Anda di halaman 1dari 3

Cyberterrorism (crime) and security

Terrorist activities intended to damage or disrupt vital computer systems is simply known

as Cyberterrorism (merriam-webster, 2017). According to NATO, cyberterrorism is a cyber-

attack using or exploiting computer or communication networks to cause sufficient destruction to

generate fear or intimidate a society into an ideological goal (NATO Science for Peace and

Security Series, 2008).

Alternative description of cyberterrorism is provided by the US National Infrastructure

Protection Centre, a part of the Department for Homeland Security: a criminal act perpetrated

through computers resulting in violence, death and/or destruction, and creating terror for the

purpose of coercing a government to change its policies (Wilson, 2013).

There is not much difference between cyberterrorism and cybercrime. Cybercrimes can

incorporate the following variety of unethical or prohibited actions: Attacks against computer

data or networks, Internet theft or fraud, Distribution of malicious software such as botnets,

malware and ransomware, Email scams and phishing/pharming, and Copyright or intellectual

property infringement etc. (Mid-America Regional Council, 2015). The ethical user should not

practice these some of the prohibited activities.

According to the journal, called cyberterrorism and China by Pope, there are several

attacks which can or which are been practiced by Chinese attacker on United States of America

(USA) such as Web vandalism, disinformation campaigns, Gathering secret data, Disruption in

the field, and attacking critical infrastructure (Pope, 2008). China persist to make practical

efforts to acquire access to America's complex information through hacking (Pope, 2008). The

Chinese attackers should know all these activities listed by the journal and hacking are unethical.
According to the Kasper lab, the Adwind malware was spread in USA, India, German,

Turkey, UAE, Italy, Russia, Hong Kong and Taiwan from 2012-2016 and more than 68,000 users

were affected. TOP countries attacked by Trojan-Ransomware were Kazakhstan, Germany,

Uzbekistan, Canada, Italy etc (Alexander Gostev, 2016). It is unethical to become millionaire by

spreading malware or ransomware.

According to website called Enigma Software, Top Countries targeted by Cybercrime are

United States of America, China, Germany, Britain, Brazil etc. (Sumo, n.d.).

According to the website slideshow, there are 378 million victims per year affected by

cybercrime. Nearly 2.8 times as many babies born each year. 1 million plus victims per day. 12

victims per second (Sarkar, 2014).


References
Alexander Gostev, R. U. (2016). IT THREAT EVOLUTION IN Q1 2016. Retrieved from
Kaspersky Lab:
https://securelist.com/files/2016/05/Q1_2016_MW_report_FINAL_eng.pdf
merriam-webster. (2017). Definition of cyberterrorism. Retrieved from merriam-
webster: https://www.merriam-webster.com/dictionary/cyberterrorism
Mid-America Regional Council. (2015, June). Risk and Vulnerability Assessme.
Retrieved from Regional Multi-Hazard Mitigation Plan:
http://www.marc.org/Emergency-Services-9-1-
1/pdf/2015HMPdocs/HMP2015_Sec4-HAZ-CyberDisruption.aspx
NATO Science for Peace and Security Series. (2008). Responses to Cyber Terrorism.
Ankara: NATO Science for Peace and Security programme.
Pope, L. L. (2008, April 29). Cyber terrorism and China. Retrieved from Homeland
Security Digital Library: https://www.hsdl.org/?view&did=698079
Sarkar, A. (2014, April 25). Cybercrime: A Seminar Report . Retrieved from
slideshare: http://www.slideshare.net/ArindamSarkar9/cybercrime-a
Sumo. (n.d.). Top 20 Countries Found to Have the Most Cybercrime. Retrieved from
Enigma Software: http://www.enigmasoftware.com/top-20-countries-the-most-
cybercrime/
Wilson, C. (2013, Oct 17). Computer Attack and Cyber Terrorism: Vulnerabilities and
Policy Issues for Congress. Retrieved from CRS Report for Congress:
https://fas.org/irp/crs/RL32114.pdf