Добавить новость
ru24.net
News in English
Февраль
2026
1 2 3 4 5 6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28

Cyber Terrorism: A New Threat To World Security – OpEd

0

Introduction

Cyberterrorism is becoming a major danger to countries around the world. Today, everything like banks, hospitals, transport, and government systems depends on computers and the internet. Terrorists now use technologies to attack without using traditional weapons. They can hack important systems, steal information, spread fear, or shut down services from anywhere in the world. These attacks can shut down power grids, steal secret information, or spread fake news to confuse people. Cyberterrorism is especially dangerous because attackers can hide their identity and act from anywhere in the world, and also cause large-scale damage very quickly.

This abstract explains how cyberterrorism is rising as a major global threat and why governments must strengthen cybersecurity, work together, and protect their digital networks. To keep the world safe, we need trained experts, and strong international cooperation.

Cyberterrorism is a serious danger in today’s digital world. It means using computers and the internet to carry out attacks that cause harm or fear. In today’s digital era, almost all sectors-defence, finance, health, education, and communication—depend on technology. Thus, any large-scale cyberattack can paralyze a nation’s functioning. For example: Stealing secret information from the military, Sending fake messages to create panic among people, Hacking government or bank websites.

Real World Example: Cyber Attacks On Kudankulam Nuclear Unit (India)

The Nuclear Power Corporation of India (NPCIL) admitted to a malware attack on one of the computers in Kudankulam nuclear power plant, Tamil Nadu (India). The NPCIL admitted that computer systems at the Kudankulam nuclear power station had been infected with malware since early September 2019. The NPCIL infection is said to be caused by Dtrack. Dtrack is a Trojan virus that creates backdoors into computer networks. This was originally developed and commonly used by North Korean hackers with state backing. However, there are many variations of Dtrack, and the code may have been adapted by another group. Kudankulam is high on the list of such targets because it is both part of the nuclear programme, as well as the power grid.The Indian Computer Emergency Response Team (CERT-In) claims to be aware of these vulnerabilities. It is also reported to have issued advisories in many instances. However, its scope is limited as it is the responsibility of the organisation owning the asset to protect it.The linking of all the regional grids to the national grid makes it easier to supply power to any region on demand.

Understanding Cyber Terrorism

In today's world, prominent scholars Dorothy Denning (2000) define cyber terrorism as:

“Cyberterrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks, and the information stored therein, when done to intimidate or coerce a government or its people in furtherance of political or social objectives.”

Cybercrime, cyber warfare, and cyberterrorism are different from each other based on who commits the act and why it is done. Cyber terrorism refers to the use of the internet and digital tools by terrorist groups to conduct attacks. These attacks aim to cause harm, fear, and disruption.Cyber warfare, on the other hand, is when one country uses computers and the internet to attack another country. These attacks can target government networks, military systems, or key industries. The goal is to weaken or confuse the other country without fighting on a battlefield. Cybercrime means a wide range of illegal activities conducted through computers and the internet, including hacking, data theft, and online fraud. These crimes can cause big money losses and create problems for many people and businesses.

Main features

  1. Attacks happen through computers and the internet: Cyberterrorists use computers, networks, and online tools instead of physical weapons. They attack things like websites, software, or online services.
  2. Attackers can hide easily: The internet makes it easy for cyberterrorists to hide who they really are. They can use fake names, special tools like VPNs, and different networks around the world to hide their real location.
  3. Used for propaganda: Terror groups also use the internet to Spread their messages, train people, Share harmful information.
  4. Target important systems:Cyberterrorists try to attack systems a country needs to function which is called critical infrastructure, to cause big problems, disrupt daily life, and create fear.
  5.  Uses weaknesses in computer systems: Cyberterrorists take advantage of weak passwords, old software, or security mistakes to break into systems.

Evolution and Growth of Cyber Terrorism: 

The evolution and growth of Cyberterrorism began as increasing global dependence on digital technologies. In its early stages during the 1990s, cyberterrorism was largely theoretical Researchers like Dorothy Denning(2000) noting that terrorist groups were beginning to explore the internet for communication, propaganda, and coordination. There were not many real cyberattacks then just early signs that terrorists were beginning to use the internet for their purposes. As digital infrastructure expanded, cyberterrorism became more dangerous.In the beginning, attackers mostly just changed the appearance of websites or sent threatening emails. But over time, they learned to do more serious things, like breaking into computer networks, stealing important information. By the 2000s and 2010s, extremist groups started using social media, secure messaging apps, and advanced hacking tools. They used these tools to spread their beliefs, find new members, and attack important systems like power grids, hospitals, and government networks. Today, the growth of cyberterrorism is fueled by global connectivity, Conflicts between countries (geopolitical tensions) also encourage more cyberattacks. At the same time, important services like hospitals, transport systems, and power supplies depend heavily on computers. This change has made cyberterrorism a major world problem, not just a small issue. Because it can affect many countries and important systems. In short, more connectivity, more tools, more conflicts, and weaker systems all help cyberterrorism grow today.

