Cyber Counter-Terrorism: Shutdown

April 6, 2023
(809 views)

Breaking through the vulnerabilities of fear

From here, a perspective will be addressed regarding the power of information security as the most effective current tool in the fight against terrorism via the network.

The individual with information has a moral duty to face this global threat, which has become the virus of our generation, based on research and historical surveys that show the defense power of those who have access to information.

With the modernization of security systems, with constant anti-virus updates and increasingly advanced firewalls, we have a constant need for investments in the technological sector, due to the constant advance of malicious attacks.

According to the Cambridge dictionary, terror is: 

“Violent action or threats designed to strike fear among the common people,

in order to achieve political goals”

However, it is possible to add to this definition several current motivations for terrorist actions, such as religious issues, financial issues and various personal reasons inherent in human beings with an extreme level of perversity, which may even be bullying (that's right, motivations of young people to commit acts of terror due to psychological changes in schools and the internet), that can be used to alienate terrorist groups, that is, an attempt to affect a person's freedom.

For this, it is necessary to understand some practical aspects of terrorism in order to carry out the transfer of our thinking between the physical and digital actions of this type of threat; mainly to remove from its mentality any discriminatory aspect commonly....

Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.