The Power of Cyberterrorism

Introduction

The definition of cyberterrorism is quite elusive as many experts have their own understanding of the terminology (Denning, 2000). However, it is best analyzed through a breakdown of the elements that constitute it. The paper will look at what cyberterrorism could do to opponents and the actual possibility of such an attack.

The likelihood of cyberterrorism

Cyberterrorism is indeed possible owing to the ease with which the terrorism matrix has been redefined. In this case, the terrorism matrix refers to a combination of elements that make up terrorism and the actual translation of those elements by a certain terrorist group/ individual. Seven major elements are covered in this matrix and will be seen below; there is a serious danger of these elements converging to cause cyberterrorism. The first element is the perpetrator; this form of terrorism occurs through the virtual world and thus desensitizes potential wrongdoers from the actual danger of what they can do. It amplifies its odds. Furthermore, perpetrators can maintain a relative degree of anonymity and this makes them all the more likely to engage in discussions that could lead to attacks. Another element that has changed is place. The exploitation of virtual space implies that location need not be an impediment to actual intentions and actions of perpetrators as they can be in any part of the world; this also makes the attack quite likely. In terms of the actions that may be eventually classified as terrorism; relatively easier actions such as the use of Trojan viruses to destroy security-based data is another reason why cyberterrorism is highly likely. Tools have also changed in this new form of terrorism. Now individuals can easily hack, destroy data, alter data or steal identities through computer use. Since this is a machine that is readily available to many, then it further increases the probability of attack. There is a heightened chance for cyberterrorism to occur because persons can become easily affiliated to various terrorist causes without making arrangements to meet in person. This implies that loose associations can be formed and possible leads found by the media or anti-terrorism initiatives may lack adequate evidence to trace them (Gordon, 2003).

Effects of a potential cyber attack on potential opponents

In case a cyber attack is propagated against a particular opponent, then chances are that it will create very serious psychological effects. In other words, this can occur when violence is depicted in cyberspace. However, one of the most alarming effects of cyber attacks is that they may cause malfunctions in corporations or military entities in the event that data stored in their respective PCs has been destroyed or eaten up by deliberate viruses. Additionally, physical trauma may result from depictions of violence in the virtual arena. If a terrorist decides to employ identity theft in order to complete his missions, then this could destroy the credibility of the persons whose identity was stolen.

Sometimes the implications of a cyber attack are not just felt by a handful of individuals and this is what grants cyberterrorists a lot of power; the attacks can lead to market fluctuations and even chaos. For example, if the attacker uses the virtual environment to alter stock prices or spread false information about a critical component of the stock decision-making process, then this could lead to drastic fluctuations that may eventually cause a lot of harm to a specific organization. In the end, if that organization plays a huge role in the stock market, then the entire economy may be affected. In fact, this is a method that cyber terrorists can use to affect governments since attacking the latter directly may prove to be difficult.

Conclusion

The convergence of terrorism and cyberspace imposes intense danger to individuals because tools are easily available, affiliations can be easily made and the role of place has been made irrelevant. This can cause enormous psychological effects or economic effects if carried out against corporations.

References

  1. Gordon, S. (2003), Cyberterrorism? Symantec security response white paper
  2. Denning, D. (2000). Cyberterrorism. Special terrorism oversight committee report

Cite this paper

Select style

Reference

StudyCorgi. (2021, November 26). The Power of Cyberterrorism. https://studycorgi.com/the-power-of-cyberterrorism/

Work Cited

"The Power of Cyberterrorism." StudyCorgi, 26 Nov. 2021, studycorgi.com/the-power-of-cyberterrorism/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2021) 'The Power of Cyberterrorism'. 26 November.

1. StudyCorgi. "The Power of Cyberterrorism." November 26, 2021. https://studycorgi.com/the-power-of-cyberterrorism/.


Bibliography


StudyCorgi. "The Power of Cyberterrorism." November 26, 2021. https://studycorgi.com/the-power-of-cyberterrorism/.

References

StudyCorgi. 2021. "The Power of Cyberterrorism." November 26, 2021. https://studycorgi.com/the-power-of-cyberterrorism/.

This paper, “The Power of Cyberterrorism”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.