Almost every person in the world has a vague idea of what terrorism is. Using violent means to achieve political goals, especially by targeting innocent civilians, is a hallmark of terrorism., Nonetheless, in the last two or three decades, the world has come to realize that terror can be inflicted on countries and organizations, not just through guns and bombs, but also through digital networks and the internet.ย
These attacks can cause incalculable damage, given humanityโs dependence on the internet and information technology. Such attacks are referred to as Cyber terrorism. Instances of Cyber-terror have increased exponentially in the past few decades, and Cybersecurity is forced to adapt for defending information systems, sensitive information, and data from Cyber terrorists.
In this article let us look at:
In simple words, when terrorist organizations use the internet to further their goals and objectives, it is considered to be Cyber terrorism. Information and communication technology, commonly referred to as ICT, has changed the world as we know it but also offers plenty of scope for terror outfits to expand, recruit, and propagandize on various ICT platforms. The internet can be used by terrorists to finance their operations, train other terrorists, and plan terror attacks. The more mainstream idea of Cyber terrorism also includes the hacking of government or private servers to access sensitive information or even siphon funds for use in terror activities. However, there is no universally accepted definition of Cyber terrorism, to date.
There are hundreds of examples of Cyber terrorism and some of them have been listed below.
Apart from these examples mentioned above, there are many more instances where the internet can be used to launch Cyber attacks on governments, agencies, and institutions that do not agree with or stand against the terror organizations. All such attacks aimed at achieving the objectives of terror can be classified as Cyber terrorism.
Different countries have different laws to tackle Cyber terrorism, and since there is a lack of a universal definition, these vary significantly from state to region. In India, the Information Technology Act, 2000 (after this the IT Act) defines and prescribes the punishment for Cyber terrorism. It was in the aftermath of the 26/11 Mumbai terror attacks that shook the country that this law was amended in 2008 to address the Cyber terrorism threat to national security.ย Accordingly, Section 66F was inserted into the IT Act, which is the closest thing we have to a Cyber terrorism Act.ย ย
According to the IT Act, Cyber terrorism is:
The punishment for an act of Cyber terrorism in India is imprisonment which may extend to imprisonment for life. Even an attempt to commit an act of Cyber terrorism draws the same punishment. In some circumstances, Section 121 of the Indian Penal Code may also be invoked to punish the individual as it covers the waging of a war against the Government of India.
Since Cyber terrorism does not involve the actual use of physical violence to inflict harm on innocents, most individuals are unaware of what it means and how dangerous it can be. With the development and constant changes in Cyberspace, methods through which information technology systems can be compromised, are also increasing. In India, especially in the last few years, a steady shift has been made to online services to reduce costs and improve efficiency. From passport offices and income tax collection to stock markets and banks, a large number of institutions that form the backbone of the Indian economy and country, in general, are heavily dependent on the internet daily.ย
It would take just a few hours or less for a Cyber-terrorist to take down an essential institution like a bank or the stock market by infiltrating the servers, if the Cybersecurity employed, is not up to the mark. With massive databases like the Aadhar database or the driving license information databases in the states, sensitive information and personal details of over 1 billion Indians are stored on digital networks. If any of these databases are compromised, it could lead to damage that is long-lasting and potentially irreversible.
The Cyber terrorism threat does not come only from terror outfits but also from neighboring countries that do not share cordial relations with India, which enhances the need for a more robust legal framework and improved Cybersecurity. There exists a general lack of awareness in India at both the institutional and individual levels concerning matters surrounding Cybersecurity and the system also suffers due to the loopholes that plague the legal framework, set up to tackle Cyber terrorism. The laws are also out-dated and have not evolved sufficiently to tackle the constantly changing threats to Cybersecurity.
To protect ourselves against such attacks and counter the Cyber terrorism threat to national security, the Government of India will have to ensure that Cybersecurity systems are up to date and fully capable of fending them off. With each passing day, more and more anti-state outfits are moving their operations to the internet, and it is, therefore, crucial for individuals as well as governments to remain vigilant and improve efforts to make databases more secure and trustworthy.
There needs to be more attention given to the training and encouragement ofย ย Cybersecurity professionals to meet the ever-increasing demand in the country as well as the world. One factor that could undoubtedly improve the efforts to tackle Cyber terrorism would be a universally accepted definition across the globe. As individuals, we can also play a role by ensuring that we follow the Cyber-safety advisories and recommendations that are usually issued by governments and Information and Communication technology institutions.
If youโre looking for an extensive course that can thoroughly guide you about Cybercrimes, then Jigsaw Academyโs Master Certificate in Cyber Security (Red Team) is the perfect course for you! Powered by HackerU, Israelโs Premier Cyber Security Training Provider, this course runs 600 hours long and is conducted live, online.
Fill in the details to know more
What Is Asset Classification?
March 20, 2023
Masquerade Attack โ Everything You Need To Know!
February 27, 2023
Best Infosys Information Security Engineer Interview Questions and Answers
What Are SOC and NOC In Cyber Security? What’s the Difference?
A Brief Introduction to Cyber Security Analytics
February 26, 2023
Cyber Safe Behaviour In Banking Systems
February 17, 2023
Add your details:
By proceeding, you agree to our privacy policy and also agree to receive information from UNext through WhatsApp & other means of communication.
Upgrade your inbox with our curated newletters once every month. We appreciate your support and will make sure to keep your subscription worthwhile