Add news
March 2010 April 2010 May 2010 June 2010 July 2010
August 2010
September 2010 October 2010 November 2010 December 2010 January 2011 February 2011 March 2011 April 2011 May 2011 June 2011 July 2011 August 2011 September 2011 October 2011 November 2011 December 2011 January 2012 February 2012 March 2012 April 2012 May 2012 June 2012 July 2012 August 2012 September 2012 October 2012 November 2012 December 2012 January 2013 February 2013 March 2013 April 2013 May 2013 June 2013 July 2013 August 2013 September 2013 October 2013 November 2013 December 2013 January 2014 February 2014 March 2014 April 2014 May 2014 June 2014 July 2014 August 2014 September 2014 October 2014 November 2014 December 2014 January 2015 February 2015 March 2015 April 2015 May 2015 June 2015 July 2015 August 2015 September 2015 October 2015 November 2015 December 2015 January 2016 February 2016 March 2016 April 2016 May 2016 June 2016 July 2016 August 2016 September 2016 October 2016 November 2016 December 2016 January 2017 February 2017 March 2017 April 2017 May 2017 June 2017 July 2017 August 2017 September 2017 October 2017 November 2017 December 2017 January 2018 February 2018 March 2018 April 2018 May 2018 June 2018 July 2018 August 2018 September 2018 October 2018 November 2018 December 2018 January 2019 February 2019 March 2019 April 2019 May 2019 June 2019 July 2019 August 2019 September 2019 October 2019 November 2019 December 2019 January 2020 February 2020 March 2020 April 2020 May 2020 June 2020 July 2020 August 2020 September 2020 October 2020 November 2020 December 2020 January 2021 February 2021 March 2021 April 2021 May 2021 June 2021 July 2021 August 2021 September 2021 October 2021 November 2021 December 2021 January 2022 February 2022 March 2022 April 2022 May 2022 June 2022 July 2022 August 2022 September 2022 October 2022 November 2022 December 2022 January 2023 February 2023 March 2023 April 2023 May 2023 June 2023 July 2023 August 2023 September 2023 October 2023 November 2023 December 2023 January 2024 February 2024 March 2024 April 2024 May 2024 June 2024 July 2024 August 2024 September 2024 October 2024 November 2024 December 2024 January 2025 February 2025 March 2025 April 2025 May 2025 June 2025 July 2025 August 2025 September 2025 October 2025 November 2025 December 2025 January 2026 February 2026
1 2 3 4 5 6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
News Every Day |

Cyber Terrorism: A New Threat To World Security – OpEd

Introduction

Cyberterrorism is becoming a major danger to countries around the world. Today, everything like banks, hospitals, transport, and government systems depends on computers and the internet. Terrorists now use technologies to attack without using traditional weapons. They can hack important systems, steal information, spread fear, or shut down services from anywhere in the world. These attacks can shut down power grids, steal secret information, or spread fake news to confuse people. Cyberterrorism is especially dangerous because attackers can hide their identity and act from anywhere in the world, and also cause large-scale damage very quickly.

This abstract explains how cyberterrorism is rising as a major global threat and why governments must strengthen cybersecurity, work together, and protect their digital networks. To keep the world safe, we need trained experts, and strong international cooperation.

Cyberterrorism is a serious danger in today’s digital world. It means using computers and the internet to carry out attacks that cause harm or fear. In today’s digital era, almost all sectors-defence, finance, health, education, and communication—depend on technology. Thus, any large-scale cyberattack can paralyze a nation’s functioning. For example: Stealing secret information from the military, Sending fake messages to create panic among people, Hacking government or bank websites.

Real World Example: Cyber Attacks On Kudankulam Nuclear Unit (India)

The Nuclear Power Corporation of India (NPCIL) admitted to a malware attack on one of the computers in Kudankulam nuclear power plant, Tamil Nadu (India). The NPCIL admitted that computer systems at the Kudankulam nuclear power station had been infected with malware since early September 2019. The NPCIL infection is said to be caused by Dtrack. Dtrack is a Trojan virus that creates backdoors into computer networks. This was originally developed and commonly used by North Korean hackers with state backing. However, there are many variations of Dtrack, and the code may have been adapted by another group. Kudankulam is high on the list of such targets because it is both part of the nuclear programme, as well as the power grid.The Indian Computer Emergency Response Team (CERT-In) claims to be aware of these vulnerabilities. It is also reported to have issued advisories in many instances. However, its scope is limited as it is the responsibility of the organisation owning the asset to protect it.The linking of all the regional grids to the national grid makes it easier to supply power to any region on demand.

