This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Event

Terrors in computer systems and an outline of preventive measures

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Terrors in computer systems and an outline of preventive measures

Online crimes have been increasing exponentially in the online age as computer systems and networks are connected inextricably. Individuals and organizations use computers to record data and conduct daily operations. However, the internet has given rise to a new terror known as cyber terrorism that allows a group of hackers and terrorists to join hands and destruct the entire system of users using malicious software or phishing methods (Weimann, 2005). The terrorists intentionally harm the programs and create a mess in the normal operations for personal gains. Religious or political ideologies also create this mentality among cyber terrorists. For instance, they might damage the sensitive data stored in systems and hack accounts of customers. Later the owners bear a loss of huge amount, and they have to deal with system disruptions for a long time. They create fear and terror by constant threat and intimidation.

Understanding the aftermath and security measures

Cyber terrorism directly affects the public confidence in hospitals, financial institutions and trade centers. It also increases the concern of people regarding national security. It is a sort of manipulation by cybercriminals. The usual effects are stress, insecurity and constant anxiety about the next possible attack. Therefore, a few preventive measures have been outlined to reduce its occurrences –

  • Organizations must form a partnership with defensive firms that ensures protection against cyber terrorism
  • The Computer Emergency Response Team recommends firms to set aside activity logs and detect suspicious events (Pedersen, 2014)
  • Intrusion can be prevented by installing recognition systems
  • Messages should be encrypted using secure encryption systems and passwords must be a combination of different characters
  • Individual users can keep track of recent cyber-terrorist attacks or threats by checking the news
  • Lastly, they should change systems immediately after identifying a vulnerability

References

Pedersen, C. (2014). Much Ado about Cyber-space: Cyber-terrorism and the Reformation of the Cyber-security. Pepperdine Policy Review7(1), 3.

Weimann, G. (2005). Cyberterrorism: The sum of all fears?. Studies in Conflict & Terrorism28(2), 129-149.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask