WE WRITE CUSTOM ACADEMIC PAPERS

100% Original, Plagiarism Free, Tailored to your instructions

Order Now!

Q2. Cyber Threat; a Mechanism or a Medium?

Introduction
            Questions linger as to if the greater cyber threat is as a mechanism or a medium. Looked at from different perspectives, different schools of thought may defend different interpretations. One may for instance claim that since the threat posed by cyber attacks does not result in physical casualties then it can not be classified as a mechanism but as a medium. In this paper, this notion will be challenged by looking at cyber threat as a mechanism.
Cyber threat; the Mechanism
Cyber threat in a greater context is a mechanism not a medium. By assessing the use of cybercrime as an attack against infrastructure, it would then be right to say that like other terrorism attacks, this too is one of the mechanisms adopted by terrorists to cause havoc. The result of these attacks includes communication disruptions, power outages, systems crushing and flight delays among others. The impact of these results can be used to determine the effects of this mode of terrorism. The strategy to use cyber attacks is mainly to cripple operations of the target sector and not cause physical damage. As such, the threat magnitude is not as elaborate as that causing physical damage since upon a hacker penetrating a system, the target usually responds by increasing protection of the system from more attacks. The mechanism may achieve a considerable success at first but the attacker would require adoption of more advanced tactics to successfully launch another attack (Lewis, 2002).
Apart from targeting economic activities of a country, the cyber attacks could be used against military activities. The use of the computer systems could have a major implication on warfare and other military operations. Operations based on information networking could suffer a set back if the enemy accesses such data. In todays’ technologically advanced operations, the use of computer based data platforms has taken center stage. Most systems of this nature are however strongly protected from external threat penetration. This does not however rule out the possibility of cyber weapons being employed to dismantle such systems. Hacking of computer systems in the Department of Defense in America is rampant though it has never been reported as to whether; this menace has had any deleterious impact on the military capabilities (Lewis, 2002)..
The threat of cyber attacks is not necessarily focused on security installations and economically viable targets alone. The terror groups could use the avenue to hack into financial systems and acquire data or credit card numbers that could be used to acquire funds to finance their programs. Fears have been expressed by experts that terrorist groups such as the Al Qaeda could use the cyber attacks to cause a disruption in the flow of emergency services as reinforcement to launching a physical attack. Due to the security measures placed on vital installations by nations vulnerable to terror attacks, the cyber threat posed by terrorists would nowadays probably entail the use of internet to collect information about a potential target. The information would then be used to plan and launch a physical attack which terror groups such as Al Qaeda believe is the most appropriate technique to induce terror and fright in their opponents (Lewis, 2002).
Conclusion
            The threat posed by cyber attacks can not be ignored as it is clearly evident that as any other mechanisms adopted by terrorists, cyber threat can result in considerable security and economic damages.

Our Service Charter

  1. Excellent Quality / 100% Plagiarism-Free

    We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
  2. Free Revisions

    We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
  3. Confidentiality / 100% No Disclosure

    We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
  4. Money Back Guarantee

    If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
  5. 24/7 Customer Support

    We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.

Excellent Quality
Zero Plagiarism
Expert Writers

Instant Quote

Subject:
Type:
Pages/Words:
Single spaced
approx 275 words per page
Urgency (Less urgent, less costly):
Level:
Currency:
Total Cost: NaN

Get 10% Off on your 1st order!