$19.95 Buy and instantly download this paper now
This in-depth paper looks at way in which the Internet can be used for terrorist activities. It produces evidence that the FBI has of such attacks that have already been perpetrated and lists examples. The paper also looks at different types of attacks such as worms, viruses, unauthorized attacks, falling sites, 'pingings' and more. It reveals who are the main players in this "game", both groups and individuals.
From the Paper:"It has been called "information war" or "cyber terrorism" -- the capability to let loose terror and destruction with a few well-aimed clicks on a computer keyboard. Although it is an unusual and a potentially lethal subject, the public does not know very much about it. However, experts in and around the country, to the top level of the federal government, are taking it seriously.
The FBI defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives. Cyber-terrorism can be the use of computing assets to threaten or force others. An example of cyber-terrorism could be hacking into a hospital computer system and changing someone's medicine prescription to a lethal dosage as an act of revenge. It sounds far fetched, but these things can and do happen. Cyber terrorism has also been defined as "the use of computing resources against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives."1."
Cite this Research Paper:
Cyber-Terrorism (2003, February 10) Retrieved April 14, 2021, from https://www.academon.com/research-paper/cyber-terrorism-5713/
"Cyber-Terrorism" 10 February 2003. Web. 14 April. 2021. <https://www.academon.com/research-paper/cyber-terrorism-5713/>