Preview

QUESTION 1a By Giving Practical

Powerful Essays
Open Document
Open Document
1721 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
QUESTION 1a By Giving Practical
QUESTION 1
a) By giving practical examples discuss the difference between Cyber war and Cyber terrorism.
b) E-Learning is becoming increasingly popular in our society. In view of this, many students are studying with foreign universities through e-learning. Outline the limitations and impact of having graduates through e-learning.

QUESTION 2
Doctors, lawyers and teachers all need a license or state certification to practice their profession. Are computer practitioners similar enough to these professionals that they should be required to have a license too? Discuss.

Introduction
This assignment aims to discuss the differences between cyber terrorism and cyber warfare, and whether computer scientist should be required to possess practice licenses to carry on their work. The paper, therefore, in the first part aims two questions on going to discuss the difference between cyber war and cyber terrorism by giving practical examples and outline the limitations and impact of having graduates through e-learning. In the second part, the paper will discuss whether computer practitioners like other professionals are required to have licenses.

Cyber war and Cyber terrorism
Cyber war which is also referred to as cyber warfare refers to politically motivated hacking to conduct sabotage and espionage. Cyber war is used specifically to allow the inimical state to gain advantage in their pre-armed attack by sabotaging major governed and state instillations connected on a computer network.
Cyber terrorism is defined as the premeditated politically motivated attack against information computer systems, computer programs and data which result in violence against noncombatant targets by sub-national groups or clandestine agents according to Federal Bureau of investigation (FBI).
Cyber terrorism can also be defined as the premeditated use of disruptive activities, or the threat there of, against computers and/or networks, with the intention to



References: 1. Jennifer Olson et al, E-learning White Paper, Oct 2011.pdf. http://www.google.com 2. http://www.csciwww.etsu.edu/gotterbarn/artlp.htm 3. http://www.ubiquity.acm.org/article.cfm 4. http://www.cs.virginia.edu/.../licensing. 5. http://www.en.m.wikipedia.org/wiki/cyberwarfare

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    Federal cybercrime law dealing with terrorism is based primarily in Title 18 U.S. Code§ 2331. Under title 18, terrorism is defined as “acts dangerous to human life that violate the criminal laws of the United States; (b) appear to be intended to intimidate of coerce a civilian population…occur primarily within the territorial jurisdiction of the United States”(Brenner, 2004). Terrorists can use computers to perform acts which might be harmful or intimidate individuals and when this is the case, the Federal government has jurisdiction. According to Gordon and Ford, computers can perform important functions for terrorists above and beyond being potential targets (2002). Terrorist’s computer usage is an important issue facing governments around the world. Terrorism is an important issue facing governments today and under United States Federal law, cyber-terrorism falls under the jurisdiction of the Federal…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    1) For each of the following graphs, identify the firm’s profit-maximizing (or loss minimizing) output. Is each firm making a profit? If not, should the firm continue to produce in the short run?…

    • 817 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Terrorism involves a group of people using violence or threat of violence against citizen and military targets in order to force the government to change its policy.…

    • 1752 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The beginning of a good analysis requires defining what is being studied, but as Dr. Bryan discusses terrorism is a tough definition to nail down. In his lecture, he explains that there does not seem to be a universal definition, but many people who study it try to make their own. Bryan complied the most common terms that makeup most definitions. Terrorism is the threat of political violence that has some symbolic or communicative value.…

    • 736 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Before we address any issues relating cyber-security, we must look at the definition of the term in the first place. According to Wikipedia, cyber-security is called as computer security which is described as information…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Good Essays

    Cyber-war, the use of computers and the internet in conducting warfare in cyberspace, has been introduced as both an effective offense and defense towards modern warfare. Presently many countries have developed a policy towards cyber-warfare. The US, although a strong influence to the world, has yet to step up and create an effective policy towards warfare. One that should state what the military would do to respond to a cyber-attack, what defines a cyber-attack and what the government will do to take effective measures against a catastrophic attack. Along with that, what advantages does this new type of warfare have against modern warfare and is it worth the massive amounts of training and investments. Also, in what circumstances should a…

    • 794 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In modern terrorism, there are six tactics of terrorism including bombing, hijacking, arson, assault, kidnapping, and hostage taking. However, over the past four decades, the weaponry of terrorism has developed to include coercions from weapons of mass destruction. At the same time, threats from terrorism have expanded into the virtual world (Internet), where attacks made by cyber terrorists has become just as effective and damaging as physical attacks. For example, a terrorist who can hack into a city’s power grid system and shut it down is able to create as much fear and panic as a bomb. While the six tactics of terrorism can create a vast amount of destruction and chaos, terrorists can also use the concept of multiplying force to enhance the impact of their actions even further.…

    • 554 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Two factors increase the stakes of the cyber struggle. Tactically and operationally, the increasing dependence of modern technologically advanced forces (especially U.S. forces) on networks and information systems create new kinds of exploitable vulnerabilities. Second, as modern societies including the militaries that mirror them have continued to evolve, they have become ever more dependent on a series of interconnected, increasingly vulnerable “critical infrastructures” for their effective functioning. These infrastructures not only have significantly increased the day-to-day efficiency of almost every part of our society, but they have also introduced new kinds of vulnerabilities.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    war and terrorism

    • 833 Words
    • 4 Pages

    Terrorism is an act that threatens or carries out violence with the intention to disrupt, kill or coerce against a body or nation in order to impose will. This means that a lot of groups use this method to get what they want. The groups use a variety of methods, groups such as:…

    • 833 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    What are the arguments given in the text that support that cyber-terrorism IS a threat to the society? What are the arguments given in the text showing that cyber-terrorism is NOT a threat to the society?…

    • 677 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Terrorism is a tactic or method employed by individuals and groups in resistance to a state or in service of a state to effect or prevent social and/or political change. It includes the premeditated use of violence or the threat of violence to systematically induce fear and anxiety in a civilian population.…

    • 7392 Words
    • 30 Pages
    Powerful Essays

Related Topics