top of page

Cyber Terrorism: A Blooming Global Threat And The Initiatives Against It




Priyaksh Sharma, New Law College, Pune

ABSTRACT

With the development of technology cyber space is continuously developing so is the crimes which take place in cyberspace are also developing. Cyber terrorism in simple words can be defined as a trembling of government or private networks and the breach of security of computer systems storing confidential and private data and using of such data for fulfilling illogical demands or political propagandas of certain groups. Cyber terrorism has casted it’s shadow on all the networks and computer systems all around the globe. It is normally thought that cyber terrorism is a cyber crime which originated in 2000s but it was there even way before of 1980s as cyber crime can be defined as using of electronic technology in such a manner that some damage or fear is caused in the minds of victims and cyber terrorism being a type of cybercrime can take place even with use of electronic technologies other than the computer systems for example printing and circulating of threatening mails among the masses for causing confusion and uncertainty. There are various ways and measures which are devised by the Indian Government and various other international organizations for combating cyber terrorism. This article gives a detailed description regarding cyber terrorism and the ways which are devised for combating it.

Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page