Seminartopics.in

IT Seminar Topics >> Cyberterrorism
 

 

Cyberterrorism is a new terrorist tactic that makes use of information systems or digital technology, especially the Internet, as either an instrument or a target. As the Internet becomes more a way of life with us,it is becoming easier for its users to become targets of the cyberterrorists. The number of areas in which cyberterrorists could strike is frightening, to say the least. The difference between the conventional approaches of terrorism and new methods is primarily that it is possible to affect a large multitude of people with minimum resources on the terrorist's side, with no danger to him at all. We also glimpse into the reasons that caused terrorists to look towards the Web, and why the Internet is such an attractive alternative to them. The growth of Information Technology has led to the development of this dangerous web of terror, for cyberterrorists could wreak maximum havoc within a small time span. Various situations that can be viewed as acts of cyberterrorism have also been covered.

Banks are the most likely places to receive threats, but it cannot be said that any establishment is beyond attack. Tips by which we can protect ourselves from cyberterrorism have also been covered which can reduce problems created by the cyberterrorist.We, as the Information Technology people of tomorrow need to study and understand the weaknesses of existing systems, and figure out ways of ensuring the world's safety from cyberterrorists. A number of issues here are ethical, in the sense that computing technology is now available to the whole world, but if this gift is used wrongly, the consequences could be disastrous. It is important that we understand and mitigate cyberterrorism for the benefit of society, try to curtail its growth, so that we can heal the present, and live the future…




|

|

|

|

|

|

|

|

|

|

|

|

|

|

|

You may also like this :

Dynamic Memory Allocation
Dynamic Synchronous Transfer Mode
Dynamic Virtual Private Network
Dynamically Reconfigurability Computing
Earth Simulator
EDGE
Elastic Quotas
Ethernet Passive Optical Network
Extreme Programming (XP)
Fiber Distributed Data Interface
Firewalls
Free Space Laser Communications
Freenet
Wine
Virtual Storage Access Method
Trojan Horse
Team Viewer
Tablet Personal Computer
Surface Computer
Streaming Media
SCADA
SAP R/3 Architecture
Redtacton
Portable Microcomputer-Based Instruments
Pico Projectors
Multirate Signal Processing Techniques MRSP
Multicast Security
MongoDB
Mobile Number Portability
HVDC Light

 

 
<< Back to Topics Page
Copyright © 2012 www.seminartopics.in      Contact us: seminar990@gmail.com