Friday, April 12, 2019
What Cyber Events Could Really Cause Terror in the Australian Essay Example for Free
What Cyber Events Could Really Cause Terror in the Australian essayIn general terms, cyber events, such as cyber attacks or terrorism is defined as any work on intended to damage computer networks, which mainly affects the operation of various infrastructure such as bloodline transport and security logistics. The increasingly high growth rate of cyber crimes has drawn the attention of the public ambit and the media. This is because the potential damages, which earth-closet be brought by cyber crimes, have far reaching consequences to the government and the whole macrocosm of any given country. This paper is written to discuss the cyber events which could cause terror in the Australian population.The array defense system in Australia is well equipped to defend the nation against any external assault. If the forces communication and other defense logistics where to be hacked or attacked through cyber events, this would mean a security holy terror to the nations population . Take for instance a situation where the Australian cyber space is invaded and remotely controlled by enemies, this would invade not only the national security but also breach individuals privacy, a factor which would cause public outcry. Still to be noted here is the security threats imposed by cyber terrorism in the business and government information systems.Cyber events targeted at business institutions such as the banking sector would inform fear to investors. This would not only affect the banking sector but also all businesses, whether small, medium or large businesses. A good example of the governments information system attack is the novel attack of the peak ministers website. The website was accessed after the governments internet filtering legislation was attacked. It followed that the prime ministers website was overloaded by information requests and loaded with pornography. In this context, such cyber events threaten the national security and can amount to terroris m.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.