Inventory Management, Disaster Recovery, And Incident Response To Cyber-Terrorism

Great Essays
ABSTRACT
This research paper is based on cyber-terrorism. Cyber-terrorism is committed by terrorists who perform acts of violence to influence the behavior of those who have different opinions from their own, with the use of computer based systems. The US government has been targeted by various terrorist groups though cyber-attacks. The nature of organizations which employ the use of Data-Controlled Systems enables such threats to have a great impact on organizations. Cyber threats in organizations arise from processes, staff and infrastructure. There is the need for organizations to come up with preventive measures and response systems to cyber-attacks. Inventory management, disaster recovery and incident response are key aspects when dealing
…show more content…
Terrorism is the use of violence with the aim to intimidate others based on ideology, politics or religion, without regard for the safety of the public. Terrorists are resorting to acts of violence in order to get back at authorities whom they feel have wronged them or those whom they feel are going contrary to their beliefs. Many terrorist groups have emerged with the most notorious being al Qaeda and Islamic States, which have done recruitments all over the world. Recruits are being lured in with the use of monetary incentives while others are black mailed into these groups. Due to the growth in technology, terrorists have also devised more digital ways of carrying out their attacks [1]. A digitalized mode of terrorism known as cyber-terrorism has been devised. Cyber-terrorism is performed to destroy a computerized network system. These attacks target major corporations causing adverse effects on the corporation and all its stakeholders. Recruitment by terrorists targets the staff at these corporations who have …show more content…
These attacks by hackers have led to the loss of large sums of money as well as exposure of records that are considered confidential. The benefits that are associated with these cyber-attacks are a major factor considered by terrorists when they are choosing their target organizations. Cyber-attacks are a major issue since they can easily go undetected for a while and the damages can prove hard to estimate. Damages related to cyber-attacks have both long term and short term effects. In the case of exposure of personal information such as patient information, the invasion of privacy might lead to stigma, depression and in extreme cases, suicide. Corporations suffer large losses and their reputation is also dragged along. Most of cyber-attacks are inside jobs which are sponsored by states and terrorist

Related Documents

  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Criminals and Terrorist have similarities in the way they plan to commit crimes yet, there poses a distinct difference in the act of motivation. Criminals are usually motivated by greed; whereas, Terrorist are motivated by religious and political ideologies, which encompasses short and long-term goals (Clarke, R.V. & Newman, G. R., 2008). Some of the key components that are considered by Criminals and Terrorist include, the target of choice, the method and tools required to perform the act, and opportunity (Clarke, R.V. & Newman, G. R., 2008). Terrorism can come in many shapes, forms, and fashions; all of which are governed by the benefits of the act and the opportunity to attack. The degree and level of attack can pose damages that are far…

    • 775 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    9/11 Types Of Terrorism

    • 1378 Words
    • 6 Pages

    The most memorable terrorist attack from 2001 to 2015 was on the World Trade Center and Pentagon on September 11, 2001 (Paul, Dorin, Bugnar, and Mester 6). About three-thousand innocent people lost their lives during this violent attack (“Department of Government and Justice Studies”). This important event in American History should be remembered to hopefully prevent it from ever happening again. As terrorism changed from the 1980s to today, so did the types of people who became terrorists (O’Connor). This paper will look at what terrorism is, the types of terrorism, who becomes terrorists, and what their motives may be.…

    • 1378 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The typical standard of terrorism changed on September 11, 2001. Terrorism is now an ever-present threat in the world in which we live, eat and breathe. Over decades’ terrorism has been a constant change. “The 1993 bombing of the World Trade Center, where six people were killed, raised our national consciousness to our vulnerability to acts of terrorism.” (Ezell, 2007, p. ).…

    • 129 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    9/11 Informative Speech

    • 2000 Words
    • 8 Pages

    Introduction The attack of the world trade centre in New York City, on September 11 had made Al-Qaeda very well-known of their existence. People become aware of the illegal and dangerous activities that happening around them and the government become cautious on the security of the country. Not only for the United States, but also for other countries, security had become tight. It opens their eyes that terrorist had gone rouge.…

