SIZ-Education | Dangers of Cyber Terrorism | club5050 | 10% payout to @siz-official


Introduction

Nowadays the security issue on the internet is one of the global issues that we are facing. Terrorism has taken new dimensions and we are facing the worst form of terrorism popularly known as "Cyber Terrorism".Today I will discuss the various forms of cyber terrorism and will explain how to deal with cyber terrorists. I will also mention the laws regarding cyber security.

image.png
Source

image.png

What is Cyberterrorism?

Cyberterrorism means an intentional ,negative and harmful use of Information Technology(IT) for producing destructive and harmful effects to someone else's property.
For the sake of simplicity,hacking of a computer system and then deleting valuable and business information of the rival is known as cyberterrorism.

image.png
Source

image.png

Various forms of Cyberterrorism

  • Privacy Violation

  • Data Theft

  • Demolition of E-governence base

  • Network damage

image.png

Privacy Vioaltion

Cyberterrorism completely goes against this law because an individual's privacy is being violated with various cyber attacks in the world.

image.png
Image Source

image.png

Data Theft

IT can be misused for appropriating the valuable government secrets and data of private individuals and government agencies.A computer network owned by the government may contain valuable information concerning defense and other top secrets, these top secrets are targeted by the terrorists to facilitate their activities, including the destruction of properties.

image.png
Source

image.png

Demolition of E-governance base

Cyberterrorism targets the E-governance database to damage the connection between the people and the government. As result, Cyber terrorists can reveal the secrets of the government including the trading secrets.

image.png
Source

image.png

Network damage

The main aim of cyber-terrorist activities is to cause network damage and disruptions.This process involves a combination of computer tampering, virus attacks, hacking, and many many more. After the attack, the network gets collapsed and resulting in the network system being offline.

image.png
Source
image.png

Cyber Attacks in the World!

image.png
Source

Here above it is visible to us that the rate of cyber attacks and malware infections has grown exponentially high. As it was only 61.9% in the year 2014 but as the world is evolving and every daily work is dependent on the internet and computer devices, these cyber crimes have also increased.

image.png

Topics in Cyber Security

  • Data Theft and Data Loss

  • Ransomware

  • Internet Frauds

  • Denial of Service Attack

  • Cyberterrorism

    image.png

    Three stages of Defense

  • Prevention

    Secure systems should be designed to counter these terrorists and these systems should be launched so that no one can attack that, or if launched, they would cause no damage encouraging people to report malicious cyber activities, and for international cooperation in of problems.

  • Managemnet

    To prevent penetration of the system at risk from the outside, we try to erect hammers and otherwise harden it. If the system is penetrated from the outside, the next line of defense is internal compartmentalization and containment.

  • Consequence Management

    Government should take strict actions against these and should be very keen so that they don't slip under their noses.It is an Active form of defense.

image.png
Source
image.png

  • How to deal with Cyberterrorism

  • Use of various technologies and products like firewalls, cryptography, intrusion detection.
  • Encourage people to report malicious cyber activities to the cyber cell.
  • Implement new encryption techniques like end-to-end encryption.

image.png
Source

image.png

Conclusion

Cyberterrorism is a very global issue and every individual person around the world should be very safe from this cyber-terrorist and the government should ensure their safety. It is very important that we take action against these gangs and mafias and remain highly vigilant and protect their privacy at any cost.

image.png

REGARDS: @qaisali49

My Introduction:

Achievement

Steem Infinity Zone Team
@cryptokraze | @arie.steem | @qasimwaqar | @vvarishayy | @suboohi|@siz-official

Subscribe Steem Infinity Zone

image.png


Comments 2


Good post dear friend keep it up bro and keep learn with our steem fellows and friends.

Regards, Faran Nabeel

27.11.2021 04:28
0

Thanks, bro

27.11.2021 14:32
0