Global Examples of Cyber Terrorism   

One of the first well-known examples of cyberterrorism is the Stuxnet attack in 2010. In this attack, a very advanced computer virus was used to target Iran’s nuclear equipment, specifically the machines (centrifuges) that help enrich uranium. The virus caused the machines to break down, which slowed down Iran’s nuclear program. This attack showed that cyberattacks are not just about stealing information. They can also cause real-world physical damage. Another well-known example is the Sony Pictures hack in 2014. In this case, hackers, believed to be from North Korea, used a computer virus (malware) to break into Sony’s computer systems. They stole secret information, leaked private emails, and caused serious problems for the company’s daily work. This attack shows that cyberterrorism can be used to scare or pressure people and organizations for political reasons. In 2016, hackers attacked Bangladesh Bank, the country’s central bank, and stole $81 million. They did this by taking advantage of weaknesses in the SWIFTfinancial system, which banks use to send money internationally. This event shows that cyberterrorism can also target money and financial systems. Between 2014 and 2017, ISIS used the internet to recruit members and spread extremist messages, showing that cyberterrorism can also target people’s minds, not just systems. These examples show that cyberterrorism can be done by governments, extremist groups, or for money, and it can cause harm to people, money, or society’s safety.

International and National Responses

The United Nations (UN) works to help countries cooperate and work together to prevent cybercrimes and cyberterrorism. One of its groups, called the Group of Governmental Experts (GGE), suggests rules and guidelines for how countries should behave responsibly in cyberspace to avoid conflicts or attacks.

The International Telecommunication Union (ITU) helps countries improve their cybersecurity by giving technical advice, training programs, and support for coordinating responses to cyberattacks and cyber threats.

India created the Indian Computer Emergency Response Team (CERT-IN) to find, stop, and respond to cyberattacks, including attacks related to terrorism. CERT-IN helps protect government, businesses, and citizens from cyber threats.

United States also Established Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA) to protect critical infrastructure and coordinate responses to cyber threats. Many countries have plans and strategies for cybersecurity, special police or government teams to fight cybercrime, and work together with other countries to prevent and respond to cyberterrorism.

Challenges in Combating Cyber Terrorism

Combating cyber terrorism is very challenging because it is not like traditional crime. Cyber terrorists can attack from anywhere in the world, which makes it hard for authorities to track them. They often use advanced technology to hide their identity.Lack of global consensus is also a problem, as there is no universal definition or legal framework for cyber terrorism. Rapid technological evolution makes it even harder, because technology changes faster than laws or institutions can adapt. Additionally, many countries face inadequate resources, such as skilled personnel and advanced tools, to prevent or respond to these attacks. All these factors make fighting cyber terrorism very difficult.

Future Dimensions of Cyberterrorism

The future of cyber terrorism is likely to become even more complex and dangerous. Artificial Intelligence (AI) could be used to launch automated attacks, create deepfakes, and spread misinformation quickly. Internet of Things (IoT) devices, like smart homes, cars, and other connected gadgets, can become new entry points for hackers. Hybrid warfare is another concern, where future conflicts may begin with digital attacks before any physical fighting takes place.

Strategies and Recommendations

To fight cyber terrorism, countries need to take several important steps. They should strengthen legal frameworks by updating laws.International cooperation is also essential, with countries sharing information, forming joint cyber teams, and agreeing on common rules.Capacity building is important too, by training cybersecurity experts and teaching digital safety in schools and colleges. Governments and technology companies must work together through public–private collaboration to detect threats early. Finally, promoting cyber awareness among the public through campaigns can teach people safe internet habits and how to identify fake news or online scams. All these steps together make it harder for cyber terrorists to succeed.

Conclusion

Cyberterrorism has become a serious and growing threat to global security. As world becomes more dependent on digital systems for communication, transportation, healthcare and national defence, the risks of cyberattacks increase. Cyberterrorists can use the internet to cause fear, steal information, disrupt important services, and damage economies. Many countries are still not fully prepared to handle these kinds of attacks. Governments and organizations must work together, improve their cybersecurity, and create stronger rules to protect people and systems.

In the end, cyberterrorism is a real challenge for the global community. To stay safe, we must take this threat seriously and build stronger defences, better policies, and build international cooperation. Only by working together can protect digital world and maintain global security.




Moscow.media
Частные объявления сегодня





Rss.plus
















Музыкальные новости




























Спорт в России и мире

Новости спорта


Новости тенниса