Under Virtual Attack
A brief overview of cyber terrorism including the need for a clear definition, and reform within governmental agencies in order to deal with the problem of cyber attacks.
# 147442 | 787 words | 2 sources | MLA | 2011 |
Published on Apr 03, 2011 in Computer and Technology (Internet) , Hot Topics (Terror and 9/11) , Political Science (Terrorism) , Criminology (General)
$19.95 Buy and instantly download this paper now
This paper calls for the need for a clear definition of what does and does not constitute a cyber crime. Supporting paragraphs illustrate some of the difficulties that authorities have to face while trying to apprehend cyber criminals. The paper also deals with the need for governmental agencies to coordinate their efforts with the international community to increase their efficiency.
From the Paper:"With the advent of new computer technologies, entire virtual infrastructures were created in order to support, and often command physical infrastructures, thereby saving time, and manpower. Critical public sectors such as traffic lights, river dams, and power grids are only some examples of the major areas that can be affected should they be hacked into by a malicious program. A person can only imagine a situation where all ongoing traffic lights of a city suddenly turn green simultaneously, or the U.S. electrical grid shutting down, leaving hundreds of millions without power. Although the government possesses some of the most extensive and powerful ways at their disposal to fight off cyber attacks, they are very slow to make administrative changes, thereby leaving them vulnerable. A great deal of time is spent upon the decision making process, and reaching an agreement on all levels of state and federal governments."
Sample of Sources Used:
- Gupta, Dharmendra K. "What Is Cyberterrorism?" Website Promotion Services 26 March 2010<http://mychoicedelhi.blogspot.com/2010/03/what-is-cyber-terrorism.html>
- Mashevsky, Yury. "The Virtual Conflict" SecureList 26 March 2010 <http://www.securelist.com/en/analysis/204791915/The_Virtual_Conflict_Who_Will_Triumph#heatstate>
Cite this Persuasive Essay:
Under Virtual Attack (2011, April 03) Retrieved May 26, 2020, from https://www.academon.com/persuasive-essay/under-virtual-attack-147442/
"Under Virtual Attack" 03 April 2011. Web. 26 May. 2020. <https://www.academon.com/persuasive-essay/under-virtual-attack-147442/>