    • 2000 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    However, given this project seeks analyse a limited point in time when an individual is isolated from wider networks and operating alone (the moment of violent action), I believe Gill, Horgan and Deckert’s definition of a “individual terrorist with command and control links” is an acceptable alternative to Spaaij’s definition. This term includes those who may have links to international networks, but crucially operate autonomously – essentially, they have a very high level of agency in conducting their attacks. For the purpose of this project, this definition is satisfactory. It avoids the difficult issue of attribution (did this person belong to a network? If so, how relevant is that?) and allows for a focus on the primary issue of this project:…

    • 1985 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    There are two types of terrorist groups that can cause major problems for the United States. One group is known as domestic and the other transnational. In this paper I will describe the two groups and explain how different their methods are when it comes to terrorism. The difference between domestic terrorism and transnational terrorism is that domestic terrorism is homegrown which means the target, venue, and perpetrators are from the same country.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Although most people today view terrorism as a type of warfare that developed relatively recently based on this generation’s experiences with the World Trade Center bombing in 1993 and the federal building bombing two years later, modern terrorism has its roots in events that took place hundreds of years ago. Beginning with the Enlightenment in the eighteenth century, ordinary citizens began to demand social changes that would lead to the state’s protection of all people, not just the nobility. The increased demand for democracy produced tension between the ruling class and the governed, which led in some cases to violence. The American Revolution began in 1775 and ended in 1783.…

    • 673 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Terrorism is the most popular headline in Media in the present situation. From past few decades’ world’s leading countries have been attacked by terrorist groups. Cyber terrorism is an act of terrorism used by many terrorist groups in order to steal highly classified from opponent countries or disrupt countries operations like nuclear generation, gas supplies etc. Cyber Terrorism is also known to be a way leading countries could show their dominance on other enemy countries. Cyber terrorism became a global threat right from its initial stages.…

    • 1484 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Essay On Hacktivism

    • 1659 Words
    • 7 Pages

    As the internet’s ever expansive growth continues, the activity of hacktivist groups advances. Although hacktivists have been targeting different governmental websites and networks, their actions are an act of protest and civil disobedience. In addition, the idea of a hacktivist has become misconstrued by the deceived public. The idea of a hacktivism needs to be made more transparent and the actions of these hacktivist groups need to be made more clear and differed from cybercrime or cyberterrorism. Hacktivism is a way to foster change and protection in the modern world, by allowing those who find themselves without a voice able to speak and messages to be sent across the globe.…

    • 1659 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Martha Crenshaw’s 1981 article “The Causes of Terrorism” outlines an analysis on the causes of terrorism by examining the preconditions, precipitants, reasons, the psychological aspects of the individual. Crenshaw attempts to show the reader the causes of terrorism in this article. She begins by providing a definition of terrorists. She defines terrorism as the premeditated use or threat of violence committed by a group of people in order to convey a political message. She then divides her paper into three distinct categories that explore the framework, the reasons, and the motivation for terrorism.…

    • 1247 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Homeland Security and Critical Infrastructure The events of September 11, 2001, highlighted significant gaps in the country’s emergency preparedness and more specifically, its ability to identify threats and protect against terrorist attacks. The resulting analyses of the incident and the response efforts stressed the need for an overarching program that would coordinate the efforts of a multitude of government agencies with competing goals and requirements. A program that would improve the transfer of critical intelligence and maximize response efforts.…

    • 1808 Words
    • 8 Pages
    Improved Essays
  • Superior Essays

    has been slow in preparing and therefore remained vulnerable to cyberattacks for many reasons. Trying to find ways to control cyber-attacks against the military networks, the U.S. government faces dilemmas of balancing issues of security and militarization of the cyberspace, citizens’ privacy and surveillance. Also, lack of clear rules and guidelines as to addressing cyber warfare, classified character of the activity of the agencies involved in creating new regulations to address cyber warfare contributed to the delay in the streamline of the military’s ability to attack and defend the cyberspace. 3. How has the Internet influenced the distribution of power in the 21st century?…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays