Your browser does not support JavaScript. Please to enable it.

Terms & Conditions

The idea you wish to view belongs to a community that requires acceptance of terms and conditions.

RejectAccept

    Help to Improve This Idea.

    Search

     
    Prev | Next

    Counter cyber terrorism

    by Mamphago Molepo 11/09/2019 08:24 PM GMT

    • {{:upVoteCount}}
    Username * ()

        Move idea from "Submission and Collaboration" stage to:

          Collapse

          Which workspace template do you wish to use?

          Collapse
          I accept the terms and conditions (see side bar). I understand all content I am submitting must be licensed under an open-source software or Creative Commons license as described in the Terms and Conditions:

          on

          Description

          Cyber Terrorism is at it prime and it’s getting worse. Not only is it able to infiltrate the various government structures and their sensitive information, but it incites fear in the civilians.

          Kinetic cyber attacks are acts of aggression to cause damage through exploitation of sensitive information. This poses risks to government and leaders information, and the individuals that are on the database.
          This can be combatted by end to end encryption all information condsider sentive and constantly improving the encryption codes and firewalls to stay on step ahead of the individuals behind the online terrorism.
          Spreading of terrorist content online occurs usually on social media. Finding a way to counter this, civilians and the social media management need to join forces. Social media platforms need a policies whereby civilians can be able to report any terrorist content and they remove it with immediate effect. It should not only stop there, the various social media platforms need to check the activity of the reported user to see if they need to deactivate their account or not.
          Online terrorist communications is one of the hardest to combat as they use encryption. Social media platforms have now implemented an end to end encryption, making the access to their users messages close to impossible. Social media platforms can design a software that detects terrorist language and when detected immediately block or deactivate their accounts.
          With the content no longer in circulation, hacking into the critical infrastructures being close to impossible, and the communication blocked, financing of the online digital terrorism would decrease due to them no longer reaping the benefits of online terrorism
          Co-authors to your solution

          Link to your documentation or presentation.

          Link to an online working solution or prototype

          Link to a video or screencast of your proposal or prototype.

          Link to your source code, data, images, or other assets.

          https://www.cybersecurity-insiders.com/what-is-a-cyber-kinetic-attack/

          Move this Idea

          Select a Category

          Close this idea

          When closing an idea, you must determine whether the idea has exited successfully or unsuccessfully.

          Copy idea to another community

          Add Team Members

            Maximum number of team members allowed: 15
            *Required

            Help to Improve This Idea.

            50%
            0%
            0%
            User Tasks ?
            Required for graduation.
            Task Assigned to Due Date Status
            Review Panel 12/24/2019 Incomplete
            No ideas found!
            No activities yet.