Cyber-Terrorism and International Interventions Essay

Exclusively available on IvyPanda Available only on IvyPanda

Cyber terrorism can be defined as pre-mediated intrusions that are politically motivated and performed by persons, groups, or information technology agents to manipulate computer programs and other systems (Yunos & Sulaman, 2017). In other words, Cyber-attack is performed with an aim of a security breach to acquire private and confidential information.

We will write a custom essay on your topic a custom Essay on Cyber-Terrorism and International Interventions
808 writers online

There exist no universal definition of Cyber terrorism and this makes most computer systems to be vulnerable to counter cyber-attacks and threats. The common motivational factors behind cyber terrorism include Ideological, economical, political, and social factors (Sebastian & Sakthivel, n.d). Previously, most terrorists used to perform cyber-attacks through physical modes but these days they have shifted to cyberspace due to advanced technology that allows them to perform cyberattacks remotely and inflict extensive and severe damage to the computerized systems of the target country. Most of the cyber-attacks that have occurred involve the direction of the malware and attacks to specific critical systems and Information Technology (IT)infrastructures.

There is international awareness urgency for cyber terrorism vulnerability superficially to critical IT systems and infrastructures, thus the need to seek ways of protecting the systems through secure programming. While most Nations have attempted different steps to ensure the counteract disastrous threats from cyber-attacks by establishing Computer Emergency Response Teams (CERT), there are many gaps for cyber terrorism that are yet to be mended. CERT has been established by the state to help handle Cyber terrorism incidence response. There is a need to establish national cooperation and collaboration among countries and Cybersecurity intelligence agencies to counter terror attacks and security threats (Tabassum et al., 2018). For a successful association, it is essential to have a common goal among country’s to counter cyber terrorisms and the incidence of threats. The alliance should find out and report some of the internet sites and activities that can constitute cyber terrorism. States that are involved in the coalition should sign both bilateral and multilateral treaty based on their agreement on cybersecurity. They should also have a dispensed pool of intelligence to gather and share evidence for any potential cyber threat.

Some of the collaborations that have helped in countering cyber threats include the International Multilateral Partnership Against Cyber-Terrorism (IMPACT) (Teoh & Mahmood, 2017). IMPACT brings together different nations to prevent counter cyber threats. The partnership purpose is to provide a network solution to cyber threats, where member stats help assess security vulnerabilities and propose some of the interventions to mend and upcoming threats in cyberspace. The cooperation fills in security gaps and provides defense. The essence of protecting internet networks is to ensure viable contact details such as emails (Teoh & Mahmood, 2017). Besides, networks eucrite also help guard critical infrastructures such as communications, financial and public services among other personal information. Despite the challenges in creating effective cooperation and collaboration among nations, IMPACT has opened membership all over the world and also allows the developing states to take advantage. Prominent security departments such as Central Intelligences Agencies, Homeland security, and IMPACT work together to counter cyber terrorism.

Conclusively, success in countering cyber terrorism and other information security threats requires government and state intervention. The only method of accomplishing this is by establishing effective communication and collaboration. Furthermore, the academia and other private sectors must also be involved in the cybersecurity dialogues so that they can also provide solutions to mitigate the threats and vulnerability in cyberspace.

References

Sebastian, J., & Sakthivel, P. Cyber Terrorism: A Potential Threat to Global Security. Web.

Tabassum, A., Mustafa, M. S., & Al Maadeed, S. A. (2018).. In 2018 6th International Symposium on Digital Forensic and Security (ISDFS) (pp. 1-6). IEEE. Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Teoh, C. S., & Mahmood, A. K. (2017). . In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE. Web.

Yunos, Z., & Sulaman, S. (2017). . Journal of Information Warfare, 16(4), 1-13. Web.

Print
Need an custom research paper on Cyber-Terrorism and International Interventions written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, August 17). Cyber-Terrorism and International Interventions. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/

Work Cited

"Cyber-Terrorism and International Interventions." IvyPanda, 17 Aug. 2023, ivypanda.com/essays/cyber-terrorism-and-international-interventions/.

References

IvyPanda. (2023) 'Cyber-Terrorism and International Interventions'. 17 August.

References

IvyPanda. 2023. "Cyber-Terrorism and International Interventions." August 17, 2023. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/.

1. IvyPanda. "Cyber-Terrorism and International Interventions." August 17, 2023. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/.


Bibliography


IvyPanda. "Cyber-Terrorism and International Interventions." August 17, 2023. https://ivypanda.com/essays/cyber-terrorism-and-international-interventions/.

Powered by CiteTotal, free reference maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1