Topic > Digital Crime and Digital Terrorism: The Future of Technology

In this informative essay, we will discuss the future of cyber terrorism and what we should expect in the near future. Unfortunately, technology advances too quickly and mobile phone companies even announce a new phone every two months. People don't give much thought to digital crime, whether the victim believes nothing can be done or law enforcement is still trying to figure out how to deal with these problems. An important topic that people should educate themselves on but can protect their device at home known as risk analysis will also be discussed. Additionally, we will examine how integrity, authenticity, confidentiality and availability come into play in digital crime. It will mention the main problematic factors that law enforcement agencies are facing and, to conclude, this document will deal with the future of terrorist tactics and whether they will be able to progress. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay At first, the future is unpredictable, and as time goes by, people learn new things, like technology itself. Ten years ago no one imagined that technology would have such a huge impact on us as it has today. There are even cars that drive for us, the difference between now and years ago is truly inexplicable. However, just like every good thing, everything also has its risks, as technology can be useful but also dangerous. Criminals will always try to find the easiest way to get what they want, be it money or power. Even more so, people should learn what device they have available and how to keep it safe from criminals. Apparently, technology is growing, one day it may be completely dependent on technology and it may be too late to stop those who abuse it. One of the fundamental principles of risk analysis, first and foremost, would be evaluation. Assessment and risk assessment means the review of various information resources on hardware, software, databases or computers. Its purpose is to identify, analyze and evaluate any risk ensuring that the IT security function works appropriately against risks you may encounter such as errors, viruses or malicious code. The risk analysis must be properly assessed and evaluate the existing information of the technological systems (the IT functions) including organizational, managerial and administrative procedures related to the IT systems. Have information regarding the purchase of future IT equipment and systems. Have strategically expanding cybersecurity parameters as the system grows and changes. Then, you'll move on to identifying the threats an organization faces - anything that can potentially damage your IT infrastructure. For example, this may mean that an error is detected or that the results in the last evaluation were different from the last time you checked. If so, then it could mean that something is wrong and it wouldn't hurt to check it. Resources spent to eliminate risks in a cost-effective manner. To continue, integrity involves preserving the consistency, accuracy and reliability of data so that the data is as authentic as possible. Under no circumstances may the data be modified during transport; therefore, you need to take these measures to ensure that your data is not distorted by illicit people. Therefore, no one other than you can have access, including file permissions and user access controls. It would be oneviolation of integrity, because the user's information has been distorted without his permission. An example of an integrity failure is when the user tries to access a web page; however, an attacker redirects you to a different page, in other words, letting you know that they have complete control. This is the easiest way to know whether a website is authentic or not. Furthermore, authentication is a process in which records are compared with the database file. It means that authorized users provide revealing information within a verification server. When the path completes showing a match, users are granted permission to log in. Moving forward, confidentiality is a very serious issue for any situation parallel to secrecy. Therefore, confidentiality measures are taken to prevent classified information from falling into the wrong hands and only users can access it. Leading to the inability to maintain confidentiality means that a hacker or unwanted user gains access on purpose but attempts to hack it. This concealment fiasco is also known as a breach and cannot be recovered in any way. In other words, once exposed it is almost impossible to take back. Imagine that you personally tell someone an intimate secret, but the person puts this information out there and it cannot be undone. It works exactly the same way with technology: once it's revealed, there's no way not to reveal it. For example, if your Social Security number or financial information were to be posted on social media or the Internet, everyone would see it. It just makes the job of hackers or identity fraudsters a lot easier because that's not how you can hide that information. That's why it's especially important to keep all this information private and carefully monitor what you post online. Additionally, availability is best ensured by keeping all hardware meticulously intact. This means that all repairs at one time must be performed to the extent necessary to have a fully functional operating system free of software conflicts such as viruses or malicious code. Even those annoying update reminders are important: the user must have updated all software and features. An alternative to avoid data loss (it happens constantly) is to always back up your information by making a copy and store it in a safe place and always away from any danger in case the main sources are damaged. For more security the better, there are a couple of pieces of equipment that can be used as “firewalls and proxy servers can protect against downtime and unreachable data due to malicious actions such as Denial-of-Service (DoS) attacks and computer intrusions. network". Secondly, the major problems that the criminal justice system faces in the field of cybercrime have several reasons. One is the countless unreported cyber crimes, sometimes it is difficult for victims to report them due to someone who cannot be traced. Let's not forget that computer science is still fresh in the world of criminal justice, it cannot be compared to the countless ways to solve a murder. Now, in the 21st century, people abuse technology so much that it should be studied and investigated more. Another problem is that computer companies use broadband access to the Internet without promising good security for the devices, making it easier for hackers to hack, "These findings would suggest that the risk of victimization increases withtime and the penetration of computers and the Internet within a particular society.” In other words, it is under great pressure to keep up with the rapid technological changes that occur daily. Thus the criminal justice system lacks the manpower needed to complete investigations because some people believe it is not a problem. The criminal justice system really needs to enforce better communication with other agencies, for example more agencies like the NCSD. The NCSD contains agencies like Software Assure Program or Cyber ​​Storm that should be able to work with other departments not just for national security. Finally, cyberterrorists use technology to gain access to infrastructure such as sensitive information and databases. A common scenario would be that they go through all these problems to gain access to nuclear or missile hacking. In the near future, terrorist organizations will preferably use computers to threaten and launch cyber attacks from governments and international organizations. For example, targeting NATO itself; however, NATO itself is prepared for any potential attack. Especially because NATO relies completely on information technology, so it is aware that it has to apply specific laws of different efficiency to distribute cyber crimes and cyber attacks. Social media and private websites (such as personal blogs) are used constantly by many people, in fact some people make a living from social media. Terrorists can use it to communicate and organize attacks to send a message to society. “Some experts are reluctant to label the mere use of computer networks and the Internet by terrorist groups as cyber terrorism” (2019). It has been seen earlier that some terrorists who are holding people hostage go live streaming to send a message. Furthermore, they will spread propaganda to recruit new members, perhaps by persuading or brainwashing people into fearing and respecting them. Cyber ​​terrorist is not as common as regular terrorist, who will look for people to join them. “Quite simply, they are leveraging modern tools to carry out common terrorist actions such as internal communication and coordination, propaganda and disinformation, recruitment and financing, information and intelligence gathering.” Perhaps by looking for more networking experts or high-level professional hackers who would do the unthinkable, terrorists will want them involved in their dirty work. (2019) Another reason would be fundraising yes, fundraising because in order to do all this you need money for equipment “These transnational terrorist groups with less close ties usually rely on various means of financing and logistical support , as well as on self-financed criminal activities. Their support networks include legitimate businesses, associations and non-governmental organizations.” (2019) They may have their own online business online sometimes even pornographic, but keep in mind that terrorists have to be careful, so it is easy to assume that they can get their funding through online shopping. Some honorable mentions on the type of tools they use to attack through the network would be like an electromagnetic pulse (EMP) and a high-energy radio frequency (HERF). EMP makes sure to disable electrical devices due to a huge electromagnetic field created by a nuclear explosion or can be created by generating HERF. Finally, malicious software, which includes numerous types of malicious software that can get the job done, whether it is DoS or Trojan viruses. Please note: this is just an example..