A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Sunday, October 11, 2015

Terrorist in the Internet

In the years since the first WWW applications were developed, there has been an explosion in the global use of the internet. With this growth has come an increasing usage of the medium by criminal and terrorist groups.

The internet is used by international insurgents, jihadist and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication,  and ground for training.

The World Wide Web is home dozens of site that provides information on how to build explosive and chemical weapons, providing maps, photographs, directions, codes and technical details of how to use explosives.

The internet is very helpful for a terrorist organization is in collecting information. The internet also can serve as a virtual training camp.

The internet also is used to recruit and mobilize supporters to play a more active role in supporting terrorist activities or causes.

Many Arabic-language websites are said to contain coded plans for new attacks. Some reportedly give advice on how to build and operate weapons and how to pass through border checkpoints.

The term terrorist or terrorism is a highly emotive term. Generally it is use t0 denote “revolutionists who seek to use terror systemically to further their views or to govern a particular area”.

‘Cyber-terrorism’ is a different form of terrorism since physical systematic terror does not usually occur (although it can if it causes disruption to a critical system), but a widespread destruction of information resources can.

Cybercrime has increased in past years and several recent terrorist events appear to have been fined partially through online credit card fraud. Extremist hackers have reportedly used identity theft and credit card fraud to support terrorist activities.
Terrorist in the Internet

The Most Popular Posts

  • Caffè Mocha, a beloved coffee beverage enjoyed around the world, has an intriguing history intertwined with the evolution of coffee and chocolate. Original...
  • Kola nut extract, sourced from the seeds of the kola tree (*Cola acuminata* and *Cola nitida*), is a natural flavoring with a distinctive taste, caffeine c...
  • Betalains are a unique group of pigments that occur in certain plants, particularly within the Amaranthaceae family, which includes well-known vegetables l...