You are on page 1of 5

RUNNING HEAD: CYBER TERRORISM GURANY1

Alejandro Gurany
University of Texas at El Paso
Cyber Terrorism









CYBER TERRORISM GURANY2


In the past years cyber terrorism has become one of the biggest threats in the
entire word, and a big part of this threat is occurring in the United States. People are not
able to use the Internet the same way they used before, because of dangers that it has
developed. This has caused many people lose their identities because of the easy that it is
to hack into a computer and obtain others peoples information. Not only the community
is being affected but also The US government is playing a big part in this problem.
However they have been working on this problem and are trying to figure something out
to clean whatever cyber terrorism has affected the US society. By the community
working together we can find ways that can help prevent cyber terrorism from happening.
Both man and woman are being affected every day only by them using the social
network and posting information about themselves. Kids are also a victim of the cyber
terrorism; it is way easier to get information out of a child by making them believe that
by writing that information in the internet they will be able to download the game theyve
wanted to play for a long time. But what is cyber terrorism? Cyber terrorism occurs when
someone else uses computer systems, computer programs, or any other electronic
systems to steal private information from someone that not allowed this to happen. China
is considered one of the biggest countries that are trying to steal not only identities from
US population but also any achieves that the US might have. In the article Cyber
kleptomaniacs: why China steals our secrets by John Lee it talks specifically about how
easy has it turn to get into the internet and find information that has been displayed in the
internet. You don't have to look far these days to find a press report about another firm,
like Google, whose networks have been penetrated by Chinese cyber espionage and have
CYBER TERRORISM GURANY3

lost valuable corporate intellectual property(Lee, pg176) this is how Author john Lee
expresses himself over the cyber terrorism problems in the US. This article explained the
importance of not putting personal information in social networks that might be harmful
to you later in time. It also implores how is has been proven that many places that require
you information displays all the information in the internet and is easy to find and use.
The US government is also one of the ones that are being affected by cyber terrorism
every day. There are many articles that talk about how the government are not being
prepared and has been leading other countries get our private information. An article
called America the Vulnerable: How Our Government is Failing to Protect Us from
Terrorism, by Michael D. Hays argues about how the government is not doing a good
job to protect its population from cyber terrorism. Hays argues "America remains
dangerously unprepared to prevent and respond to a catastrophic terrorist attack on US
soil So argues Stephen Flynn in a well-researched book that, while often scathing in its
criticism, remains free of partisan axe-grinding Flynn offers a wealth of creative,
practical recommendations to better protect our people, ports, food and water, factories,
and transportation networks (Hays, pg117). As Hays implored we live in a country
where the government in not doing much about keeping our identities safe or any other
information that might be useful to someone else and had to suffer of cyber terrorism.
There are many ways that can help prevent cyber terrorism, one of the things that
are recommended to do is not to share any personal information in any social network or
the internet at all. It is really easy to get information out of the internet. There are articles
that talk about the importance of not giving out information on the internet and gives
many tips of how to stay away from cyber terrorism, for example the article titled Data
CYBER TERRORISM GURANY4

security laws and the cybersecurity debate by David A. Goldman & Corey M. Dennis
explains how government is developing ways to secure all our identities even from the
internet and stop cyber terrorism. Goldman & Dennis mentioned Due to both
government and private industry concerns, numerous federal data security bills have been
proposed, but few have actually been enacted. Most recently, given congressional
inaction in this area, President Obama issued a Cybersecurity Executive Order. This
article discusses the existing state and federal data security regulatory schemes in the
United States, the Cybersecurity Executive Order, and the debate surrounding recent
cybersecurity bills(Goldman,Dennis, Pg1). It is dangerous to give out information in the
Internet because it is easier for other people to get your information out of the Internet.
This article provides examples of people that have experienced cyber terrorism in the
United States and it says that this threat has being growing and actually getting closer to
the objective of getting Information from them and use it for something else, One
example of this is the credit card numbers that have been stolen and used
In a conclusion cyber terrorism is a threat that has to stop in the United States.
Citizens do not feel safe living in the United States anymore because of the fact that other
countries see the United States as one of the weakest when it comes to hacking devices
and getting their information. There are different ways that we can do in order to help our
government protect us from other countries that want to hurt our country. By us working
together and putting more attention to this particular problem we can save our lives from
bad things that can happen if one of these countries obtain what they have been looking
for a long time and accomplish their objectives.

CYBER TERRORISM GURANY5


References
Lee, J. (2013). Cyber kleptomaniacs: why China steals our secrets. World Affairs, 176(3),
73+.Retrievedfrom
http://go.galegroup.com/ps/i.do?id=GALE%7CA343363039&v=2.1&u=tlc19909
5667&it=r&p=AONE&sw=w&asid=09a4188d949087e3307f5e689ea1b77e
Hays, M. D. (2008, Fall). America the Vulnerable: How Our Government is Failing to
Protect Us from Terrorism. Air & Space Power Journal, 22(3), 117+.
Retrievedfrom
http://go.galegroup.com/ps/i.do?id=GALE%7CA190197930&v=2.1&u=tlc19909
5667&it=r&p=AONE&sw=w&asid=844e84c3de3c3a4e603a5b28735937f9
Dennis, C. M., & Goldman, D. A. (2013, August). Data security laws and the
cybersecurity debate. Journal of Internet Law, 17(2), 1+. Retrieved from
http://go.galegroup.com/ps/i.do?id=GALE%7CA340575846&v=2.1&u=tlc19909
5667&it=r&p=AONE&sw=w&asid=a06b16b8ed8e3456d29c83050b45ad69

You might also like