Cyberterrorism
Cyberterrorism
Cyberterrorism
Goals of cyberterrorism:
Simple - Unstructured
Complex - Coordinated
Many groups use the fact that the Internet does not have to be
under their real name, so hackers are known under pseudonyms.
At the same time, it is necessary to distinguish cyberterrorists
from other hackers who write and distribute viruses and other
malicious software for personal enrichment, are computer
fraudsters or hooligans. Terrorism of their actions are when they
have serious consequences: the destruction or death of people.
Many radical groups try to make their acts produce the greatest
possible response, and the maximum number of people around the
world have learned about them.
There is a direct relationship between the degree of development
of the information infrastructure, the computerization of the
country and the number of similar terrorist attacks. Currently, the
problem of cyber-terrorism is particularly relevant for countries
leading in the use of satellite communication systems and global
networks. According to experts, cyber-terrorism is a serious threat
to humanity, comparable in effectiveness to weapons of mass
destruction. Indeed, there is no state in the world that would be
fully protected from attacks by cyber-terrorists, as evidenced by
the large-scale operation Red October that has been successfully
conducted over the past five years. The main objectives of the
criminals were government and diplomatic departments and
scientific organizations of the most developed countries of the
world.
Conclusion
In connection with the development of technology, the threat of
cyber-terrorism is gradually compared in importance with the
rest of its manifestations.