Sitemap

Member-only story

New technologies Available to Combat Cyberterrorism.

2 min readMar 23, 2024
Photo by FlyD on Unsplash

In combating cyberterrorism, I advocate for installing a firewall and cryptography tools. Firewall technology blocks malicious attacks on the network and systems, preventing damage.

Cyberterrorism is carried out online, making the firewall critical in detecting and blocking suspicious access to the network (Li et al., 2019).

Nevertheless, the firewall alone is not enough to combat cyberattacks, hence the need to apply cryptography.

The commonly used tools for cryptography are Security Tokens, Key-Based Authentication, Docke Java Cryptography, SignTool, and Blockchain (Bock, 2021).

Cryptography helps to conceal information so that only the intended user can see it, limiting the chances of attackers accessing and manipulating information stored in computers and digital systems. The technology involves employing an encryption algorithm to change plaintext to ciphertext.

Cryptography offers passive defense against cyberterrorism by limiting the capabilities of cyber attackers to attack (Li et al., 2019). Encryption algorithms allow attackers to access and manipulate information, underlining the success of the technology in preventing cyberattacks.

Cryptography enhances the confidentiality of the information stored or in transit…

--

--

AceMyHomework
AceMyHomework

Written by AceMyHomework

Professional tutors and writers in all fields and subjects.

Responses (1)