{"id":1673,"date":"2022-02-08T13:57:31","date_gmt":"2022-02-08T20:57:31","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/?p=1673"},"modified":"2022-02-08T13:57:34","modified_gmt":"2022-02-08T20:57:34","slug":"cyberterrorism-and-security","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/08\/cyberterrorism-and-security\/","title":{"rendered":"CYBERTERRORISM AND SECURITY"},"content":{"rendered":"\n<p>Just last month, there have been uncountable cyber terrorist attacks. One news shows, Chinese hacking group breached several German pharma and tech firms. It was claimed by the German government that the hack into networks of service providers and companies was an attempt to steal intellectual property.\u00a0<\/p>\n\n\n\n<p>Another news shows that there was shutting down of internet traffic to and from North Korea twice in two weeks which was likely a series of DDoS attacks. The second attack came just after North Korea\u2019s 5th missile test of the month. There were apparently many more incidents that took place in different places in the world. These two incidents demonstrate cyber terrorism.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"633\" height=\"275\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/hackers-bank-633x275-1.jpg\" alt=\"\" class=\"wp-image-1674 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/hackers-bank-633x275-1.jpg 633w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/hackers-bank-633x275-1-300x130.jpg 300w\" data-sizes=\"(max-width: 633px) 100vw, 633px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 633px; --smush-placeholder-aspect-ratio: 633\/275;\" \/><figcaption>Image source: google.com<\/figcaption><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>What is Cyber Terrorism?<\/strong><\/p>\n\n\n\n<p>Cyber terrorism is defined as a religious or politically motivated attack against information security, programs and data to cause severe disruptions or widespread threat in society.\u00a0<\/p>\n\n\n\n<p>Computer technology is exploited for money and power. The most common means of cyber terrorism include disruption of various major websites to cause a public panic, unauthorized access to critical infrastructure systems to disrupt cities, factories, etc. Cyber Terrorism expands to more violent terrorist attacks taking place instead of just non-violent political agenda.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"850\" height=\"545\" data-src=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Proposed-cyber-terrorism-conceptual-framework.png\" alt=\"\" class=\"wp-image-1675 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Proposed-cyber-terrorism-conceptual-framework.png 850w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Proposed-cyber-terrorism-conceptual-framework-300x192.png 300w, https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-content\/uploads\/sites\/115\/2022\/02\/Proposed-cyber-terrorism-conceptual-framework-768x492.png 768w\" data-sizes=\"(max-width: 850px) 100vw, 850px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 850px; --smush-placeholder-aspect-ratio: 850\/545;\" \/><figcaption>Image Source: google.com<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>How big is the threat of Cyber Terrorism?\u00a0<\/strong><\/p>\n\n\n\n<p>The roots of cyber terrorism trace back to early 1990s in the age of rapid growth of Internet. Today, the threat of Cyber Terrorism is more than ever. <\/p>\n\n\n\n<p>One of the most commonly and frequently used cyber terrorist activity is Hacktivism. This is because the most common target of cyber terrorism is password attack. Usually it occurs at a great frequency. Hacktivism is defined as use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. Even though it has limitations, hacktivism may be used to post propaganda on target sites, such as the posting of successful insurgent attacks in Iraq on US.<\/p>\n\n\n\n<p>It forces data on the web pages of vulnerable government websites and other popular western web forums. The same techniques are used to leave encrypted messages on public sites and transmitting a number of communications from manuals to execution orders to coordination strategies for an attack.<\/p>\n\n\n\n<p>Cyber terrorism holds the power to bring down any country or city to absolute crushes. Internet can be used by cyber terrorists to hack and cause damage into a city&#8217;s or country&#8217;s transportations, water supplies, electricity supplies, etc.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>How to prevent getting involved and being more secure?<\/strong><\/p>\n\n\n\n<p>The amount of trust and dependence we put on technology today has made us vulnerable to giving a chance to terrorists to make us a target. The threat of cyber terrorism might be exaggerated or manipulated but we can not ignore or deny it.\u00a0If you are on the internet, you are prone to getting involved. <\/p>\n\n\n\n<p>Some of the ways to keep yourself away from getting involved in cyber-terrorism are:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Being more secure with your data by limiting the personal information you share online.<\/li><li>Being aware of the email bombs.<\/li><li>Installing anti-malware software in your devices.\u00a0<\/li><li>Being aware of scam websites and companies online.<\/li><li>Changing your password frequently.<\/li><li>Avoiding usage of public Wi-Fi&#8217;s.<\/li><li>Not trusting third party or pirated software.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Cyber-Terrorism: A Question of Intent\" width=\"640\" height=\"360\" data-src=\"https:\/\/www.youtube.com\/embed\/MQKU69NnwUw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Sources:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p style=\"font-size:20px\">https:\/\/securityboulevard.com\/2022\/01\/a-beginners-guide-to-cyber-war-cyber-terrorism-and-cyber-espionage\/<br>https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents<br>https:\/\/www.jstor.org\/stable\/26486748?seq=1#metadata_info_tab_contents<br>https:\/\/www.techtarget.com\/searchsecurity\/definition\/cyberterrorism<br>https:\/\/www.usip.org\/sites\/default\/files\/sr119.pdf<\/p>\n\n\n\n<p><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Just last month, there have been uncountable cyber terrorist attacks. One news shows, Chinese hacking group breached several German pharma and tech firms. It was claimed by the German government that the hack into networks of service providers and companies was an attempt to steal intellectual property.\u00a0 Another news shows that there was shutting down &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/2022\/02\/08\/cyberterrorism-and-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;CYBERTERRORISM AND SECURITY&#8221;<\/span><\/a><\/p>\n","protected":false},"author":399,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1673","post","type-post","status-publish","format-standard","hentry","category-cpsc-329-602-w22","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Amandeep Kaur","author_link":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/author\/amandeep-kaur\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/users\/399"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/comments?post=1673"}],"version-history":[{"count":5,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1673\/revisions"}],"predecessor-version":[{"id":1681,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/posts\/1673\/revisions\/1681"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/media?parent=1673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/categories?post=1673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/isec-601-f21\/wp-json\/wp\/v2\/tags?post=1673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}