Three Methods of Cyberterrorism Attacks

A physical assault


One of the three types of cyber-terrorism, aims to compromise hardware dependability by employing conventional weapons. The technique targets machinery and installations like computer facilities and transmission lines. The deliberate action is primarily motivated by a political goal to obstruct information processing and flow.


The goal of the second technique


Which uses electromagnetic pulses, is to disrupt data transmission and harm computer hardware. The method makes use of electromagnetic energy's ability to disrupt software, erase electronic memory, and disable electronic components. While electromagnetic pulses will have minuscule impacts of critical infrastructures because of dynamicity and cushiony developments in electronic and electrical devices, jamming communication and overheating circuitry would result in total system breakdown, disrupting the integrity of data and reliability of computer systems.


The third approach of executing cyber network attacks


Is corrupting or stealing data. It is the most damaging method, where DOD notes that the harmful potentiality arises from the disruptive power of malicious code, which not only gives the adversary tremendous advantages but can also be a source of unprecedented consequences. The method utilizes malicious codes to disrupt instruction logic and computer processing code. It can also be directed to digital data and intellectual property, a move that exploits weak points in software, system configuration, and security practices (Linden, 2007, p.5). The strategy focuses on gaining entry to restricted computer systems as well as violating the patent, copyright laws, or trade secrets. The crime entails espionage to make copies of classified data without any authorization. The ultimate goal hacking is causing economic damage through disrupting reliability of computer systems and networks, as well as intimidating the government and the public through threats of exposing confidential communications and data.


Opinion on Nature of Attacks Cited by Dorothy Denning in Chapter 4


While the highlighted incidents are bold moves intended to offset technological superiority, they do not capture the notions of cyber-terrorism. Instead, they represent attempts by adversaries to exploit the power of digital tools in recruitment, communication, resource mobilization, and achieving organizational efficiencies. The observation arises from the fact that attacks, such as the case of disrupting media operations serve to address interference by the government and press firms. While they disrupt service delivery and cause confusion in public space, attacks on telecommunication facilities and networks do not culminate to psychological effects associated with terror violence and mass killings (Linden, 2007, p.76).

References


Linden, E. (2007). Focus on Terrorism. Vol. 9 (1st ed., pp. pp. 1-42 (Clay Wilson), pp. 71-76 (Dorothy E. Denning). Hauppauge, New York: Nova Science Publishers Incorporated.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price