Understanding Cyber Terrorism

In today's world, prominent scholars Dorothy Denning (2000) define cyber terrorism as:

“Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks, and the information stored therein, when done to intimidate or coerce a government or its people in furtherance of political or social objectives.”

Cybercrime, cyber warfare, and cyberterrorism are different from each other based on who commits the act and why it is done. Cyber terrorism refers to the use of the internet and digital tools by terrorist groups to conduct attacks. These attacks aim to cause harm, fear, and disruption.Cyber warfare, on the other hand, is when one country uses computers and the internet to attack another country. These attacks can target government networks, military systems, or key industries. The goal is to weaken or confuse the other country without fighting on a battlefield. Cybercrime means a wide range of illegal activities conducted through computers and the internet, including hacking, data theft, and online fraud. These crimes can cause big money losses and create problems for many people and businesses.

Main features

  1. Attacks happen through computers and the internet: Cyberterrorists use computers, networks, and online tools instead of physical weapons. They attack things like websites, software, or online services.
  2. Attackers can hide easily: The internet makes it easy for cyberterrorists to hide who they really are. They can use fake names, special tools like VPNs, and different networks around the world to hide their real location.
  3. Used for propaganda: Terror groups also use the internet to Spread their messages, train people, Share harmful information.
  4. Target important systems:Cyberterrorists try to attack systems a country needs to function which is called critical infrastructure, to cause big problems, disrupt daily life, and create fear.
  5.  Uses weaknesses in computer systems: Cyberterrorists take advantage of weak passwords, old software, or security mistakes to break into systems.

Evolution and Growth of Cyber Terrorism: 

The evolution and growth of Cyberterrorism began as increasing global dependence on digital technologies. In its early stages during the 1990s, cyberterrorism was largely theoretical Researchers like Dorothy Denning(2000) noting that terrorist groups were beginning to explore the internet for communication, propaganda, and coordination. There were not many real cyberattacks then just early signs that terrorists were beginning to use the internet for their purposes. As digital infrastructure expanded, cyberterrorism became more dangerous.In the beginning, attackers mostly just changed the appearance of websites or sent threatening emails. But over time, they learned to do more serious things, like breaking into computer networks, stealing important information. By the 2000s and 2010s, extremist groups started using social media, secure messaging apps, and advanced hacking tools. They used these tools to spread their beliefs, find new members, and attack important systems like power grids, hospitals, and government networks. Today, the growth of cyberterrorism is fueled by global connectivity, Conflicts between countries (geopolitical tensions) also encourage more cyberattacks. At the same time, important services like hospitals, transport systems, and power supplies depend heavily on computers. This change has made cyberterrorism a major world problem, not just a small issue. Because it can affect many countries and important systems. In short, more connectivity, more tools, more conflicts, and weaker systems all help cyberterrorism grow today.

Global Examples of Cyber Terrorism   

One of the first well-known examples of cyberterrorism is the Stuxnet attack in 2010. In this attack, a very advanced computer virus was used to target Iran’s nuclear equipment, specifically the machines (centrifuges) that help enrich uranium. The virus caused the machines to break down, which slowed down Iran’s nuclear program. This attack showed that cyberattacks are not just about stealing information. They can also cause real-world physical damage. Another well-known example is the Sony Pictures hack in 2014. In this case, hackers, believed to be from North Korea, used a computer virus (malware) to break into Sony’s computer systems. They stole secret information, leaked private emails, and caused serious problems for the company’s daily work. This attack shows that cyberterrorism can be used to scare or pressure people and organizations for political reasons. In 2016, hackers attacked Bangladesh Bank, the country’s central bank, and stole $81 million. They did this by taking advantage of weaknesses in the SWIFTfinancial system, which banks use to send money internationally. This event shows that cyberterrorism can also target money and financial systems. Between 2014 and 2017, ISIS used the internet to recruit members and spread extremist messages, showing that cyberterrorism can also target people’s minds, not just systems. These examples show that cyberterrorism can be done by governments, extremist groups, or for money, and it can cause harm to people, money, or society’s safety.

