Combating terrorism information has become not only an important matter
of policy, but also, and perhaps above all, the problem of economic nature. Cyberterrorist can also adjust their activities in order to maximize the positive
outcome for themselves. In addition, cyberterrorism does not require physical
training or high security logistics. There also requires travel. Cyberterrorism is
not a separate or specific type of terrorism because of ideology. It serves exactly
the same purpose as bombings, kidnapping or hostage taking. There are only
a form − using computer hardware and software.
Cyberattacks do not pose a risk of death or physical injury, reduce the need for
so risking life − attacks on the network do not require for suicide attacks. To
carry out such an attack, you do not need to have virtually no skill − you can
rent a cracker who broke security (often without realizing the consequences of
his actions) money will carry out a terrorist attack.
Past examples of cyber crimes show how a large number of people may be affected by the consequences of such action; this is due to the global nature of
computerization. Thus one of the essential objectives of terrorists − mediality attack − is huge. A separate issue is the use of the Internet and computers
by terrorists for purposes other than direct attacks. Computer systems are
a great collection and exchange of information and communication. They provide anonymity, allow coding or hiding information. Transfers can be hidden do
not raise suspicions text files or graphics.
REFERENCES(31)
1.
Adamski J. (2007). Nowe technologie w służbie terrorystów. Warszawa.
Denning D.E. (2001). Activism, hacktivism and cyberterrorism: The Internet as a tool for influencing foreign policy, [w:] J. Arquilla, D. Ronfeldt, Networks and Netwars, Santa Monica.
Monge P., Janet F., Communication technology for global network organizations, [w:] Shaping Organizational Form: Communication, Connection and Community, red. G. Desanctis, J. Fulk, Thousand Oaks, Calif., 1999.
Garrison J., Grand M., Cyberterrorism: An evolving concept, NIPC Highlights, http://www.nipc.gov/publicatio... highlight-01-06.html [data dostępu: 15.06.2012].
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.