Understanding Cyber-terrorism
Cyber-terrorism is a critical concept that is outstanding, as depicted by Redins (2012). Cyber-terrorism has vital significance and impact on the cyber landscape today. Cyber-terrorism poses a technical threat and vulnerability to governments, organizations as well as individuals across the world. For instance, in the United States of America, more than 60,000 new malicious cases of computer program attacks are recorded daily. In today’s highly technological environment, all categories of computer networks are potential logical targets for every kind of cyber-attacks/adversaries. Understanding cyber-terrorism is essential because it improves the measures taken by the government, utilities, and companies to galvanize the risks and threats associated with cyber-attacks in the current technological world (Redins, 2012). When the issue of cyber-terrorism is not taken seriously, it might lead to a downturn of business organizations and governments. As a result, there is a dire need for understanding the nature of the cyber-terrorism threat to comprehend its intervention measures critically.
I chose the concept of cyber-terrorism because it is uncommon and globally confusing. By further focusing on the idea, I shall get a more in-depth understanding. The challenge with the cyber-terrorism issues in society is its blurred definition. It becomes hard to define something intangible with the high technology-related vulnerabilities like viruses and malware (Redins, 2012). The people’s shared exoticism with the cyber-terrorism threat makes it challenging for the people to intervene for something that most of the society haven’t agreed upon as a problem. In the future, the problem of cyber-terrorism is expected to expand its scope due to technological advancements. The world is digitalizing and technologically articulated. With the proliferation of technological and digitalized sites such as social media and the internet, there is an expected increase in the volume of harmful interactions, cyber-threats, and content online.
References
Redins, L. (2012). Understanding cyberterrorism. Risk Management, 59(8), 32-36.