Published on Dec 17, 2015
Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us,it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least.
The difference between the conventional approaches of terrorism and new methods is primarily that it is possible to affect a large multitude of people with minimum resources on the terrorist's side, with no danger to him at all. We also glimpse into the reasons that caused terrorists to look towards the Web, and why the Internet is such an attractive alternative to them.
The growth of Information Technology has led to the development of this dangerous web of terror, for cyberterrorists could wreak maximum havoc within a small time span. Various situations that can be viewed as acts of cyberterrorism have also been covered. Banks are the most likely places to receive threats, but it cannot be said that any establishment is beyond attack. Tips by which we can protect ourselves from cyberterrorism have also been covered which can reduce problems created by the cyberterrorist.
We, as the Information Technology people of tomorrow need to study and understand the weaknesses of existing systems, and figure out ways of ensuring the world's safety from cyberterrorists.
A number of issues here are ethical, in the sense that computing technology is now available to the whole world, but if this gift is used wrongly, the
consequences could be disastrous. It is important that we understand and mitigate cyberterrorism for the benefit of society, try to curtail its growth, so that we can heal the present, and live the future…
More Seminar Topics:
Holographic Versatile Disc,
Internet Telephony Policy in INDIA,
Efficient Implementation Of Cryptographically Useful Large Boolean Functions,
An ATM With An Eye,
Blu Ray Disc,
Buffer Overflow Attack,
Coherent Acoustics Coding System,
Digital Video Editing,
DRM Software Radio,
Dual Core Processor,
Dynamically Reconfigurability Computing,
3D Audio and Acoustic Environment Modeling,
3- D IC's,
A BASIC TOUCH-SENSOR SCREEN SYSTEM