Type of paper: Essay

Topic: Terrorism, Terrorist, Government, Politics, System, Economics, People, Economy

Pages: 1

Words: 275

Published: 2020/09/13

Terrorism nowadays has become a major threat for the society. In today's contemporary world, we have seen that the terrorist organizations have been targeting the civilians, in order to weaken the government of that nation. In order to fulfill their demands, they shall utilize any way of targeting the people. It has never been so easy for the government as well as the people of that society to cope up with such issues (Frey & Luchinger, 2004).
However, it seems that, the ways adopted by terrorist to attack on any city or to target civilians seems to be changing a lot these days. They are becoming more and more educated, and hence, they have now even entered into the field of Cyber Space. Cyber Security is gaining importance day-by-day since majority of the data of the organizations and, even the government is stored through electronic formats. So, through unethical hacking approaches, or through spreading of Viruses, Trojans, and other Malware, the terrorists are destroying the entire IT system of the government. The impact is the same, which we find during a traditional attack.
So, while comparing the profiles of “traditional” terrorist and a “cyber” terrorist, the only difference is in the approach of attacking the people. The traditional terrorist will be attacking through usage of lethal weapons, while on the other hand, the cyber terrorist will be hacking the computers of the government, will steal important data, and then crash the entire system (Schreiner & Sherraden, 2007). The economy of a given nation is impacted in both the cases. The destruction caused is also the same; only, it might happen that, the number of casualties will be more in the case of traditional terrorist, since he might be exploding bombs or open up fire in a public area and so on. While in the case of a cyber terrorist, the economy will be heavily impacted due to the loss of the data, which will be difficult to recover. Thus, a joint and collaborative effort of both the IT services system and Military system will help to combat such terrorism. The profiles of both the terrorist categories are different, but the government needs to implement policies and strategies accordingly, which can help both the forces to fight against terrorism.

References

Frey, S., & Luchinger, S. (2004). Decentralization as a Disincentive for Terror. European Journal of Political Economy, 20, 509‐515.
Schreiner, M., & Sherraden, M. W. (2007). Can the poor save? Saving & asset building in Individual Development Accounts. New Brunswick, N.J.: Transaction.

Cite this page
Choose cite format:
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Chicago
  • ASA
  • IEEE
  • AMA
WePapers. (2020, September, 13) Free Essay About Cyber Security. Retrieved March 29, 2024, from https://www.wepapers.com/samples/free-essay-about-cyber-security/
"Free Essay About Cyber Security." WePapers, 13 Sep. 2020, https://www.wepapers.com/samples/free-essay-about-cyber-security/. Accessed 29 March 2024.
WePapers. 2020. Free Essay About Cyber Security., viewed March 29 2024, <https://www.wepapers.com/samples/free-essay-about-cyber-security/>
WePapers. Free Essay About Cyber Security. [Internet]. September 2020. [Accessed March 29, 2024]. Available from: https://www.wepapers.com/samples/free-essay-about-cyber-security/
"Free Essay About Cyber Security." WePapers, Sep 13, 2020. Accessed March 29, 2024. https://www.wepapers.com/samples/free-essay-about-cyber-security/
WePapers. 2020. "Free Essay About Cyber Security." Free Essay Examples - WePapers.com. Retrieved March 29, 2024. (https://www.wepapers.com/samples/free-essay-about-cyber-security/).
"Free Essay About Cyber Security," Free Essay Examples - WePapers.com, 13-Sep-2020. [Online]. Available: https://www.wepapers.com/samples/free-essay-about-cyber-security/. [Accessed: 29-Mar-2024].
Free Essay About Cyber Security. Free Essay Examples - WePapers.com. https://www.wepapers.com/samples/free-essay-about-cyber-security/. Published Sep 13, 2020. Accessed March 29, 2024.
Copy

Share with friends using:

Related Premium Essays
Contact us
Chat now