Page 252 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 252

Unit 13: Understanding the Need of Security Measures



            Cyber terrorism is the union of terrorism and the cyberspace. It refers to the use of computer   Notes
            networks to threaten the masses. It involves the utilization of computer infrastructure to terrorize
            society. According to some, cyber terrorism is the use of Internet by terrorist organizations to
            spread fear while others refer to it as the disruption of sensitive information stored on the web,
            thus causing loss of sensitive data. The disruption of information stored on computer networks
            is also a form of cyber terrorism.
            Electronic means cannot cause physical harm. They can spread fear among the common masses
            but they are very unlikely to result in a massive physical destruction or death. Considering the
            advanced Internet security measures and the protective technologies in use, there are lesser
            chances of the Internet leading to terror attacks. Many computer theorists deny the existence of
            cyber terrorism. They prefer to call it as hacking or information warfare, wherein confidential
            information of individuals or organizations is put on stake by unethical Internet users. They
            define cyber terrorism as the group of activities that risk Internet safety of individuals and
            organizations. However, many consider cyber terrorism as a serious threat to society. It is not
            right to underestimate the devastating effects of criminal practices like hacking and phishing.
            Hacking is the activity of breaking into a computer system in order to gain an unauthorized
            access to it. The unauthorized revelation of passwords, the hacking of IP addresses can prove
            being severe threats to the well-being of society. There have been instances of terrorist agencies
            hacking computer systems to gain access to sensitive and critical information. One example is of
            terrorists in Romania gaining access to the computers controlling the life support systems at the
            Antarctic research station. A relatively recent example is of the website of the Ukrainian president
            being attacked by hackers. Another simple example of cyber terrorism could be the hacking of
            a hospital database system and changing medical prescriptions of the patients. Isn’t that scary?

            13.5.1 Protection against Cyber Terrorism

            In order to take effective measures against cyber terrorism, it is important for the computer
            professionals to understand its adverse effects and be able to identify the loopholes in Internet
            security. It is necessary to strengthen Internet security measures so that the society can be assured
            a safe life on the Internet.
            Critical information should be isolated from the outside world. It should be protected by the means
            of firewalls, antivirus software and complex password systems. Government organizations should
            be well-equipped to deal with cyber-terrorist activities. Similarly, banks, financial organizations
            and other critical information units should be well protected from practices such as phishing,
            hacking and identity theft. The information pertaining to national security is of highest importance
            for the people of any country. It needs to be effectively protected from unethical Internet users.

            It is also important to ensure protection on an individual level. It is essential for all the Internet
            users to ensure Internet safety. In order to ensure protection from cyber terrorism, one’s email
            accounts should be protected through passwords that are not easily guessable. One should
            change the network configurations if defects are known and pay heed to network security issues
            on an urgent basis. One should not visit websites that can seem suspicious in order to keep away
            from Internet scams. It is important for every Internet user to know about the different types of
            computer crimes and take due precaution against all the ill-practices that eclipse the advantages
            of the Internet.






                                             LOVELY PROFESSIONAL UNIVERSITY                                   245
   247   248   249   250   251   252   253   254   255   256   257