Friday, July 9, 2010

CYBER-TERRORISM,LOGIC BOMBS AND PROTECTION METHODS


By:Abbas Saghali

Hacking into computer system of a police station or a hospital and changing an individual's prescription to a lethal dosage for different motivation such as revenge can be viewed as some examples of Cyber-terrorism.In order to better protection of computer system, computing experts should be sufficiently aware of their weakness area against professional hackers which attack to systems in terms of Cyber-terrorism.It should be suggested that a complete secure system can never be accessed by any experts,but danger of Cyber-terrorism can be  reduced.For instance,most of government economical and political classified documents are kept in  separate systems  without any connection to outside. Another way to prevention of Cyber-terrorism is promotion the use of firewall to monitor all communication in a system such as email messages which  may unpredictably carry logic bombs.At the end , we should point out encryption which is  the most common method of protection from Cyber-based attacks.
Cyber-terrorism Links      

No comments:

Post a Comment