Page 49 - CDM-Cyber-Warnings-March-2014
P. 49
operates with a specific political or ideological agenda to support their activities. In the case of cyber terrorism, many look for it causes from surrounding context and underlying conflict such as social, politic and ideology aspects.  Tools of Attack One of the important aspects in method of attack is the role of computer technology in carrying out the act of cyber terrorism. Cyber terrorist can exploit vulnerabilities through unauthorized access and control over a targeted system through a vast array of intrusive tools and techniques. Modern forms of network warfare include all the computer and network security means through which computers are attacked and exploited as well as all the protective mechanism being implemented.  Domain Cyber terrorism is the meeting of cyberspace and terrorism. Cyberspace is the domain through which a cyber attack would be delivered. Cyberspace is defined as the interdependent network of information technology infrastructures, which includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers. In the cyber context, cyberspace becomes the medium in which a terrorist-type attack is conducted.  Method of Action Some believe that a terrorism is a process that involves acts or threats, emotional reactions and the social effects of the acts or threats and the resultant action. The advancement of ICT and rapid changing in technological environment influences terrorist resources and opportunities. Cyber terrorists conduct unlawful use of force or unlawful attack to conduct the premeditated attack to intimidate or coerce a government or people. (6) Impact Cyber terrorism exists when there is attack to computer system which leads to violence against person or property, disruption or serious interference of critical services operation, causing fear, death or bodily injury and severe economic loss. The disruption is enough to create impact to national security and public safety. Terrorist’s cyber attack aims critical infrastructure as their target. Successful cyber attack in one sector will have cascading effect to other sectors. All these can cause a catastrophic impact to other sectors, and possibly long lasting impact to the country’s economy. The International Cooperation against “Cyber Terrorism” Having in mind all security risks related to cyber terrorism, a number of both governmental and international steps have been taken. Governments are organizing themselves to confront the new threat. USA and the UK are the leading model nations for other countries that compose their cyber security policies. Many governments continue to struggle with the organization chart question, but some countries have been able to successfully form a national organization against cyber threats. Hopefully, nations will become conscious of the importance of the " # % " $ " # ! !
   44   45   46   47   48   49   50   51   52   53   54