Cyber terrorism involves the cyber space and terrorism. Cyber space means in which the computer programs and data moves. The premeditated, politically motivated attacks against information, computer systems, and computer programs can be called as cyber-terrorism. The different forms of cyber-terrorism are privacy violation, secret information appropriation, data theft, network damage, and disruptions.
The IT act gives the widest possible known legal definition. The acts of cyber-terrorism include punishable with life imprisonment and a fine. The computer systems, network, and communication devise is needs to cover by the IT act. The IT act reduces the cyber attacks. The first international treaty for fighting against computer crime is The Council of Europe Convention on Cyber Crime.
The key things involved to protect from cyber-terrorism are it is better to have passwords for all accounts and the passwords should be unusual. Don't access the suspicious emails, it could be a trouble, audit systems, and configure the network configuration when defects become know to avoid the cyber-terrorism.
The IT act gives the widest possible known legal definition. The acts of cyber-terrorism include punishable with life imprisonment and a fine. The computer systems, network, and communication devise is needs to cover by the IT act. The IT act reduces the cyber attacks. The first international treaty for fighting against computer crime is The Council of Europe Convention on Cyber Crime.
The key things involved to protect from cyber-terrorism are it is better to have passwords for all accounts and the passwords should be unusual. Don't access the suspicious emails, it could be a trouble, audit systems, and configure the network configuration when defects become know to avoid the cyber-terrorism.
No comments:
Post a Comment