Preview

The Myth of Cyberterrorism

Satisfactory Essays
Open Document
Open Document
677 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Myth of Cyberterrorism
Student Name: Alp Gölcüklü Sec: ENG 101-66 Date: 03-11-2013

Assessed Homework Task 7

WHILE-READING: Read the text entitled “The Myth of Cyber Terrorism” by Joshua Green and fill in the table below with the arguments for and against the idea that cyber terrorism is a real threat or not.

PARAGRAPHS

1. MAIN IDEAS
What are the arguments given in the text that support that cyber-terrorism IS a threat to the society? What are the arguments given in the text showing that cyber-terrorism is NOT a threat to the society?
SUPPORTİNG DETAİLS
What are the examples given?

3

Having cyberterrorism threat in Washington
Private companies have hostly deployed security constultants and software designed to protect public and private messages

4

Incesting on cyberatacs, Allocate 4.5 bil $ for security
Bush created the office for security, It can be more dangerous than Perl Harber
10

New softwares has to be safe and they have to be submitted to the National Security, Easy to hack new wireless networks
PDA's, Blackberrys, even infrared copiers and faxes has to be isolated from net
7

Problems in economy
With using viruses, worm has costed to the USA $15 bil

2

Mind hackers targeted government computers

Content and Organisation
Read the paragraph below taken from the text “Myth of Cyberterrorism” and analyse the content and organisation.

“The main reason for this controversy is that cyber-threats have not materialized as a national security threat, even granted that there have been some few incidents with at least some potential for grave consequences. Interestingly enough, both hypers and de-hypers tend to agree on this point. But while the first group assumes that vicious attacks that wreak havoc and paralyze whole nations are imminent, more cautious researchers often point to the practical difficulties of a serious cyberattack (Ingles-le Nobel,

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Acc205 Final Paper

    • 1287 Words
    • 6 Pages

    References: Kelly, M., & 42 staff. (2011, June 10). Cyber crime represents a growing threat, FBI agent tells…

    • 1287 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Kizz Chapter Summary

    • 600 Words
    • 3 Pages

    | Chapter 11 in Kizza is about the ethical issues that apply to | |…

    • 600 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Final Exam Paper

    • 491 Words
    • 2 Pages

    True or False: Cyberterrorism has thus far been largely limited to acts such as the defacement of NATO Web pages during the war in Kosovo.…

    • 491 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Eng 122 Reseach Paper

    • 2034 Words
    • 9 Pages

    In today’s society terrorism has a major impact on how we live, communicate, travel, our political views, and can even affect the country’s economy. But some may ask what actually is terrorism what motivates a terrorist, and it is easy to see the negative impact that it has on society but hard to see the positive impact terrorism have on society? In this research paper I will provide you with the information supported by facts that will answer each one of those statements. To show how no matter where you live weather it is In the big city in the United States, Europe, Africa, or the rural parts of Iraq and Afghanistan terrorism has a effect on everyone in its society weather it has an enormous or minuscule impact on their life.…

    • 2034 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Martin, G. (2010). Understanding Terrorism: Challenges, Perspective, and Issues Third Edition. In G. Martin, Understanding Terrorism: Challenges, Perspective, and Issues Third Edition (pp. 82-84). California: Sage Publication, Inc.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lone Wolf Terrorism

    • 8850 Words
    • 36 Pages

    Crenshaw, M (1988): Theories of terrorism; instrument and organizational approaches. Pg. 13-31. Penn state University Press.…

    • 8850 Words
    • 36 Pages
    Powerful Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    American Government

    • 328 Words
    • 2 Pages

    Contention 2) Cyber attacks are dilemmas that can be prohibited. Subpoint A: There are many ways for the United States to be attacked by terrorists other than the bombings itself, they are called Cyber Attacks. Cyber Attacks are an attempt by hackers to damage or destroy a computer network or system. These are attacks that can affect us deeply because Americans today are becoming more and more dependent on the internet. Though the government of America has much of it’s private information recorded on paper, yes but much is saved on the Internet as backup. With this, terrorist groups hire hackers or even study about computers to be able to launch a Cyber Attack that would help them steal and even look through the information to give them an advantage. With them knowing the key aspects of the government that would help them to bring even more danger upon not only the government but also the Citizens and other individuals that live here in our country. With cyber attacks it would lead to Cyber Warfare. Cyber warfare can be like any other war, just because it isn’t being fought face to face or weapons being involved it is of high danger either way. With this,the enemies can find ways to hurt us as a country, cause damage that would take years to recovers just like 9/11.Which would cause wars amongst the nations/countries. As Martin C. Libicki from the RAND corporation states “ Because much of what goes on in cyberspace is invisible, what one state perceives as normal operating procedure, another could perceive as just about anything.” With this he means even if one self may think what they put on the internet even with high security, others can use it for anything even if the person may think it’s harmful. The U.S. has been receiving cyber attacks from china which has leaded us to enormous losses to U.S. jobs states Senator Brown…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    The United States safety and wellbeing relies on a resilient critical infrastructure, which is the assets, systems and networks that underpin American society. There are three different categories of threats. Natural threats, human- cause and accidental/technical threat. “Natural threats include weather problems in both hot and cold climates and also geological hazards like earthquakes, tsunamis, 18 International Journal of Control and Automation land shifting and volcanic eruption.” (Robles, Choi, Cho, Kim, G Park, Lee) The human caused threats are referred to as terrorism. “This may include cyber-attacks, rioting, product tampering, explosions and bombing.” (Robles, Choi, Cho, Kim, G Park, Lee) Technological threats are completely different;…

    • 887 Words
    • 4 Pages
    Good Essays

Related Topics