Cyber Security

7 Various Stages of a Cyber Attack
7 Various Stages of a Cyber Attack

7 Various Stages of a Cyber Attack:- Cyber attacks can range from installing Spyware on a computer to attempt to destroy the infrastructure of entire nations. 7 Various Stages of a Cyber Attack Following are the various stages of a cyber attack : 1. Reconnaissance 2. Weaponization 3. Delivery 4. Exploitation 5. Installation 6. Command and […]

cybercrime
What is Cybercrime?

Cybercrime refers to the technology-driven crimes that involve computer network for gaining unauthorized access. The term cybercrime is used to describe an unlawful activity in which computer or computing devices such as a smartphone, tablets Personal Digital Assistants (PDAs), etc. which are stand-alone or a part of a network are used as a tool or […]

Economic Consequences of Cyber Terrorism
Economic Consequences of Cyber Terrorism

Misuse of Information Technology in Cyber Terrorism Cyber terrorists misuse information technology, i.e., computers, data communications, hardware, software, peripherals, database, networks, and other devices as weapons for spreading cyber terrorism. Today, almost every sector of critical infrastructure is networked through computer systems and networks. All the sectors are accessible through the Internet and with the […]

terrorist atrocities
Terrorist Atrocities

Dictionary meaning of atrocity is: “An extremely cruel, violent or shocking act”. Terrorist atrocities are activities that involve inhumanity, barbarity or even extreme violence. The fear generated by the realization that nearly any member of the target population could be a victim. Specific terrorist actions within terrorism campaigns, or aim at: Creating threats. Encouraging public […]

Role of Information Technology for Terrorists
Role of Information Technology for Terrorists

Role of Information Technology for Terrorists Information technology includes computers, hardware, software, data communications, telecommunications, database, peripherals networks, and other devices. The reliance of all the sectors of critical infrastructure on the IT sector for information creates an opportunity for cyber terrorism. The following points explain the role of Information technology for terrorists in cyber […]

types of cyber terrorism
Types of Cyber Terrorism – Privacy Violation

Types of Cyber Terrorism Following are the various Types of Cyber Terrorism : 1. Privacy Violation 2. Secret Information Appropriation and Data Theft 3. Demolition of e-Governance Base The aim of e-governance is to make the interaction of the citizens with the government offices hassle free and to share information in a free and transparent […]

cyber-wars-and-cyber-terrorism-6-728
Characteristics of Cyber Terrorism

Characteristics of Cyber Terrorism Following are the characteristics of Cyber Terrorism : 1. Minimal Resources Required 2. Anonymity 3. No Barriers 4. Enormous 5. Boundaryless 6. Wider Effect 7. Greater Potential 8. More Efficient Minimal Resources Required Cyber terrorism activities are less expensive to perform and less dangerous than traditional terrorist activities. Very few resources […]

What is cyber terrorism?
What is Cyber Terrorism? Factors of Cyber Terrorism

Cyber terrorism denotes unlawful attacks and threats of attack against, computers, networks, and information stored therein to intimidate or coerce a government or its people for propagating hidden political or unlawful social and religious agendas. What is Cyber Terrorism? Cyber terrorism is simply the use of computers and the Internet connectivity between them in order […]

global information infrastructure
What is Global Information Infrastructure – GII

Global Information Infrastructure (GII) can be defined as a seamless web of interactive communications being deployed at a world-wide level to provide the infrastructure for new services and activities based on the strategic use of all types information. Global Information Infrastructure refers to; the proposed worldwide infrastructure of governmental and non-governmental telecommunications and information technology […]