Cyber terrorism is the use of the Internet to carry out violent acts that cause or threaten to cause loss of life or major bodily harm in order to obtain political or ideological benefits through threats or intimidation. When terrorist activities include deliberate and large-scale destruction of computer networks, especially through computer viruses, computer worms, phishing, and other software and hardware methods and programming scripts. Cyber terrorism is a controversial term. Some authors have chosen a very narrow definition related to known destructive attacks on information systems deployed by terrorist organizations, with the main purpose of creating alarms, panic, or physical damage. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyber attack affects the perception of terrorist threats, even if it is not done in a violent way. According to some definitions, it can be difficult to distinguish which cases of online activity is cyber terrorism or cybercrime.
Cyber terrorism may have a large overlap with cyber crime, cyber war or ordinary terrorism. If cyber terrorism is treated in a similar way to traditional terrorism, then it only includes attacks that threaten property or life. It can be defined as the use of targeted computers and information, especially through the Internet, to cause physical, real world or serious injury and in Infrastructure disruption. Many scholars and researchers who specialize in terrorism research believe that cyber terrorism does not exist. It is actually a problem of hacker attacks or information warfare. They disagreed with labelling it as terrorism, because considering current attack and protection techniques, people who use electronic means are unlikely to experience fear, major physical harm, or death.
Examples of cyber terrorism
- The cyber terrorists from all over the world could try to access the signals from the military forces so that they can easily attack.
- The foreign governments may appoint the hackers so that they can spy on us and when they find the location they can attack to the troops
There are some factors that contribute to the increment of cyber terrorism as we know thaw advancement of technologies helps a lot in growing of the cyber terrorism though these advancements helps the people in growing but because of it lot of terrorism increases some of the factors are given below-
- Cheap expenses
- Internet convenience
- Internet anonymity
- Low threshold
- Abuse of global information infrastructure
- Cyberspace without borders
- Limited legal jurisdiction
- Gaps in cyber security systems
- Extensive cyberspace
- Outdated security tools
So government introduced the punishments for the cyber terrorism so that it reduces the increment of cyber terrorism. In India, the Information Technology Act 2000 defines and stipulates penalties for cyber terrorism. It was after the 11/26 Mumbai terrorist attacks that shocked the country that the law was revised in 2008 to address the threat of cyber terrorism to national security. Therefore, section 66F was inserted into the TI Act, which is our closest approach to the Cyber Terrorism Act.
In order to protect oneself from such attacks and to deal with the threats of cyber terrorism to national security, the Indian government needs to ensure that cyber security systems are up-to-date and fully capable of defending against them. As time goes by, more and more anti-national teams are transferring their business to the Internet, so it is very important for people and the government to stay vigilant and work hard to improve the security and reliability of the database.
I have always been against Glorifying Over Work and therefore, in the year 2021, I have decided to launch this campaign “Balancing Life”and talk about this wrong practice, that we have been following since last few years. I will be talking to and interviewing around 1 lakh people in the coming 2021 and publish their interview regarding their opinion on glamourising Over Work.
If you are interested in participating in the same, do let me know.
The copyright of this Article belongs exclusively to Ms. Aishwarya Sandeep. Reproduction of the same, without permission will amount to Copyright Infringement. Appropriate Legal Action under the Indian Laws will be taken.
If you would also like to contribute to my website, then do share your articles or poems at email@example.com
We also have a Facebook Group Restarter Moms for Mothers or Women who would like to rejoin their careers post a career break or women who are enterpreneurs.
We are also running a series Inspirational Women from January 2021 to March 31,2021, featuring around 1000 stories about Indian Women, who changed the world. #choosetochallenge