Updated: Nov 2, 2020
Author: Mauli Bisen
With development comes disaster. it's an ageold ritual, when the human world burgeons they're exposed to hidden shortcomings that nobody in their right mind could have thought. Cyber terrorism being that element that the people of 21st century aren't conscious of. it's a risk since the arrival of the web. alongside the event of technology cyber terrorism is additionally growing at a rapid. Cyber terrorism has become popular in past few years, especially with the rapidly growing technology and therefore the increasing dependence of the humanity on the web and social media. this text focuses on how technological advance and development in internet has become a replacement weapon of destruction for terrorism.
HISTORY The act of terrorism is one among the foremost concerning and important area of security for nearly countries. Terrorism features a history of quite two thousand years and go back to 48AD were by the jurist resistance group administered attacks against the Romans. This campaign involved the infiltration of Roman cities to assassinate and kidnap jurist collaborators and Roman soldiers. the fashionable concept of terrorism emerged from French Revolution 1789 it had been referred to as Reign of terror in France .In present scenario it's been highlighted by various agencies nations Iran ,Iraq ,Sudan etc. are known to possess supported terrorist organisation. Many of those terrorist organization seek to inflict harm in many various forms both Physically and digitally and as there's advancement in technology the danger of cyber terrorism is rapidly increasing .The first characterized act of Cyber Terrorism identified by the intelligence authority was in 1998 by the LTTE when almost 200 emails each day were send to varied embassies in Sri Lanka .In 2002 an investigation by the japanese Government discovered that a terrorist organisation called shinrokyo has been using dedicated software to launch DEDOS against the japanese government.
INTRODUCTION There are often an outsized amount of confusion on what cyber Terrorism is and more specifically it's an act of terrorism with the assistance of electronic means of communication i.e. the web and modern means of communication. The internet allow a huge exchange of data .Thus, it's created a cyberspace during which both criminal terrorist can implement attacks with communication platform. there's also an idea of hack which is an application of hacking technique use of data Technology targets to cause damage or disturb normal operations. Cyber terrorism is agreeable option for terrorist because it is cheaper, more unnamed, action is difficult to trace and physical presence isn't required.
METHODS OF ATTACKS The most popular weapon in cyber Terrorism is that the use of computer viruses and worms .That is why it’s is additionally known computer terrorism. Classified into three categories: Physical Attack -The computer architecture is broken by using prevalent methods like bombs, fire etc. Syntactic Attack – the pc architecture is broken by modifying the logic of the system so as to introduce delay or make the system which can’t be determined. Semantic Attack – During the attack the knowledge keyed within the system during entering and exiting the system is modified without the user’s knowledge and causes error.
DEVICE OF CYBER TERRORISM Hacking – the foremost popular method employed by a terrorist. It is a generic term used for any quite unauthorised access to a network of computers. Trojans– programmes which pretend to try to one thing while actually they're meant for doing something different, sort of a wooden computer virus of the 12 century BC. Computer viruses– it's a program, which infects other computer programmes by modifying them. They spread in no time . Denial of service– these attacks are aimed toward denying authorised persons access to a computer or computer networks.
FORMS OF CYBER TERRORISM 1. Privacy violation– Individual privacy is violated with various cyber-attacks within the world like various hackers attempt to hack various social media accounts like Facebook, Twitter etc. as private information is leaked to the planet and disputes it’s privacy . 2. Secret information appropriate and data theft – The information technology are often misused for appropriating the precious Government secrets and data of personal individuals and therefore the Government and its agencies .A network owned by the govt contains valuable information concerning defence and other top secret. Example- Access or services to such computer, computing system or network . 3.Distributed denial services of attack – The cyber terrorist can also use the tactic of distributed denial of services (DDOS) to overburden the govt and its agencies electronic bases .This is made possible by first inflecting crucial unprotected computer by way of virus attacks and taking control on them .Once the control is obtained than can manipulated from anywhere.
PUNISHMENT “Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which can reach imprisonment for life” under Section 55 of Indian legal code and also under Section 66 of Information Technology Act.
CASE STUDY In Mumbai Attack Ten Pakistani men associated with the phobia cluster terrorist organization stormed buildings in Bombay, killing 164 individuals and 9 of the gunmen were killed. Throughout the attacks, one survived. Mohammed Ajmal Kasab, the lone living gunman, was dead in November 2012.They travelled from Karachi, Pakistan to Bombay via boat. On the way, they hijacked a fishing trawler and killed four crew members, throwing their bodies overboard. They conjointly slit the captain’s throat. The terrorists docked at the Bombay district on the brink of the entryway of the Republic of India monument. They hijacked cars, along side a police van , and split into a minimum of three teams to carry out the attacks, in step with police. The attackers used automatic weapons and grenades. Further, in another leading case, in December, 2010 the web site of the Central Bureau of Investigation (CBI) was hacked by the programmes identifying themselves as “Pakistani cyber army” Existing Cyber Security Initiative National Information Centre (NIC): It’s a corporation providing network backbone and e-governance support to the Central Govt., State Govt., Indian territories, districts and Govt. bodies. Indian Computer Emergency Response Team (CERT-IN): it's the foremost important organization in India’s cyber community initiative groups. Its mandate states that to make sure security of cyberspace during a country by enhancing the safety communication and knowledge infrastructure. National Information Security Assurance Program (NISAP): this is often for Govt. and important infrastructures. This Govt. organization used security policy and created some extent of contact for the govt. and important infrastructure. this is often a Governmental organization created by CERT-IN.
INFORMATION TECHNOLOGY ACT The salient provisions of the IT Act in relevancy preventing cyber act of terrorism are: Section 66F of the IT Act describe cyber act of terrorism. This Section has been introduced by means of modification to the Act within the year 2008. This modification was the results of the notorious 26/11 terror attack in Asian country . The terrorists, during this case, created use of the communication services to help the terrorists United Nations agency dispensed a series of twelve shooting attacks throughout the town of metropolis. This tragedy might be a classic example of act of terrorism mistreatment the cyber network. This Section conjointly prescribes the group action for people that commit or conspire to commit cyber act of terrorism. according to the Section, such folks shall be punishable with imprisonment which may reach imprisonment for keep. CONCLUSION In war it's not necessary that one uses weapons like Ak47 or combat vehicles, sometimes weapons might be weightless and invisible like viruses or Trojans rather than fighter jets or missiles. Cyber terrorism isn't just an attack or movement against one government it’s a War where we don’t follow traditional tactics to fight them. we'd like future advanced Strategies to fight them with iron clad firewalls. An unified approach with political, judicial and administrative cooperation may be a vital requirement to fight this new sort of terrorismR.