International and National Responses

The United Nations (UN) works to help countries cooperate and work together to prevent cybercrimes and cyberterrorism. One of its groups, called the Group of Governmental Experts (GGE), suggests rules and guidelines for how countries should behave responsibly in cyberspace to avoid conflicts or attacks.

The International Telecommunication Union (ITU) helps countries improve their cybersecurity by giving technical advice, training programs, and support for coordinating responses to cyberattacks and cyber threats.

India created the Indian Computer Emergency Response Team (CERT-IN) to find, stop, and respond to cyberattacks, including attacks related to terrorism. CERT-IN helps protect government, businesses, and citizens from cyber threats.

United States also Established Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA) to protect critical infrastructure and coordinate responses to cyber threats. Many countries have plans and strategies for cybersecurity, special police or government teams to fight cybercrime, and work together with other countries to prevent and respond to cyberterrorism.

Challenges in Combating Cyber Terrorism

Combating cyber terrorism is very challenging because it is not like traditional crime. Cyber terrorists can attack from anywhere in the world, which makes it hard for authorities to track them. They often use advanced technology to hide their identity.Lack of global consensus is also a problem, as there is no universal definition or legal framework for cyber terrorism. Rapid technological evolution makes it even harder, because technology changes faster than laws or institutions can adapt. Additionally, many countries face inadequate resources, such as skilled personnel and advanced tools, to prevent or respond to these attacks. All these factors make fighting cyber terrorism very difficult.

Future Dimensions of Cyberterrorism

The future of cyber terrorism is likely to become even more complex and dangerous. Artificial Intelligence (AI) could be used to launch automated attacks, create deepfakes, and spread misinformation quickly. Internet of Things (IoT) devices, like smart homes, cars, and other connected gadgets, can become new entry points for hackers. Hybrid warfare is another concern, where future conflicts may begin with digital attacks before any physical fighting takes place.

Strategies and Recommendations

To fight cyber terrorism, countries need to take several important steps. They should strengthen legal frameworks by updating laws.International cooperation is also essential, with countries sharing information, forming joint cyber teams, and agreeing on common rules.Capacity building is important too, by training cybersecurity experts and teaching digital safety in schools and colleges. Governments and technology companies must work together through public–private collaboration to detect threats early. Finally, promoting cyber awareness among the public through campaigns can teach people safe internet habits and how to identify fake news or online scams. All these steps together make it harder for cyber terrorists to succeed.

Conclusion

Cyberterrorism has become a serious and growing threat to global security. As world becomes more dependent on digital systems for communication, transportation, healthcare and national defence, the risks of cyberattacks increase. Cyberterrorists can use the internet to cause fear, steal information, disrupt important services, and damage economies. Many countries are still not fully prepared to handle these kinds of attacks. Governments and organizations must work together, improve their cybersecurity, and create stronger rules to protect people and systems.

In the end, cyberterrorism is a real challenge for the global community. To stay safe, we must take this threat seriously and build stronger defences, better policies, and build international cooperation. Only by working together can protect digital world and maintain global security.

Ria.city






Read also

CMC demolishes unauthorised structures in CDA

GOP resists call to “nationalize voting” — but Trump’s trying it anyway

NEW: Los Angeles Man Arrested For Sending Text Messages to Guthrie Family Asking For Bitcoin as Search Intensifies For Missing Matriarch

News, articles, comments, with a minute-by-minute update, now on Today24.pro

Today24.pro — latest news 24/7. You can add your news instantly now — here




Sports today


Новости тенниса


Спорт в России и мире


All sports news today





Sports in Russia today


Новости России


Russian.city



Губернаторы России









Путин в России и мире







Персональные новости
Russian.city





Friends of Today24

Музыкальные новости

Персональные новости