Cyber Security Unit 2
Cyber Security Unit 2
While we’ve become used to hearing about cyber attacks, cyber terrorism instils a
different type of worry. Computer hackers have long worked to gain access to
classified information for financial gain, meaning terrorists could do the same
The internet can be used by terrorists to finance their operations, train other
terrorists, and plan terror attacks. The more mainstream idea of cyber terrorism is
the hacking of government or private servers to access sensitive information or
even siphon funds for use in terror activities. However, there is currently no
universally accepted definition of cyber terrorism.
Since cyber terrorism does not involve the actual use of physical violence to inflict
harm on innocents, most individuals are unaware of what it means and how
dangerous it can be.
With the steady shift towards online services to reduce costs and improve
efficiency, and the continual developments in cyberspace, there are ever increasing
ways for IT systems to be compromised
1. Ideologically Driven:
Political or Ideological Motives: Perpetrated by individuals or groups with specific political,
ideological, or religious agendas, aiming to advance their causes through cyber attacks.
2. Intentional Harm and Fear:
Intent to Cause Harm: The primary objective is to cause damage, disruption, or fear, often
targeting critical infrastructure or sensitive systems.
3. Use of Advanced Technology:
Sophisticated Methods: Employing advanced and sophisticated techniques, including
malware, hacking, and social engineering, to carry out attacks.
4. Targeting Critical Infrastructure:
Critical Systems: Targeting critical infrastructure, such as power grids, financial institutions,
healthcare systems, or transportation networks, to cause widespread disruption.
5. Global Reach and Impact:
Cross-Border Operations: Attacks can be launched from anywhere globally, affecting
multiple countries and institutions simultaneously.
6. Psychological Impact:
Psychological Warfare: Aiming to create fear, panic, and uncertainty among the public or
within specific organizations or governments.
7. Difficult Attribution:
Attribution Challenges: Often difficult to attribute attacks to specific individuals or groups
due to the use of sophisticated techniques and anonymity tools.
8. Use of Encryption and Anonymity:
Secure Communication: Utilizing encrypted communication and anonymization methods to
protect identities and evade detection.
9. Motivated by Political or Social Causes:
Driven by Political Goals: Motivated by political grievances, social causes, or ideologies,
seeking to achieve specific outcomes through cyber attacks.
Real Examples of Cyber Terrorism
There are debates about what constitutes actual cyber terrorism due to the difficulty in
attributing attacks directly to terrorist organizations. However, here are some instances where
cyber attacks, though not universally defined as cyber terrorism, had significant impacts and
were carried out with intentions that aligned partially with the characteristics of cyber
terrorism:
1. Stuxnet Attack (2010):
Nature: Considered as a state-sponsored cyber attack.
Target: Targeted Iran's nuclear facilities, particularly centrifuges used for uranium
enrichment.
Impact: Caused physical damage by disrupting industrial control systems, leading to the
destruction of centrifuges.
2. WannaCry Ransomware Attack (2017):
Nature: A global ransomware attack affecting hundreds of thousands of computers.
Target: Infected computers worldwide, including healthcare systems, transportation
networks, and government agencies.
Impact: Disrupted services, encrypted data, and demanded ransom payments for decryption.
3. Cyber Attacks on Critical Infrastructure:
Nature: Various cyber attacks on critical infrastructure systems, including power grids, water
supply networks, and transportation systems.
Target: Disrupted services and caused temporary outages, leading to potential safety and
economic risks.
4. Sony Pictures Entertainment Hack (2014):
Nature: A cyber attack targeting a major entertainment company.
Impact: Leaked sensitive information, emails, and unreleased films, leading to reputational
damage and financial losses.
5. Cyber Attacks Attributed to State-Sponsored Actors:
Attributed Attacks: Some cyber attacks have been attributed to state-sponsored actors
conducting espionage or disruption activities in alignment with national interests.
While these incidents demonstrate the potential impact of cyber attacks on critical
infrastructure, organizations, and individuals, the attribution of these attacks to specific
terrorist groups remains a complex issue. Cyber attacks often involve nation-states, hacktivist
groups, or criminal organizations, making the classification of an attack as "cyber terrorism"
contentious and subject to interpretation.