Elements of Cyber terrorism

Cyber act of terrorism has many distinct characteristics. These characteristics help to raised differentiate the fine line between a cyber-terror attack versus a cyber attack or activities of a hacker. Cyber act of terrorism can and will show the following signs:Attack has associate degree objective to destroy or injury specific targets like political, economic, energy, civil and military infrastructures, Attack could even target specific opposing non-secular group’s information infrastructures to insight non-secular bedlam , the aim of any attack is to form worry of the group’s intentions and add their own political agenda or goals or gain fellowship by succeeding in their attacks, Destroy the enemy’s capabilities to additional operate or operate among their own arena, Persuade others to believe that the victim or victims are vulnerable and their stability negligent, produce increased loyalty and pride among the cluster supported their successes.

Historically, hostile cyber activity within the monetary services sector has involved criminal gangs targeting retail bank platforms during a bid to steal client funds. progressively, these gangs have looked to focus on exchanges with a read to manipulating markets and taking advantage of wild swings within the value of securities. In May, a significant Distributed Denial of Service attack was with success quenched by protection service that provides Prolexic. The target was a anonymous  monetary exchange platform, and therefore the motive of the attack was market manipulation, according to someone getting ready to Prolexic. Recent trends on the net and attacks shows that politically driven ‘hactivists’ like anonymous became a lot of active. The protests they attempt for the most part take the shape of disrupting on-line services.

Exchanges have become seen as ‘fair game’ for attacks among these teams, in keeping with author Bonner, a partner in KPMG’s info Protection and Business Resilience practice. He said that Radical environmentalists or human rights teams tend to not target company, however the businesses or infrastructure that support them, like exchanges. State-sponsored cyber terrorists also are acknowledged to get on the increase and are attacking ‘iconic’ items of market infrastructure like exchanges. Last year, Israel’s Tel Aviv securities market was attacked by pro-Palestinian laptop hackers and this offensive discontinuous  the exchange’s web site. Saudi hacking cluster “Nightmare” claimed responsibility for this cyber attack, it came during a amount of heightened political tension within the region.

The economy of the monetary sector will leave several former staff with associate degree axe to grind, except for market infrastructure suppliers it will have dramatic consequences.  He recommended that exchanges review the e-mail history of all technology leavers in the amount up to their departure. In November 2010, the London Stock Exchange issued a press release that a 127 minute mercantilism outage on its Turquoise platform was caused by ‘human error which will have occurred in suspicious circumstances’. However, following a full internal investigation, the incident was found to be simply the results of human error.

Reference:

http://Romaniuk, S. (2019). Terrorism, Deterrence, and the Search for Security in an Era of Violent Extremism. Terrorism and Political Violence, 31(3), pp.632-638.

http://France, T., Yen, D., Wang, J. and Chang, C. (2002). Integrating search engines with data mining for customer‐oriented information search. Information Management & Computer Security, 10(5), pp.242-254.

Aishwarya Says:

I have always been against Glorifying Over Work and therefore, in the year 2021, I have decided to launch this campaign “Balancing Life”and talk about this wrong practice, that we have been following since last few years. I will be talking to and interviewing around 1 lakh people in the coming 2021 and publish their interview regarding their opinion on glamourising Over Work.

IF YOU ARE INTERESTED IN PARTICIPATING IN THE SAME, DO LET ME KNOW.

Do follow me on FacebookTwitter  Youtube and Instagram.

The copyright of this Article belongs exclusively to Ms. Aishwarya Sandeep. Reproduction of the same, without permission will amount to Copyright Infringement. Appropriate Legal Action under the Indian Laws will be taken.

If you would also like to contribute to my website, then do share your articles or poems at secondinnings.hr@gmail.com

In the year 2021, we wrote about 1000 Inspirational Women In India, in the year 2022, we would be featuring 5000 Start Up Stories.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.