Cyber terrorism
Cyber terrorism an introduction ----------:
The September 11 , 2001, twin tower terrorist attacks in the US and the 26 November 2008 terrorist attack at India's Taj Hotel shook the entire world as the attacks were carried out against two large democratic countries, and both these attacks. Held Due to non-precaution. due to the negligence of the investigating agencies, and due to lack of preparation before the attack, the intelligence agency was so poor could not even guess the big attack!
- Cyber terrorism is done through internet as follows :
1 - Initially cyber terrorism is done by targeting the Internet!
2 --- Cyber-based terrorism is targeted at the physical world and the global world, which is done through virtual worlds!
- The definition of cyber terrorism ---:
Cyber terrorism is first defined by Mark Pollitt, according to him -
"Cyber Terrorism refers to a full-blown attack aimed at destroying the sovereignty, unity, integrity, of a country for a political religious frenzy through the Internet." It is like an unannounced and sporadic war , Which completely destroys the information system, and the security system, which is not easy to detect!
Types of cyber terrorism -----:
- Personal Cybercrime -------:
- Under which a person is targeted, it includes stealing data, stealing credit card information, hacking, sending threatening messages, etc.
- Crime against a country -----:
- This kind of terrorism is done to destroy the unity, integrity and sovereignty of a country, it is a kind of pseudo war that is done for any political and religious frenzy. The attack on the TwinTower America, and the Taj Hotel and the Parliament of India, was an example of cyber terrorism carried out through computers.
According to former CIA chief Wix Christo, internet service is so inexpensive and readily available that terrorists are proving to be a boon for terrorists, and terrorist organizations like Al Qaeda are making full use of it, al-Qaeda, a country in the technological sphere like the US If you are troubled by organizations like India, then India also needs to be careful with terrorist organizations like Mohammad and Lashkar-e-Taiba, also in India Alkayda Organizations such as terrorism wants to spread, are misusing social media for terrorist activities, Watsap many young men of Kashmir, and face had been arrested for involvement in organizations such as al-Qaeda through the book.
Cyber terrorism is the most spread through the website, in 2006 around 5733 websites were created which were used to send the message. The website is created in the following way.
- By encryption method
Through this technology, the message is sent to the message carrier by creating a website for a very long time, in which the source code of the private key is with the message carrier, due to which it is immediately closed by decoding the message, so the address for the investigating agency It is difficult to find where the message came from and what is its source code.
Other technology used by cyber terrorists .
- Dead drop method - - In this technique, the message is sent through e-mail. This message is based on a slogan picture, or theme, which is in the code word that is difficult to understand.
- Stenography ----------: In steno graphy technique, messages are written in the code world through pictures, slogans, pictures, etc., it is easily conveyed to the user.
- Other medium - - Nowadays social media has become a good medium for terrorists, through which messages are being delivered very easily. Terrorist activities are being conducted very easily through Facebook, WhatsApp Instagram, Twitter, and other social sites.
Sincerely.
Pradeep Kumar tiwari(advocate)
7879578306.
Cyber terrorism is first defined by Mark Pollitt, according to him -
"Cyber Terrorism refers to a full-blown attack aimed at destroying the sovereignty, unity, integrity, of a country for a political religious frenzy through the Internet." It is like an unannounced and sporadic war , Which completely destroys the information system, and the security system, which is not easy to detect!
Types of cyber terrorism -----:
- Personal Cybercrime -------:
- Under which a person is targeted, it includes stealing data, stealing credit card information, hacking, sending threatening messages, etc.
- Crime against a country -----:
- This kind of terrorism is done to destroy the unity, integrity and sovereignty of a country, it is a kind of pseudo war that is done for any political and religious frenzy. The attack on the TwinTower America, and the Taj Hotel and the Parliament of India, was an example of cyber terrorism carried out through computers.
According to former CIA chief Wix Christo, internet service is so inexpensive and readily available that terrorists are proving to be a boon for terrorists, and terrorist organizations like Al Qaeda are making full use of it, al-Qaeda, a country in the technological sphere like the US If you are troubled by organizations like India, then India also needs to be careful with terrorist organizations like Mohammad and Lashkar-e-Taiba, also in India Alkayda Organizations such as terrorism wants to spread, are misusing social media for terrorist activities, Watsap many young men of Kashmir, and face had been arrested for involvement in organizations such as al-Qaeda through the book.
Cyber terrorism is the most spread through the website, in 2006 around 5733 websites were created which were used to send the message. The website is created in the following way.
- By encryption method
Through this technology, the message is sent to the message carrier by creating a website for a very long time, in which the source code of the private key is with the message carrier, due to which it is immediately closed by decoding the message, so the address for the investigating agency It is difficult to find where the message came from and what is its source code.
Other technology used by cyber terrorists .
- Dead drop method - - In this technique, the message is sent through e-mail. This message is based on a slogan picture, or theme, which is in the code word that is difficult to understand.
- Stenography ----------: In steno graphy technique, messages are written in the code world through pictures, slogans, pictures, etc., it is easily conveyed to the user.
- Other medium - - Nowadays social media has become a good medium for terrorists, through which messages are being delivered very easily. Terrorist activities are being conducted very easily through Facebook, WhatsApp Instagram, Twitter, and other social sites.
Sincerely.
Pradeep Kumar tiwari(advocate)
7879578306.