Cyber terrorism is the intended use of certain disruptive activity or usage of threats in cyber space with the aim to foster ideological, social, political or religious or related objectives or to threaten any person in persistence of such a kind of objective.
Computers and internet are now an essential and most vital part of our daily life. They are used by people across the globe with the intent to make their life easier. They use them for processing data, storing information, sending message, receiving message, controlling machines, communication, editing, typing, drawing, designing and almost in all phase of life.
The word “cyber terrorism” denotes two elements: cyberspace and terrorism. Cyberspace means a “virtual world” that is, a place wherein computer program functions and the data moves.
Cyber terrorism is the intentional attack against any political information, computer programs, computer systems itself and the data which leads to violence against non-combatant targets by clandestine agents or any sub national group.
The key definition of Cyber Terrorism is simply to disfigure a server or a website or attacking some vital systems which turns out to be of no importance and inturn doesn’t sever any usage. There is also a chain of thought that states that cyber terrorism does not exist in real world and it is only a concern of hacking information. Some disagree with this thought as they purely believe that it is a kind of proper terrorism because of the improbability in the formation of fear of death in people using electronic modes by taking the protective technologies and current attack into consideration.
Who are cyber terrorists:-
According to America’s point of view the most dangerous group of terrorists is “Al-Qaeda” as they are considered as the first enemy of the US. According to the United State’s an official’s data was confiscated in Afghanistan which indicates that the group has inspected systems that inturn control American water distribution , communication systems, energy facilities, and other crucial infrastructure.
After 2001 (April) collision of Chinese fighter jet and US navy spy plane, Chinese hackers introduced Denial Operating System Service (DoS) attack against the American websites.
A study that was conducted for the second half year of 2002 showed up that most of the severe and dangerous nation for initiating the malicious harmful cyber attacks in US with 35.4% of the cases. South Korea was next in the list with 12.8% eventually followed by China6.2%, Germany (6.7%), and then finally France (4%).
Advantages of Cyber Terrorism for a Cyber Terrorist:-
Various Forms of Cyber Terrorism:-
Attacks through Internet:-
Unauthorized Access and usage:-
One of the most criminal activities involves the unauthorized access that means any kind of access without any permission of either the person having liable control of the computer or the right owner of a particular software or program. Every activity involved in committing a break down of a computer or a network is hacking. Hackers make certain harmful computer programs which in turn attack a target computer. They have an aim of destructing a computer or computer related work of a targeted client and in turn they get benefit out of it.
Trojan is a harmful program that acts like something really useful but it does the things that are quite devastating. These types of Programs are known as Trojans
Worm and Virus Attack:-
A virus is a program that has a capability to infect other programs thereby making copies of itself and then eventually spreading into other programs.
Programs that replicate like viruses and spread from one computer to other computer are called worms.
2. Email Spamming:-
Email spam refers to sending multiple emails to millions of users.It is a way too similar to chain letter.
Sending malicious and harmful code through an email:-
Some emails contain attachment or links which when visited can corrupt our system as these things are purely harmful and malicious software codes such as Trojans, Viruses etc.
3. Another aspect is known as phishing where in fake email messages are sent in order to get the personal information from the intended internet users.
4. Some miscreates also disrupt an identity of a targeted individual.
5. It also aims at spreading hate and provocation of terrorism.
Thus it is mandatory to conclude that the terrorists use the Internet and also communication technologies in order to achieve their goals, broadcast their propaganda thereby recruiting new supporters and followers. As Internet does not disclose the identity of a person using it, it is a great advantage for such terrorists as they can spread the terror over internet anonymously. So certain laws should be put forth that can stop cyber terrorism as a whole and it should not be continued any further.