Only available on StudyMode
  • Download(s): 84
  • Published: May 13, 2013
Read full document
Text Preview
Nick Jackson
Cyberterrorism: Weapons of Mass Annoyance


I. Introduction
a. Define Cyberterrorism
II. Types of Cyber Attacks
b. Identify and give examples of:
i. Trojan horse
ii. Virus
iii. Worm
iv. Phishing
v. Denial of Service (DoS)
c. Three Levels of Cyber Capability
vi. Simple-Unstructured
vii. Advanced-Structured
viii. Complex-Coordinated
III. Potential Threats of Cyberterrorism
d. Dams Used for Water Storage of Power Generation
e. Reliance on Digital
ix. Increased DoS Attacks
IV. Conclusion
V. Works Cited


The term cyberterrorism was created in the mid 90’s by combining cyberspace and terrorism. The term has been widely accepted after being embraced by the United State Intelligence Community. Janczewski and Colarik describe cyberterrorism as “Premeditated, politically motivated attacks by subnational groups, clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combat targets” (Janczewski & Colarik, 2005, p. 43). Cyberterrorism is a form of terrorism that uses any form of connected source to engage in attacks of information systems, incitement to violence, theft of data, and planning of terrorist attacks (Britz, 2011, p. 197). As an introduction into the topic, the following definition is key to understanding the definition:

“Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coercer a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to...
tracking img