Describe cyber-terrorism and its targets; why is it attractive to terrorist? How can Cyber-terrorism be utilized by terrorists?
What will be an ideal response?
• Cyber-terrorism refers to the use of computers to attack technological targets or physical attacks on computer networks; The National Conference of State Legislatures defines cyber-terrorism as the use of information technology by terrorists to promote a political agenda.
• Barry Collin coined the term in the early 1990s, believes it involves disrupting points where the virtual, electronic realm of computer networks and programs intersects with the physical world.
• There are targets for cyber-terrorism: computers, computer networks, and information storage and retrieval systems.
• Terrorists differ from hackers, the council argues, because their purpose is to launch a systematic attack for political purposes.
• Cyber-terrorism is an attractive low-risk strategy.
• Computers allow terrorist groups to remain connected, providing a means for covert discussions and anonymity.
• Computer networks are also much less expensive and work intensive than the secretive infrastructures necessary to maintain terrorist groups.
• Modern Western society needs information and the flow of information to function, so cyber-terrorists threaten to interrupt or confuse that flow of information.
• The most common tactic to date has been the defacement of websites.
• There are many potential targets for cyber-terrorists.
• Computer virus is implanted in an enemy's computer.
• "Logic bombs," or snippets of program code that lie dormant for years until they are instructed to overwhelm a computer system.
• Bogus computer chips sold to sabotage an enemy's computer network.
• Trojan horses can contain malevolent code that can destroy a system, and "back doors" in computer systems can allow terrorists to enter systems thought to be secured.
• Shahar believes that conventional attacks, such as overloading an electrical system, threaten computer security.
You might also like to view...
What is the name of the satellite surveillance network managed by the National Security Agency?
A. Acoustic Kitty B. Echelon C. Mongoose D. Chaos
To commit the offense of bribery, the conduct must involve some benefit to the other party. For the purposes of the statute, a "benefit" is reasonably regarded as ________ gain or advantage
Fill in the blank(s) with correct word
Felonies are punishable by more than one year in prison.
Answer the following statement true (T) or false (F)
The Judiciary Act of 1789 divided the U.S. into __________ judicial circuits
a. 15 b. 18 c. 10 d. 13