Cyberterrorism: Threats, Prevention, And Prosecution

According to Hardy (2017), cyberterrorism is an attack which is done by the use of electronic device like computers to project viruses, malwares, worms etc. in a system or cyber space in order to extremely damage, infiltrate or interfere with serious and delegate issues and infrastructures including the services and network which creates high risks and threat to national’s security, economy status and environment.

In Australia, interfering with any electrical systems for political purpose and to threaten the government and public health can be referred to as cyber terrorism.

Cases related with cyber terrorism

According to Rouse (n.d.), the cases that are related to cyberterrorism are:

  1. Cyber-attack on Sony Pictures Entertainment by the group of North Korean hackers known to be “Guardian of Peace” before releasing the film “The Interview” which depicted the death of their leader Kim Jong –Un.
  2. Ransomware “Wannacry” victimizing all the governmental organizations, hospitals and companies around the world. Also, flooding phone lines with DoS attack and use of malware to destroy data’s.
  3. Cyber-attack on the German Parliament infecting computers used by the officials and stealing of the highly sensitive data’s and demanding money for the cleaning up of damage.
  4. Remote interruptions at three electrical power companies causing blackout to be faced by the customers in Ukraine.
  5. Attack on Ukraine’s election commission system and backup system.
  6. Secure network of Australia compromised by cyberattack. I.e. cyberattack on Bureau of Meteorology and reserve bank.

These all are the biggest cyberterrorism in the history which were done intentionally either to infiltrate the data’s, or for political purposes causing chaos and threatening the peoples. Cyberterrorism activities are generally caused by the group of hackers from compromising sensitive data’s and creating a sophisticated theat.

Methods used in Cyberterrorism

There are different methods used in cyberattack are:

  1. APT: APT generally refers to Advanced persistent threat used for launching attack on sophisticated and complex network to gain access and being undetected and stealing the data than causing damage to the system.
  2. Malware, worms, and viruses for overriding the control systems of different systems like transportation, infrastructure, water supplies and military systems.
  3. Phishing for collection of information’s from users and accessing the user’s identities.
  4. Using Ransomware for holding computer system hostage until the ransom is paid.
  5. DoS attacks for preventing access to computer systems.

Prevention

There are many ways of preventing cyberterrorism. The first and foremost method is using of antimalware software’s and also the use of antivirus software and periodically updating them as new updates add new security features. Business companies must use a better and secured network and must avoid public access points. There must be complete and timely backup of the computer system in order to protect the system from the Ransomware. Companies must adapt new IT polies and develop new polices for protection of the data and motorizing the system. Not only that employs must be well informed about the types of files they can access and download from the web and what steps to follow in case of cyberattack. Providing training to the employees about good password policies, installing applications and detecting the signs of the cyberattack.

Prosecution

For the prosecution of cyberterrorism the governmental and non-governmental agencies must regularly monitories cyberspace and ban the access of dark web sites, download of risky software and files. There must be control of non-relevant data and software’s that might harm the computer system. Also, there must be real security concerned about the civilian’s networks as they are in the high risk of threat. Technologies like Firewalls, key encryptions, access controls, secure socket layers etc. are being used from minimizing the cyberterrorism.

What are governments doing?

Cyber terrorism and Cyber security (2017) states that for the protection of critical infrastructures Australian Cyber Security Centre has been co coordinating with other public and private sectors for sharing information about the threats and vulnerabilities. Cyber security strategies have been implement for reducing the security breaches. Different organizations are making allies i.e. cyber defense pledge to fight against cyberterrorism and are taking action against them. At a glance the strategies of the government are a national cyber partnership, strong cyber defenses, global responsibility and influence, growth and innovation and a cyber-smart nation.

Report of Incident

Australian Cyber Security Centre (2018) states that while falling as a victim of online scam, virus or other internet things one can always take help in following ways:

  1. Contacting your bank: One who have sent money or other banking details to scammers can contact their bank immediately and take compensation of the loss.
  2. Recovering identity: One who have been victim of identity theft can contact iDcare and seek advice.
  3. Reporting spams: Reporting of scams can be done to the Australian competition and consumer commission’s Scamwatch.
  4. Reporting to authorities: One who has been victim of cybercrime as fraud can report it to ACORN (Australian Cybercrime Online Reporting Network)
  5. Reporting to eSafety Commissioner: One who has been victim of cyberbulling such as offensive and illegal online content can report it to eSafety Commissioner.

Conclusion

Cyberterrorism is increasing day by day which is victimizing everyone in this world. Preventions and mitigations of future attacks must be done. Contents on the web must be used properly as one can be the victim of the identity theft. Proper measures must be used while accessing any files or software and firewalls, antivirus, antimalware’s must be used in order to be protected from cyberterrorism.

03 December 2019
close
Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon
Thanks!

Your essay sample has been sent.

Order now
exit-popup-close
exit-popup-image
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now