Research paper

Running head: Research Paper 1
Research Paper 4

Cyberterrorism vs. Cyberwarfare
Prasanna Kumar Bandarupalli
Legal Reg, Compliance, Invest (ISOL-633-B03)
Dr. Gary Perry
03 April 2021

INTRODUCTION

Cyberterrorism is defined as using the internet to conduct violent conduct, achieve power through coercive forces, bodily harm, and threaten or intimidate someone. There are different forms of cyberterrorism, such as incursion, disinformation, destruction, defacement of websites, and denial of service, that affect individuals in numerous ways. At the same time, cyberwarfare is defined as the network-based conflict that leads to politically motivated attacks by one nation towards the other. Different countries use cyberwarfare to gain control over other nations’ data. In the modern world, cyberterrorism and cyberwarfare are controversial topics because of the data threats that governments and individuals are facing. After physical wars and terrorism, the digital battle and terrorism have emerged in different forms (Murat Dogrul, 2011). These two terms show that terrorism has had never ended, but it changed its shape and still exists. The term cyberterrorism is coving all terrorist activities that include targeting international networks to gain control and data breaches. Cyberterrorism and cyber warfare can target anyone; thus, we cannot claim that we can save ourselves by using security systems and applications because this software is penetrating almost everywhere. Nations, countries, and individuals try their best to design security systems and defense protocols, but this software still targets data and personal information.
Numerous studies are interpreting the severity of risk associated with cyberterrorism and cyberwarfare. Cyberattacks and network security are complex problems that are posing severe threats to public policy and national security. This paper aims to look at the minor and significant issues related to cyberterrorism and cyber warfare on national infrastructure and describe its national security implications. Available studies about cyberterrorism and cyberwarfare reveal that infrastructure and computer networks’ vulnerability is like posing risks and challenges to national security.

THESIS STATEMENT

The rapid revolution in technology and innovation and benefits and opportunities pose threats and challenges to national and individual security in the form of cyberterrorism and cyberwarfare. This software is a never-ending source of war.

BACKGROUND & OVERVIEW

As advancement and technology emerged with the emergence of the 20th century but the notion of cyberterrorism can be found back since the 1990s when access to the internet emerged rapidly and revoking threats for individuals. But over the years, the form and effectiveness of these technologies are increasing and leaving a strong influence on individual and national security. Gaining entry into other’s computers and use systems is not as old, but these high-level penetrations are emerging gradually, focusing on research overtime (Gomes, 2017). Threats and risks to nations and individuals in the age of technology and advancement are not surprising because, along with blessings, hurdles are part of every system. critical infrastructure networks and IT are interrelated with each other and accessible to everyone across the world. Nations are used to save their sensitive infrastructures from water to transport and energy resources vulnerable to cyberattacks. In most countries, these infrastructures are wholly insecure and relying on traditional and outdated technologies and security solutions. Cyber-attack on energy or water infrastructures gave rise to environmental disasters, loss of intellectual property, and economic causalities (Murat Dogrul, 2011). Thus, nations need to be prepared for such happenings to avoid complications. To protect intellectual property, technology-driven countries are focusing on the development of laws and policies. International cooperation is the key to preventing such attacks because, despite laws and policies, a nation couldn’t be safe from cyberattacks unless having positive relations with other countries.

DISCUSSION

Threats and challenges posed by cyberterrorism and cyberwarfare are penetrating society that has grabbed the attention of mass media, the information technology industry, and the security community. Journals are full of claims about the negativity of cyberterrorism and cyberwarfare spreading across the world. Some journalists raised the question of whether cyberterrorism is a real threat? And the straight answer is yes because nations are globally facing threats by weakening havoc and endangering national and individual securities. Hackers and terrorists are not motivated by the same goal, but they all are motivated and equipped to attack national security and sensitive information to thrive their access.
Researchers say that political, social, economic, and psychological forces contribute to strengthening cyberterrorism and cyberwarfare threats. The psychological perspective highlights two factors that collectively combine the fear of cyberterrorism. The fear of computer technology and the violent victimization along with the mistrust and doubts. This perspective also states that an unknown threat could be more practical than the known. Although cyberterrorism, a form of technology, does not directly affect individuals’ perception than the bombs in ancient times. The involvement of Asian countries in the terrorist attacks on American companies and one of the severe terrorist attacks of 9/11 is evidence that known threats do not prevail in such details as unknown threats do. Having information about the problem helps solve misinformation leads to deep destructions. The role of political parties in protecting individuals and national borders from cyberspace and cyberterrorism is not ordinary. Still, the response of policies as irresponsible leaders strengthens its prevalence in society. And this is the reason combating cyberterrorism and cyberwarfare has become a politicized and economically rewarding issue. The effectiveness of challenges and threats of cyberterrorism and cyberwarfare was predicted in 2001 by George Bush. His words were “American forces are overused and underfunded precisely when they are confronted by a host of new threats and challenges—the spread of weapons of mass destruction,
the rise of cyberterrorism, the proliferation of missile technology” (Weimann, 2004, p. 3). His prediction comes appropriately in 2001 by the attack of 9/11, and after that, he established a cybersecurity space, and the former executive of the president was heading it. Unlike this incident, nations worldwide should be ready for these challenges and have a defense system instead of setting things after an incident happens. Because researches prove that “Terrorists can sit at one computer connected to one network and can create worldwide havoc” (Weimann, 2004). There should be strong political, legal, and security standards to avoid such happenings and national security threats.

