Characteristics of Cyber Terrorism

Characteristics of Cyber Terrorism
Following are the characteristics of Cyber Terrorism :
1. Minimal Resources Required
2. Anonymity
3. No Barriers
4. Enormous
5. Boundaryless
6. Wider Effect
7. Greater Potential
8. More Efficient

  1. Minimal Resources Required
    Cyber terrorism activities are less expensive to perform and less dangerous than traditional terrorist activities. Very few resources are required for committing cyber terrorism attacks.
  2. Anonymity
    Terrorists use online nicknames or log on to a website as an unidentified guest user, making it very hard for security agencies and police forces to track down the terrorist’s real identity.
  3. No Barriers
    In cyberspace, there are no borders to cross, no custom checkpoints, no customs agents and no identification checking. Cyber terrorists can perform their activities from any desired location as the Internet is available everywhere.
  4. Enormous
    The variety and number of targets are enormous. The cyberterrorist could target the computers and computer networks of government, individuals, public utilities, private airlines, etc.
  5. Boundaryless
    Cyberspace is boundary-less. The cyberterrorist can make an attack from a remote location or from multiple remote locations simultaneously. Cyber terrorism can be conducted remotely.
  6. Wider Effect
    Cyber terrorism has the potential to affect directly a larger number of people than traditional terrorist methods, thereby generating greater media coverage, which is ultimately what terrorists want.
  7. Greater Potential
    A. Attacks on electrical power systems, water supply systems, banking, and financial systems.
    B. Access hospital records and change patient blood types.
    C. Report stolen information to others.
  8. More Efficient
    Compared to other forms of terrorism, cyber terrorism is more efficient since it requires fewer people and fewer inputs. Also, cyber terrorists can act remotely and remain anonymous by using proxy servers and IP-change methods to hide their real address, making it difficult for government’s agents to trace and capture them.