Essay Topics
Types of Essays
Essay Checklist
Word Counter
Readability Score
Essay Rewriter
Despite lighter physical and border security, terrorism has been a complex problem faced by the Governments and the policy makers. With the emergence of new communication technologies, the nature and mode of operation of terrorism has undergone a radical change giving rise to a new variety of terrorism called as cyber- terrorism. According to U.S. National Infra-structure Protection Center, cyber terrorism is defined as "a criminal act perpetrated by the use of computer and telecommunication capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government population to conform to a particular political, social or ideological agenda." Thus, cyber terrorism may be said to be a convergence of terrorism and cyber space involving unlawful attacks or threats of attacks against computers, networks and the information stored therein, in order to coerce or intimidate a government or its people in furtherance of political, social or ideological objectives. Cyber terrorism is resorted to either by attacking the critical infra-structure via cyber attacks or by misusing the internet. Cyber terrorism has domestic as well as international ramifications. It may be defined as the premeditated use of disruptive activities or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. A 'cyber terrorist' may be defined as a person who uses computer system as a means to achieve any of the following objectives:- (i) Putting the public or any section of the public in fear; or (ii) Affecting adversely the harmony between different religious, racial, language or regional groups or castes or communities; or (iii) Coercing or overawing the government established by law; or (iv) Endangering the sovereignty and integrity of the nation. Every act done in pursuance of the above objectives will be an act of cyber terrorism. It hardly needs to be stressed that inter-connectivity of national networks into a single world wide web is being misused by the cyber terrorists for pursuing their terrorist activities with impunity. Therefore, international cooperation to combat cyber terrorism and misuse of internet by terrorist is the urgent need of the time. The members of the United Nations have expressed their concern about the threat of cyber crimes, particularly the cyber terrorism and suggested updating the national cyber forensic systems and legal framework to combat the menace. There is need to develop new strategies and new national and international policies for effective response to cyber terrorism. Generating a 'global consensus' and establishing effective bilateral and multilateral cooperation among nations would be helpful in promoting information and network security which would be an effective tool for prevention of cyber terrorism.
Essay Writing Checklist
The following guidelines are designed to give students a checklist to use, whether they are revising individually or as part of a peer review team.
Introduction
  • Is the main idea (i.e., the writer's opinion of the story title) stated clearly?
  • Is the introductory paragraph interesting? Does it make the reader want to keep on reading?
Body Paragraph
  • Does each body paragraph have a clear topic sentence that is related to the main idea of the essay?
  • Does each body paragraph include specific information from the text(including quoted evidence from the text, if required by the instructor)that supports the topic sentence?
  • Is there a clear plan for the order of the body paragraphs (i.e., order of importance, chronology in the story, etc.)?
  • Does each body paragraph transition smoothly to the next?
Conclusion
  • Is the main idea of the essay restated in different words?
  • Are the supporting ideas summarized succinctly and clearly?
  • Is the concluding paragraph interesting? Does it leave an impression on the reader?
Overall Essay
  • Is any important material left unsaid?
  • Is any material repetitious and unnecessary?
  • Has the writer tried to incorporate "voice" in the essay so that it has his/her distinctive mark?
  • Are there changes needed in word choice, sentence length and structure, etc.?
  • Are the quotations (if required) properly cited?
  • Has the essay been proofread for spelling, punctuation, grammar, etc.?
  • Does the essay have an interesting and appropriate title?
Essay on Cyber Terrorism
Trending Essay Topics
Reference
Feel free to use content on this page for your website, blog or paper we only ask that you reference content back to us. Use the following code to link this page:
Terms · Privacy · Contact
Essay Topics © 2019

Essay On Cyber Terrorism

Words: 463    Pages: 2    Paragraphs: 7    Sentences: 17    Read Time: 01:41
Highlight Text to add correction. Use an editor to spell check essay.
              Despite lighter physical and border security, terrorism has been a complex problem faced by the Governments and the policy makers. With the emergence of new communication technologies, the nature and mode of operation of terrorism has undergone a radical change giving rise to a new variety of terrorism called as cyber- terrorism.
             
              According to U. S. National Infra-structure Protection Center, cyber terrorism is defined as "a criminal act perpetrated by the use of computer and telecommunication capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government population to conform to a particular political, social or ideological agenda. "
             
              Thus, cyber terrorism may be said to be a convergence of terrorism and cyber space involving unlawful attacks or threats of attacks against computers, networks and the information stored therein, in order to coerce or intimidate a government or its people in furtherance of political, social or ideological objectives.
             
              Cyber terrorism is resorted to either by attacking the critical infra-structure via cyber attacks or by misusing the internet.
             
              Cyber terrorism has domestic as well as international ramifications. It may be defined as the premeditated use of disruptive activities or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. A 'cyber terrorist' may be defined as a person who uses computer system as a means to achieve any of the following objectives: -
             
              (i) Putting the public or any section of the public in fear; or
             
              (ii) Affecting adversely the harmony between different religious, racial, language or regional groups or castes or communities; or
             
              (iii) Coercing or overawing the government established by law; or
             
              (iv) Endangering the sovereignty and integrity of the nation.
             
              Every act done in pursuance of the above objectives will be an act of cyber terrorism.
             
              It hardly needs to be stressed that inter-connectivity of national networks into a single world wide web is being misused by the cyber terrorists for pursuing their terrorist activities with impunity. Therefore, international cooperation to combat cyber terrorism and misuse of internet by terrorist is the urgent need of the time.
             
              The members of the United Nations have expressed their concern about the threat of cyber crimes, particularly the cyber terrorism and suggested updating the national cyber forensic systems and legal framework to combat the menace. There is need to develop new strategies and new national and international policies for effective response to cyber terrorism.
             
              Generating a 'global consensus' and establishing effective bilateral and multilateral cooperation among nations would be helpful in promoting information and network security which would be an effective tool for prevention of cyber terrorism.
Terrorism Essay 
Tip: Use our Essay Rewriter to rewrite this essay and remove plagiarism.

Add Notes

Have suggestions, comments or ideas? Please share below. Don't forget to tag a friend or classmate.
clear
Formatting Help
Submit
Sitemap