Essay Available:
Pages:
7 pages/≈1925 words
Sources:
12 Sources
Style:
MLA
Subject:
Social Sciences
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 36.29
Topic:
Research About Cyber Warfare And Cyber Terrorism
Research Paper Instructions:
This paper is for my sociology class.. Need at least 3 peer review and 5 popular non-academic sources. And some journals, essays and so on. My professor said my outline is most likely compare definition of Cyber Warfare and cyber terrorism instead of sociology.
Research Paper Sample Content Preview:
Name
Instructor
Course
Date
Cyber Warfare and Cyber Terrorism
At the wake of a technologically advanced world, people were happy but this introduced new threats (cyber threats) to the society that must be confronted. These cyber threats has been defined as the use of technology to undermine the ability of the society to maintain internal and external order.
Historically, two strategies have been utilized to maintain both internal and external order in the society. The first strategy is the enforcement of a set of rules that govern how individuals should relate in the society while the second strategy has been relying on military forces. This approach assumes that the society occupies a defined territory where threats can be recognized as either internal or external. The recent advancements in technology erodes this traditional assumption making the physical territories irrelevant. Recent instances and rise in cybercrime has resulted in wide range of views concerning the issue. In the modern world, different groups are using the internet to undermine the ability of the society to maintain order. This has resulted in two broad areas that have received different views from scholars. These areas include cyber “warfare’ and “cyberterrorism”. Scholars have tried to define these categories according to their own understanding while others have argued that they are the same. This paper will try to provide the differences that exists between them.
As more people become knowledgeable about the internet, its effect on how it affects the human life also increases and comes more complicated. Individual persons as well as groups are taking advantage of the anonymity that the cyberspace provides to engage in illegal activities that threaten or cause fear to people in different countries. It is difficult to trace and capture the person who engages in illegal activities over the internet (Maggio, survivalinsights.com). Different people from different levels in the society have asked how these activities can be differentiated from one another and fall into either cyberterrorism or cyber warfare. The available definitions in different articles vary making it difficult for people to understand the topic.
CYBERTERRORISM
“Cyberterrorism is also clearly an emerging threat. Terrorist groups are increasingly computer savvy, and some probably are acquiring the ability to use cyberattacks to inflict isolated and brief disruptions of US infrastructure. Due to the prevalence of publicly available hacker tools, many of these groups probably already have the capability to launch denial-of-service and other nuisance attacks against Internet-connected systems. As terrorists become more computer savvy, their attack options will only increase”(Robbert, III)
Cyberterrorism has been given different definitions but the common one has been the use of computer technology to engage in terrorism activities (Elmusharaf, crime-research.org). There has been confusions in providing a clear definition to this concept (Krasavin, crime-research.org). Most of the confusion comes from FBI which has published three different definitions. In 1999 it published that cyberterrorism is “terrorism that initiates attack on info...
Instructor
Course
Date
Cyber Warfare and Cyber Terrorism
At the wake of a technologically advanced world, people were happy but this introduced new threats (cyber threats) to the society that must be confronted. These cyber threats has been defined as the use of technology to undermine the ability of the society to maintain internal and external order.
Historically, two strategies have been utilized to maintain both internal and external order in the society. The first strategy is the enforcement of a set of rules that govern how individuals should relate in the society while the second strategy has been relying on military forces. This approach assumes that the society occupies a defined territory where threats can be recognized as either internal or external. The recent advancements in technology erodes this traditional assumption making the physical territories irrelevant. Recent instances and rise in cybercrime has resulted in wide range of views concerning the issue. In the modern world, different groups are using the internet to undermine the ability of the society to maintain order. This has resulted in two broad areas that have received different views from scholars. These areas include cyber “warfare’ and “cyberterrorism”. Scholars have tried to define these categories according to their own understanding while others have argued that they are the same. This paper will try to provide the differences that exists between them.
As more people become knowledgeable about the internet, its effect on how it affects the human life also increases and comes more complicated. Individual persons as well as groups are taking advantage of the anonymity that the cyberspace provides to engage in illegal activities that threaten or cause fear to people in different countries. It is difficult to trace and capture the person who engages in illegal activities over the internet (Maggio, survivalinsights.com). Different people from different levels in the society have asked how these activities can be differentiated from one another and fall into either cyberterrorism or cyber warfare. The available definitions in different articles vary making it difficult for people to understand the topic.
CYBERTERRORISM
“Cyberterrorism is also clearly an emerging threat. Terrorist groups are increasingly computer savvy, and some probably are acquiring the ability to use cyberattacks to inflict isolated and brief disruptions of US infrastructure. Due to the prevalence of publicly available hacker tools, many of these groups probably already have the capability to launch denial-of-service and other nuisance attacks against Internet-connected systems. As terrorists become more computer savvy, their attack options will only increase”(Robbert, III)
Cyberterrorism has been given different definitions but the common one has been the use of computer technology to engage in terrorism activities (Elmusharaf, crime-research.org). There has been confusions in providing a clear definition to this concept (Krasavin, crime-research.org). Most of the confusion comes from FBI which has published three different definitions. In 1999 it published that cyberterrorism is “terrorism that initiates attack on info...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
You Might Also Like Other Topics Related to war essays:
- Descriptive Outline: Global Warming Terrifying New Math4 pages/≈1100 words | No Sources | Other | Literature & Language | Coursework |
- History Cold War: Cuban Missile Crisis, October 16-28, 19621 page/≈275 words | No Sources | MLA | Social Sciences | Research Paper |
- Primary Source Project: The Book War by Lyndon B. Johnson3 pages/≈825 words | 6 Sources | APA | History | Essay |
- AOL Time Warner Case Accounting Coursework Assignment2 pages/≈550 words | No Sources | MLA | Accounting, Finance, SPSS | Coursework |
- The Cold War Temperature Assignment Research Paper2 pages/≈550 words | No Sources | MLA | Social Sciences | Research Paper |
- Logistical Quality Control: Benchmarking Of The Warehouse's Performance2 pages/≈550 words | 3 Sources | APA | Business & Marketing | Essay |
- Facilities Planning and Warehousing Management Assignment2 pages/≈550 words | 3 Sources | APA | Management | Essay |