Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

critique discussion below in 100-200 words

critique discussion below in 100-200 words

critique discussion below in 100-200 words

Question Description

Cyber terrorism is the modern-day terrorism attacks. This type ofterrorism comes in many different forms such as malicious attempts todisrupt or damage a computer system, network, and access files. It couldalso include attempting to infiltrate and steal data (SecureWorks,2017). There are different areas of cyber terrorism that go as targetedand untargeted. Different attacks that the firm should be aware ofinclude:

  • Phishing – Through malicious links usually sent by emails.
  • Watering Hole – Where there is a fake webpage that attacks visitors that go onto it.
  • Ransomware – This infects a system by encrypting files and locking user access to these systems.
  • Scanning – This is where they can test for vulnerabilities.
  • Spear-Phishing- This is where a phishing attack is directed towards a specific person.
  • DistributedDenial of Service – This deploys a mass amount of packet requestsusually from a botnet to overload a system and prevents regular accessby real users.
  • Supply chain – Attacks an element of an organization before it arrives.
  • Zero-day – Bespokes the exploitation of a system that has specific vulnerabilities that the author does not know about.

Manyacts of terrorism are often synonymous with acts of cybercrime and thisalso means they attacks can be implemented by terrorists and or byregular cybercriminals. Cyber terrorism is one of the fastest-growingthreats that doesn’t only target individuals, but it’s also targetingprivate and public organizations and nations as a whole! Prevention ispossible with gathering preliminary reconnaissance on potential threatswhile managing current threats (Littlefield, 2017). Cybersecurityprofessionals need to be able to be prepared for imminent threats thatcould be acts of terrorism. This organization needs to be able to answerquestions such as 1. What do we foresee terrorists wanting to do incyberspace? 2. How can we prevent these actions? 3. How can we beproactive against these actions?

Terroristslook to utilize cyberspace in order to support their motivation,whether that be their religious, social, cultural, political, oreconomic beliefs. Attacking critical infrastructures and services insociety and utilizing cyberspace to inflict harm to others (Littlefield,2017). In addition to this, it’s also important to state that cyberterrorists may also employ cyberspace not only to cause harm but also tofacilitate their activities, including the likes of laundering offinances, encrypted communications, recruitment, and promotion of theiractivities. A valuable method of developing prevention againstcyber-terrorist threats before they could happen is by implementingsecurity as one of the integral parts of development in software anddevices. When discussing prevention methods against cyber terrorism asappose to that of cybercrime, the methods must be considered differentlydue to the perspective of the attacker (Littlefield, 2017).

Specifically,when it comes to cyber-terrorist hitting the financial industry intoday’s time they are faced with highly motivated criminals looking tomake financial gains. From 2017-2018 these criminals were able togenerate billions of dollars worth of profits and causing grosses lossesto reach over $1 trillion to the markets because of their attacks(Intsights, 2018). Their attempts at targeting these banks comes fromgoing after major bank transfer platforms, phishing emails, phishingwebsites that trick users into giving up their credentials, fake mobileapplications, mobile malware, ATM scamming methods, Point of Saleattacks, and attacks against e-banking interfaces. Bank account logins,financial information, IP addresses, domain names, and any otherfinancial record are considered valuable details that can be used by thecybercriminal (Intsights, 2018). Leaked banking information has had a135% increase in financial data that was being sold on the dark webblack markets. On average that is 3.8 incidents per week per bank.

Althoughthe possibilities for cyber-terrorist to make an impact is at largethere are recommendations for reducing the chances of being victimizedbut these groups of people such as using threat intelligence to take aproactive approach to our security program, evaluate risks and not justcompliance to increase security, leverage automation tools, trackthreats, and never underestimate the power of cybersecurity training(Intsights, 2018).

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20