Cyber-Terrorism and International Interventions Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Cyber terrorism can be defined as pre-mediated intrusions that are politically motivated and performed by persons, groups, or information technology agents to manipulate computer programs and other systems (Yunos & Sulaman, 2017). In other words, Cyber-attack is performed with an aim of a security breach to acquire private and confidential information.

There exist no universal definition of Cyber terrorism and this makes most computer systems to be vulnerable to counter cyber-attacks and threats. The common motivational factors behind cyber terrorism include Ideological, economical, political, and social factors (Sebastian & Sakthivel, n.d). Previously, most terrorists used to perform cyber-attacks through physical modes but these days they have shifted to cyberspace due to advanced technology that allows them to perform cyberattacks remotely and inflict extensive and severe damage to the computerized systems of the target country. Most of the cyber-attacks that have occurred involve the direction of the malware and attacks to specific critical systems and Information Technology (IT)infrastructures.

There is international awareness urgency for cyber terrorism vulnerability superficially to critical IT systems and infrastructures, thus the need to seek ways of protecting the systems through secure programming. While most Nations have attempted different steps to ensure the counteract disastrous threats from cyber-attacks by establishing Computer Emergency Response Teams (CERT), there are many gaps for cyber terrorism that are yet to be mended. CERT has been established by the state to help handle Cyber terrorism incidence response. There is a need to establish national cooperation and collaboration among countries and Cybersecurity intelligence agencies to counter terror attacks and security threats (Tabassum et al., 2018). For a successful association, it is essential to have a common goal among country’s to counter cyber terrorisms and the incidence of threats. The alliance should find out and report some of the internet sites and activities that can constitute cyber terrorism. States that are involved in the coalition should sign both bilateral and multilateral treaty based on their agreement on cybersecurity. They should also have a dispensed pool of intelligence to gather and share evidence for any potential cyber threat.

Some of the collaborations that have helped in countering cyber threats include the International Multilateral Partnership Against Cyber-Terrorism (IMPACT) (Teoh & Mahmood, 2017). IMPACT brings together different nations to prevent counter cyber threats. The partnership purpose is to provide a network solution to cyber threats, where member stats help assess security vulnerabilities and propose some of the interventions to mend and upcoming threats in cyberspace. The cooperation fills in security gaps and provides defense. The essence of protecting internet networks is to ensure viable contact details such as emails (Teoh & Mahmood, 2017). Besides, networks eucrite also help guard critical infrastructures such as communications, financial and public services among other personal information. Despite the challenges in creating effective cooperation and collaboration among nations, IMPACT has opened membership all over the world and also allows the developing states to take advantage. Prominent security departments such as Central Intelligences Agencies, Homeland security, and IMPACT work together to counter cyber terrorism.

Conclusively, success in countering cyber terrorism and other information security threats requires government and state intervention. The only method of accomplishing this is by establishing effective communication and collaboration. Furthermore, the academia and other private sectors must also be involved in the cybersecurity dialogues so that they can also provide solutions to mitigate the threats and vulnerability in cyberspace.

References

Sebastian, J., & Sakthivel, P. Cyber Terrorism: A Potential Threat to Global Security. Web.

Tabassum, A., Mustafa, M. S., & Al Maadeed, S. A. (2018).. In 2018 6th International Symposium on Digital Forensic and Security (ISDFS) (pp. 1-6). IEEE. Web.

Teoh, C. S., & Mahmood, A. K. (2017). . In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE. Web.

Yunos, Z., & Sulaman, S. (2017). . Journal of Information Warfare, 16(4), 1-13. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, October 6). Cyber-Terrorism and International Interventions. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/

Work Cited

"Cyber-Terrorism and International Interventions." IvyPanda, 6 Oct. 2022, ivypanda.com/essays/cyber-terrorism-and-international-interventions/.

References

IvyPanda. (2022) 'Cyber-Terrorism and International Interventions'. 6 October.

References

IvyPanda. 2022. "Cyber-Terrorism and International Interventions." October 6, 2022. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/.

1. IvyPanda. "Cyber-Terrorism and International Interventions." October 6, 2022. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/.


Bibliography


IvyPanda. "Cyber-Terrorism and International Interventions." October 6, 2022. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1