The Future of Cyber Terrorism: Where the Physical and Virtual Worlds Converge
Journal Title: International Journal of Scientific Research and Management - Year 2016, Vol 4, Issue 9
Abstract
Cyber Terrorism attacks us at the point at which the "physical world" and "virtual world" converge. The "physical world" is physical matter that is seen, touched, and inge sted every day. The "virtual world" is symbolic, that place in which computer programs function and data moves. Increasingly, people's experience of the physical world is dependent on the operations of the virtual world. This dependence and intersection of the physical world and the virtual world make masses of people vulnerable to the Cyber Terrorist. A Cyber Terrorist could remotely access the processing control systems of a cereal manufacturer to sicken and kill the children of a nation. A Cyber Terroris t could place computerized bombs around a city, all simultaneously transmitting unique numeric patterns, each bomb receiving each other's pattern, so if one bomb stops transmitting, all bombs detonate simultaneously. A Cyber Terrorist could disrupt interna tional financial transactions, undermine air traffic control systems, alter the formulas of medication at pharmaceutical manufacturers, and sabotage utility systems. As young, educated people are brought into the folds of terrorist groups, this new generat ion will have the talent to execute the acts of Cyber Terrorism. Countering Cyber Terrorism requires increased cooperation and the sharing of intelligence among those responsible for the security of our virtual world. Counter - terrorism experts must be thos e individuals who understand the weapons being faced and have experience in fighting wars where the physical and virtual worlds meet
Authors and Affiliations
Sukhmani Dhaliwal
Implementation of Adaptive Equalizer using FPGA
The quality of transmitted channel is deteriorated by channel imperfections. This results in high bit error rate at the recei ver which in turn makes recovering the original signal difficult. Channel response is dynamic...
A View on providing anonymicity using top - down specialization on Cloud and Big Data by applying Parallelization
A large number of cloud services require users to share private data for data analysis or mining, bringing privacy concerns. So anonymizing of data sets via generalization is done to satisfy certain privacy...
Determinants Of Investment Decision Making Among Kenya Ferry Services Employees
Purpose of this study was to investigate the determinants of investme nt decision making among the employees of Kenya Ferry Services (KFS). The objective of this research is therefore to establish the determinants of in...
A Review Analysis of Parametric Optimization Based Studies in VANET
The field of Vehicular Ad Hoc Networks (VANET) is generally not particularly new to researchers around the w orld. Because of this fact, there is loads of material accessible for VANET to survey. The routing protocols...
A Study on relationship between Workplace Fun culture and Job Satisfaction among IT Professionals
A work environment is made up of a range of factors, including company culture, management st yles, hierarchies and human resources policies. Employee satisfaction is the degree to which emplo...