Topics: Terrorism, Cyberterrorism, September 11 attacks Pages: 3 (625 words) Published: February 26, 2014
Unit 5 Assignment 1

Cyber terrorism
Cyber terrorists use information technology to attack civilians and draw attention to their cause. This may mean that they use information technology, such as computer systems or telecommunications, as a tool to orchestrate a traditional attack. More often, cyber terrorism refers to an attack on information technology itself in a way that would radically disrupt networked services. For example, cyber terrorists could disable networked emergency systems or hack into networks housing critical financial information. There is wide disagreement over the extent of the existing threat by cyber terrorists.

Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.

Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed].

There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.

Several minor incidents of cyberterrorism have been documented.

Types of cyberterror capability[edit]
The following three levels of cyberterror capability is defined by Monterey group

Simple-Unstructured: The capability to conduct basic hacks against individual systems using tools created by...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Cyber Terrorism
  • Cyber Warfare: Cyber Terrorism Essay
  • Technology-the Future of Terrorism Essay
  • Cyber Terrorism Essay
  • Terrorism Jihad Essay
  • Terrorism Research Paper
  • Terrorism Essay
  • Terrorism Essay

Become a StudyMode Member

Sign Up - It's Free