BENEFITS & OBSTACLES

cyberterrorism and cyberwarfare are terms that would be perceived as negative, but when it comes to physical wars and terrorism, these two are beneficial to a much extent. Cybercrime exists in numerous forms and hurting individuals and nations in one or the other way. But at the same time, cybercrime and its associated fields, including cyberterrorism and cyberwarfare, are beneficial because these wars do not bring physical destructions, such as mass causalities, loss of land, and physical assets. And another most important benefit of cybercrime is losing what it causes could be coped up rapidly comparative to the physical damages and destructions (Danyltsiv O., 2018). By taking preventive measures and developing positive international relations, these crimes could be controlled. And the most important and effective move that could eliminate the intervention of cyberterrorism and cyber warfare in a society is the enforcement of effective and practical laws before it leads to destructions and challenges. Along with the benefits of cybersecurity or associated fields, numerous obstacles challenge data and personal information’s online presence. Availability of the internet or lack of access are two major obstacles that challenge internet security, individual data protection and user identity protection (Lewis, 2002). The threat is real, but there is a need to accept this reality. Technology innovation is bringing ease for consumers, but at the same time, it is challenging their existence and information available online. Advancement in technology and innovation is fueling threats and destructions across the world. Innovation is a blessing, and there are millions of machinery and software are available that not only make things easier but also affordable and accessible to everyone. The problems occur when people and nations started focusing on technology from a negative perspective and extract destructive forces from it.
The United States is experimenting on a large scale about the effects of disturbing cybersecurity and deregulation of social, political, and economic functions because of external threats and stability. The country is investing millions in research about the effectiveness of software, cyberterrorism, and cyberwarfare. For example, the FAA has 90 strong networks and computer networks with proprietary networks at the back end that make hacking difficult and ensure data security (Lewis, 2002, p. 6). Such systems are required to be established across the world to protect sensitive information and infrastructures.

SUMMARY & CONCLUSION

cyberterrorism and cyberwarfare are two dangerous types of cybersecurity that threaten individual and national security at different levels. Internet networks that emerged over time are
becoming strong to claim the protection of user data and national infrastructures. But still, the systems are not strong enough to protect these infrastructures, and the hijacking of these systems leads to destruction on a larger scale. In conclusion, along with the focus on advancing technology, the world needs to strengthen its defense system. Without these protections, hackings and data breaches could happen uncertainly, and nations would have nothing to do but coping with the loss. The cybersecurity threats have been traced back from the 1990s that are developing day-to-day. Thus, scientists and data producers should focus on data problems such as breaches and misuse of data. Few types of research are discussed in the paper that help us know the severity of the problem. These research help us learn vulnerabilities that the future would have if there won’t be robust defense systems.

References
Danyltsiv O., P. O. (2018). ADVANTAGES OF CYBERCRIMES. Тернопільський національний технічний університет імені Івана Пулюя, 50.
Gomes, I. W. (2017). Cyberwarfare. Sciencedirect, https://www.sciencedirect.com/topics/computer-science/cyberwarfare.
Lewis, J. A. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats: Center for Strategic and International Studies, 1-12.
Murat Dogrul, A. A. (2011). Developing an International Cooperation on Cyber Defense and Deterrence against Cyber Terrorism. 3rd International Conference on Cyber Conflict C. Czosseck, E. Tyugu, T. Wingfield (Eds.), 1-15.
Weimann, G. (2004). Cyberterrorism How Real Is the Threat? United States Institute of Peace Special Report, 2-10.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH