Digital Crime And Digital Terrorism Essay

930 Words 4 Pages
The future of digital crime and digital terrorism is important to consider how the landscape of cybercrime looks into the future. Computer technology shifts and changes within time. In this paper review and explore the trends, needs, and issues related to cyber crime and terror in the future through the use of forecast.As we gain the knowledge of cybercrime and cyber terrorism, there has been researching study on the evolution of cyber threats in security. The levels of awareness of cyber threats have increased. Law enforcements act globally to combat them. The impact on society has become unsustainable on the global economic crisis. In this paper, it will discuss the effects of digital crime and digital terrorism and the what the future …show more content…
Most studies to date have shown that critical information infrastructure is potentially vulnerable to cyber terrorist attacks. The increasing complexity of information systems creates new vulnerabilities and challenges for I.T management. Securing the information fractures will require a substantial effort of one 's report. They have yet witnessed the implications of a truly catastrophic cyber terrorism attack. A global strategy and policy for combating this type of terrorism are needed now( Kevin Coleman …show more content…
The forecast provides a developing use of inductive logic based on existing knowledge and trends in computer crime, criminal justice, and national security. There are two significant limitations to the forecast, which is the lack of empirical data and the inability to be precise in anticipating incidents of computer crime(Digital Crime and Terrorism). The judicial prosecutorial and investigative officials, as well as scholars and computer security specialist, are knowledgeable about cybercrime and show perform a comprehensive review of criminals and law procedures related to the crime of equipment. A few strategies that u.s could use to combat digital crime, and terrorism would be to Create a separate secure network with integrated security for the particular use of critical infrastructure systems with large-scale monitoring is a potential strategy(.Heritage.org). Information warfare, psychological applications, military deception, operations security and electronic warfare are used as the core capabilities for command and control. Developing threat scenarios for risk management, resiliency, recovery plans and prioritization is one possible approach(US Foreign Policy Challenges). A global policy and strategy for combating terrorism and digital crime would be a need

Related Documents