Defending against the new terrorism

It is unquestionable that cyber terrorism is gaining widespread attention nowadays due to the increasing amount of coverage being given to the subject by the media and other institutions especially those from the public and private sectors (Bosch, O.2003).

The problem when defending against cyber terrorism attacks is there are no universal safeguards. There are still major disagreements on what cyber terrorism is. Truthfully there are no factual rules that will prevent cyber terrorism from occurring; however there are some steps which can prevent and reduce the risks of potential attacks occurring.

Develop Best Security Practices

Organisations and other government agencies should ensure that they develop the best security procedures and measurements that are best suited to their own operations. Organisations should secure there information by security applications such as firewalls, intrusion detection systems and anti-virus software. Government agencies and other organisations which could come under cyber-attack should deploy both network and host based IDS (inspects all inbound and outbound network activity and identifies suspicious patterns). Along with technological software to reduce the chances of cyber- attacks there should also be personal assignment to monitor, record all suspicious activity (Jalil, S.2003).

Recovery Plans

It is essential that organisations that would be a central target for cyber terrorists to have in place recovery plans for all of the data they have virtually stored. These agenises should include incident response activities which should be rehearsed and tested regularly to safeguard the effectiveness (Jalil, S.2003).


Stricter Cyber Laws

An additional deference procedure which interestingly does not involve any technological hardware, however, requires assistance from the government is strengthening of cyber-criminal laws. The government can help in regulating cyber terrorism attacks by implementing and revising new cyber laws that will punish cyber terrorists more heavily if they have involved in terrorist activities (Jalil, S.2003).

Conversely, due to cyber terrorism being a relatively new form of criminal activity it makes the process of defending against cyber-attacks much harder. It is widely accepted in many government organisations that defending against cyber terrorism is not a one step process. Organisations will have to come to an understanding to why cyber-attacks are occurring and the effects it has on organisations and society to ever have a chance of protecting themselves from cyber terrorists.


Reference List


Bosch, O. (2003). Defending against cyber terrorism:. Cyber Terrorism. 1 (1), p10.

Jalil, S. (2003). Countering Cyber Terrorism Effectively. Cyber Terrorism. 1 (2), p45.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s