the first place, cyberbullying has become very common and can have destructive effects on the person being attacked. Bullies online…

    • 981 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Information technology experts should install antivirus software that will detect threats to the system. Supervisors should conduct network monitoring to identify areas of risk. Security officers should ensure that only people with approval access the control room. Once the management approves the mechanism of putting a firewall in place, implementation through the use of security codes and key cards for high level authorized personnel (Johnson, 2014). Workers will get training on ways of using the system and detecting threat to ensure that there is no loop hole for data manipulation.…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    The Malware Life Cycle Ka Vang Walden University The Malware Life Cycle There are many risks involved in cyber security, some more serious than others. This can range from viruses erasing an entire system, attackers hacking into a system and modifying files or attacking others, compromising sensitive information such as credit card and personal information, and more. Although these types of issues exist, there is no guarantee that even taking the best precautions will ensure 100% protection. Instead, the best option is to take the necessary steps to minimize the chances. Motivations and Evolutions A hacker’s motivation is varied and complex.…

    • 1603 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Crime Technology

    • 1448 Words
    • 6 Pages

    The government needs to develop better methods of surveying the online activities of known criminals. In addition, they should train officers to understand the new technology. The government should have access to the best and newest technology to ensure that it is prepared for the next wave of crime. Criminals are always finding ways to adapt to the new technologies and keep their criminal activities hidden. There should also be communication between the country the product is being purchased in and the country the product is coming from.…

    • 1448 Words
    • 6 Pages
    Superior Essays