Wednesday, September 25, 2019

Research Papper Paper Example | Topics and Well Written Essays - 1000 words

Papper - Research Paper Example The manufacturing sector has also been heavily targeted and attacked by cyber terrorists and criminals. This has been done especially to access information about manufacturing processes and control process. Cyber terrorist may attack manufacturing industries systems so as to get access to the data concerning the processes and procedures used in that industry. This information may then be used elsewhere to manufacture counterfeit commodities. Cyber terrorist also attack the automated machine control processes so as to cause accidents in that particular industry. These may be politically motivated attacks. The other sector that is targeted by cyber terrorists is the health care sector. The sector has been at risk since it has not invested in cybercrime security procedures. These attacks may results into financial losses and even deaths. These cyber terrorist can access the hospital data system and for example change the medicine prescription of a patient resulting into death of the patient (Krasavin, 2004). The transport sector and the critical infrastructure of the country are also top targets of cyber terrorists. These cyber criminals can use their software to interfere with for example flight schedules in order to cause confusion in airports. Communication systems have also been attacked by cyber terrorists leading to access of vital information and confidential information of the American citizens. Cyber terrorists have as well targeted the education sector in the United States of America. This has been for example done through accessing the databases of various education institutions and changing the grades of the students or interfering with the curriculum. These terrorists have also used the internet to carrying out cyber bullying in order to intimidate students. In addition to that, students’ work and assignments have also been attacked and interfered with through spamming and other malwares. Cyber crime

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.