X hits on this document

33 views

0 shares

0 downloads

0 comments

7 / 12

Cyber Terrorism

An effort by covert forces to disrupt the intersection where the virtual electronic reality of computers meets the physical world

Examples

Logic bombs used to destroy networks and systems

Communicate covertly around the world

Why?

An attack can strike directly at an economic target

No Borders of legal control

No need to infiltrate enemy territory, no loss of life

Growing number of highly skilled computer experts

Funds terrorist activities

Document info
Document views33
Page views33
Page last viewedFri Dec 09 12:05:02 UTC 2016
Pages12
Paragraphs123
Words518

Comments