Sunday, August 30, 2015

Types of Cyber Terrorism

Types of Cyber Terrorism

Cyber spies are individuals who use  illegal methods on the Internet to get secrets. They do this without the permission or knowledge of the individuals, companies or nations to whom these secrets belong.

Cyber spies use Trojan horses, spyware and various cracking techniques to gain access to restricted information by exploiting software vulnerabilities. A Trojan horse, like the fabled Trojan horse of old, uses trickery. Trojan horses are software-malware-which are presented as useful and harmless but really aren’t.

 Information has always been important and attempts to gain information have often been conducted from both sides of any competitive situation. Knowledge is power and information gives countries and businesses and even different political players, an advantage over each other. The Internet has made a lot of information available which can offer an economic advantage to competing parties. The Internet has also acted as a new source of information which can be used to sabotage competitors.

 In early 2009, some ghost hackers from China were revealed to have compromised 1,295 computers belonging to embassies, banks, news agencies across the world and NATO. They even hacked into computers used by the Dalai Lama and Tibetan exiles.



No comments:

Post a Comment